Starting Permit User Sessions... Starting OpenBSD Secure Shell server... Starting getty on tty2-tty6 if dbus and logind are not available... [ OK ] Started Daily apt download activities. [ OK ] Started Daily apt upgrade and clean activities. [ OK ] Reached target Timers. [ OK ] Started System Logging Service. [ OK ] Started Permit User Sessions. [ OK ] Started OpenBSD Secure Shell server. [ OK ] Started getty on tty2-tty6 if dbus and logind are not available. [ OK ] Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. [ OK ] Started Getty on tty6. [ OK ] Started Getty on tty5. [ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Started Serial Getty on ttyS0. [ OK ] Started Getty on tty1. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.17' (ECDSA) to the list of known hosts. 2020/07/11 10:25:23 fuzzer started 2020/07/11 10:25:23 dialing manager at 10.128.0.26:46521 2020/07/11 10:25:23 syscalls: 3164 2020/07/11 10:25:23 code coverage: enabled 2020/07/11 10:25:23 comparison tracing: enabled 2020/07/11 10:25:23 extra coverage: enabled 2020/07/11 10:25:23 setuid sandbox: enabled 2020/07/11 10:25:23 namespace sandbox: enabled 2020/07/11 10:25:23 Android sandbox: /sys/fs/selinux/policy does not exist 2020/07/11 10:25:23 fault injection: enabled 2020/07/11 10:25:23 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/07/11 10:25:23 net packet injection: enabled 2020/07/11 10:25:23 net device setup: enabled 2020/07/11 10:25:23 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/07/11 10:25:23 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/07/11 10:25:23 USB emulation: enabled 10:27:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000600)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x4c}}, 0x0) syzkaller login: [ 207.996173][ T6826] IPVS: ftp: loaded support on port[0] = 21 [ 208.138177][ T6826] chnl_net:caif_netlink_parms(): no params data found 10:27:53 executing program 1: clock_adjtime(0x8e17bd2d5ff2c3a4, 0x0) [ 208.222580][ T6826] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.230038][ T6826] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.239289][ T6826] device bridge_slave_0 entered promiscuous mode [ 208.248992][ T6826] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.257247][ T6826] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.265438][ T6826] device bridge_slave_1 entered promiscuous mode [ 208.295486][ T6826] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 208.307311][ T6826] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 208.344894][ T6826] team0: Port device team_slave_0 added [ 208.354378][ T6826] team0: Port device team_slave_1 added [ 208.382736][ T6826] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 208.389696][ T6826] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 208.430021][ T6826] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 208.451903][ T6826] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 208.458850][ T6826] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 208.473010][ T6980] IPVS: ftp: loaded support on port[0] = 21 [ 208.485958][ T6826] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 10:27:53 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x105082) mmap(&(0x7f0000009000/0xf000)=nil, 0xf000, 0x380010a, 0x100812, r0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e000003, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x2000002, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}], [{@appraise='appraise'}, {@context={'context', 0x3d, 'unconfined_u'}}]}}) write(r0, &(0x7f0000000000), 0x52698b21) [ 208.593733][ T6826] device hsr_slave_0 entered promiscuous mode [ 208.650704][ T6826] device hsr_slave_1 entered promiscuous mode [ 208.791789][ T7005] IPVS: ftp: loaded support on port[0] = 21 10:27:54 executing program 3: socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x11, &(0x7f0000000200)={0x3, {{0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x104) [ 209.072465][ T6980] chnl_net:caif_netlink_parms(): no params data found [ 209.163007][ T6826] netdevsim netdevsim0 netdevsim0: renamed from eth0 10:27:54 executing program 4: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x1c) write$binfmt_script(r0, 0x0, 0x0) [ 209.271067][ T6826] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 209.334930][ T7201] IPVS: ftp: loaded support on port[0] = 21 [ 209.350055][ T6826] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 209.393175][ T6826] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 209.463259][ T7005] chnl_net:caif_netlink_parms(): no params data found [ 209.582301][ T7262] IPVS: ftp: loaded support on port[0] = 21 [ 209.592307][ T6980] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.599451][ T6980] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.610141][ T6980] device bridge_slave_0 entered promiscuous mode 10:27:55 executing program 5: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000000c0)=""/190) [ 209.664318][ T6980] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.675493][ T6980] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.684395][ T6980] device bridge_slave_1 entered promiscuous mode [ 209.817779][ T6980] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 209.847252][ T6980] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 209.875479][ T7005] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.884682][ T7005] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.893592][ T7005] device bridge_slave_0 entered promiscuous mode [ 209.945877][ T7005] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.954162][ T7005] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.962736][ T7005] device bridge_slave_1 entered promiscuous mode [ 209.979240][ T6980] team0: Port device team_slave_0 added [ 209.986862][ T7345] IPVS: ftp: loaded support on port[0] = 21 [ 210.034837][ T6980] team0: Port device team_slave_1 added [ 210.046203][ T7005] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 210.113914][ T7005] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 210.134520][ T6826] 8021q: adding VLAN 0 to HW filter on device bond0 [ 210.189324][ T7005] team0: Port device team_slave_0 added [ 210.199681][ T6980] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 210.209267][ T6980] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 210.236262][ T6980] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 210.260489][ T7005] team0: Port device team_slave_1 added [ 210.266390][ T7201] chnl_net:caif_netlink_parms(): no params data found [ 210.293491][ T7262] chnl_net:caif_netlink_parms(): no params data found [ 210.305785][ T6980] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 210.313423][ T6980] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 210.339713][ T6980] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 210.393042][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 210.402721][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 210.422824][ T7005] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 210.429787][ T7005] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 210.456941][ T7005] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 210.556527][ T6980] device hsr_slave_0 entered promiscuous mode [ 210.610870][ T6980] device hsr_slave_1 entered promiscuous mode [ 210.680344][ T6980] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 210.688072][ T6980] Cannot create hsr debugfs directory [ 210.700109][ T7005] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 210.707922][ T7005] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 210.734308][ T7005] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 210.765656][ T6826] 8021q: adding VLAN 0 to HW filter on device team0 [ 210.904358][ T7005] device hsr_slave_0 entered promiscuous mode [ 210.963268][ T7005] device hsr_slave_1 entered promiscuous mode [ 211.011247][ T7005] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 211.018806][ T7005] Cannot create hsr debugfs directory [ 211.030455][ T7262] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.037518][ T7262] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.046000][ T7262] device bridge_slave_0 entered promiscuous mode [ 211.054689][ T7262] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.061829][ T7262] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.069816][ T7262] device bridge_slave_1 entered promiscuous mode [ 211.078101][ T2498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 211.087186][ T2498] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 211.098166][ T2498] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.105382][ T2498] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.166046][ T7262] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 211.178085][ T2498] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 211.202796][ T7201] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.209840][ T7201] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.218932][ T7201] device bridge_slave_0 entered promiscuous mode [ 211.228430][ T7201] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.236284][ T7201] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.244932][ T7201] device bridge_slave_1 entered promiscuous mode [ 211.253731][ T7262] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 211.335422][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 211.345727][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 211.356625][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.363736][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.403765][ T7262] team0: Port device team_slave_0 added [ 211.441610][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 211.464511][ T7262] team0: Port device team_slave_1 added [ 211.473590][ T7201] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 211.491298][ T7345] chnl_net:caif_netlink_parms(): no params data found [ 211.501070][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 211.514438][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 211.523051][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 211.535176][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 211.544164][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 211.556148][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 211.564834][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 211.586842][ T7201] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 211.614393][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 211.665702][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 211.678350][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 211.689195][ T7262] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 211.696926][ T7262] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 211.723739][ T7262] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 211.756260][ T7201] team0: Port device team_slave_0 added [ 211.765045][ T7201] team0: Port device team_slave_1 added [ 211.783227][ T7262] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 211.790403][ T7262] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 211.817911][ T7262] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 211.843003][ T6826] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 211.934250][ T7201] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 211.945350][ T7201] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 211.973022][ T7201] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 211.985264][ T6980] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 212.035368][ T6980] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 212.094053][ T6980] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 212.158046][ T6980] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 212.253619][ T7262] device hsr_slave_0 entered promiscuous mode [ 212.290768][ T7262] device hsr_slave_1 entered promiscuous mode [ 212.330299][ T7262] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 212.337863][ T7262] Cannot create hsr debugfs directory [ 212.344591][ T7201] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 212.351796][ T7201] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 212.377821][ T7201] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 212.400403][ T7345] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.407458][ T7345] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.417270][ T7345] device bridge_slave_0 entered promiscuous mode [ 212.427108][ T7345] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.435012][ T7345] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.443898][ T7345] device bridge_slave_1 entered promiscuous mode [ 212.509464][ T6826] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 212.519309][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 212.528598][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 212.623946][ T7201] device hsr_slave_0 entered promiscuous mode [ 212.680643][ T7201] device hsr_slave_1 entered promiscuous mode [ 212.721200][ T7201] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 212.728763][ T7201] Cannot create hsr debugfs directory [ 212.757090][ T7345] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 212.769682][ T7345] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 212.843664][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 212.852714][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 212.881691][ T7345] team0: Port device team_slave_0 added [ 212.891618][ T7345] team0: Port device team_slave_1 added [ 212.915726][ T7005] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 212.975069][ T7005] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 213.028122][ T7005] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 213.075103][ T7005] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 213.175645][ T7345] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 213.182937][ T7345] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 213.209407][ T7345] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 213.233665][ T7345] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 213.241240][ T7345] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 213.269369][ T7345] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 213.334265][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 213.344830][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 213.353873][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 213.361914][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 213.418879][ T6826] device veth0_vlan entered promiscuous mode [ 213.443470][ T7345] device hsr_slave_0 entered promiscuous mode [ 213.512107][ T7345] device hsr_slave_1 entered promiscuous mode [ 213.560661][ T7345] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 213.568226][ T7345] Cannot create hsr debugfs directory [ 213.611623][ T6826] device veth1_vlan entered promiscuous mode [ 213.618442][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 213.685623][ T7262] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 213.742672][ T7262] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 213.786683][ T7262] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 213.843495][ T7262] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 213.916607][ T6980] 8021q: adding VLAN 0 to HW filter on device bond0 [ 213.979222][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 213.989329][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 214.008766][ T6826] device veth0_macvtap entered promiscuous mode [ 214.026284][ T7201] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 214.105201][ T7201] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 214.153154][ T7201] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 214.219752][ T6980] 8021q: adding VLAN 0 to HW filter on device team0 [ 214.231770][ T6826] device veth1_macvtap entered promiscuous mode [ 214.241230][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 214.249189][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 214.258720][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 214.266730][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.275666][ T7201] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 214.340600][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 214.349296][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 214.361207][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.368293][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.405220][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 214.413969][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 214.423034][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 214.433300][ T2474] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.440438][ T2474] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.488374][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 214.502849][ T7005] 8021q: adding VLAN 0 to HW filter on device bond0 [ 214.538681][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 214.554911][ T6826] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 214.581189][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 214.589840][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 214.606020][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 214.614890][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.623471][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 214.634496][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 214.645399][ T6826] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 214.662711][ T7005] 8021q: adding VLAN 0 to HW filter on device team0 [ 214.671950][ T7345] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 214.733521][ T7345] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 214.783744][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 214.792950][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 214.801903][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 214.827757][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 214.837302][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 214.846584][ T7345] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 214.883165][ T7345] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 215.031392][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.039997][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.049588][ T7763] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.056727][ T7763] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.065136][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 215.074493][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 215.084070][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 215.218679][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.228382][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.246921][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.254055][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state 10:28:00 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f000000dfaa)="5500000018007f5300fe01b2a4a280930a60000000a84302910000002400090035000c00060000001900150004000000000000dc1338d54400009b84136ef75afb83de4411000500c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 215.274808][ T6980] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 215.297940][ T6980] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 215.355056][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 215.373421][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 215.388281][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 215.420582][ T8065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 215.429354][ T8065] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 215.447364][ T8065] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 215.492748][ T8087] netlink: 21 bytes leftover after parsing attributes in process `syz-executor.0'. [ 215.530584][ T7262] 8021q: adding VLAN 0 to HW filter on device bond0 10:28:00 executing program 0: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x0, 0x400000008d}, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38}, 0x0) socket$inet6(0xa, 0x2, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000480), 0xc, &(0x7f0000000500)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x183, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 215.555022][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 215.569827][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 215.579894][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 215.617601][ T6980] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 215.640530][ C1] hrtimer: interrupt took 29640 ns [ 215.720153][ T7201] 8021q: adding VLAN 0 to HW filter on device bond0 [ 215.745111][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 215.761118][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 10:28:01 executing program 0: memfd_create(&(0x7f0000000540)='/s\xcb\x9cF2\x1d\b\x00\xca\xdc[\x17\x8b\xb2\xf7W\xf0hW\xdd\xca\xc8k\xc0\xa5velindf\r(\x90\xe0\xe0\r\xa6R\xb4\xb8\xa1\x98\xb43\xa6,\xa6<\x13\xfe\x04\x00\x01\xbd\x96:\xe2\x13\x02\xfaw\xaa\xef\x96\xfbi\xf8\x00\bbQ\xd8gC\xb2-\xa1\x06\x00\x00\x00\xe93\xf2\xd6\x03\'\xaa(\x8f\xaf\f7\n\xcf\xaf\xd6\x1fK\xe0\xf3g\x81\xf3o$\x03\x89\xf7\xb6\xed\xd0\xd2\x18j\x8f\x9b\xd1\x8a\xda\\;\xb6\xf4\'y\x17?\xc5\x90\xcc\xe9\xdc\xa7\a\xe2J8x\xad/\xba\xb1mJ\x7f\xe4m\xe6T\xe9\x00\x00\x00\x00Y\x92$O_\xf6\xb6\x1ce\xd0R\xcf\x1c\xbd\x03\x9a\xca\xc1_\xfb\xd0n\xc0\xc6\x04\xa8\x9c\xf5\xa7\xde\xf8&5\xefD\x04\x160\xafy\x02\\\x15F\x0f\f:\xae\xabm\x8f\xaeh\x8c~8\x9f\xc8\xedO\x00\xbf\x1d\xb1\x84', 0x0) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4002) io_setup(0xb, &(0x7f0000000040)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) [ 215.852152][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 215.863324][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 215.872893][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 215.882936][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 215.892106][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.900033][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.911231][ T7262] 8021q: adding VLAN 0 to HW filter on device team0 [ 215.933259][ T7005] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 215.965879][ T7201] 8021q: adding VLAN 0 to HW filter on device team0 [ 215.986715][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 215.996494][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 216.010751][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.019440][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.030957][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.038019][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.047408][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 10:28:01 executing program 0: clone(0x1102900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x0, 0x1}}]}}, &(0x7f00000000c0)=""/242, 0x32, 0xf2, 0x8}, 0x20) [ 216.062172][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 216.076707][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 216.120457][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.129117][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.151393][ T7763] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.152629][ T8106] BPF:[1] ARRAY (anon) [ 216.158489][ T7763] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.171178][ T8107] BPF:[1] ARRAY (anon) [ 216.175345][ T8107] BPF:type_id=0 index_type_id=1 nr_elems=0 [ 216.188109][ T8106] BPF:type_id=0 index_type_id=1 nr_elems=0 [ 216.193329][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.195088][ T8107] BPF: [ 216.204776][ T8106] BPF: [ 216.207541][ T8106] BPF:Invalid elem 10:28:01 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a543) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r4, 0x0, 0xffffffffffffffff, 0x0) recvfrom(r3, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012584, 0x0, 0xfffffe53) splice(r0, 0x0, r2, 0x0, 0x8902d00, 0x0) [ 216.215199][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.218405][ T8106] BPF: [ 216.218405][ T8106] [ 216.228394][ T8107] BPF:Invalid elem [ 216.238830][ T8107] BPF: [ 216.238830][ T8107] [ 216.250932][ T7763] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.257994][ T7763] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.298048][ T6980] device veth0_vlan entered promiscuous mode [ 216.340766][ T8065] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 216.349923][ T8065] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 216.361919][ T8065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 216.370179][ T8065] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 216.382691][ T8065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 216.397127][ T8065] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 216.405408][ T8065] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 216.413936][ T8065] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 216.423924][ T8065] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 216.434829][ T8065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.444649][ T8065] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.453894][ T8065] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.461019][ T8065] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.468661][ T8065] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 216.477814][ T8065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 216.487151][ T8065] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 216.498428][ T8065] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 216.506494][ T8065] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 216.547077][ T7005] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 216.558727][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 216.568310][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 216.577165][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 216.586133][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 216.596590][ T6980] device veth1_vlan entered promiscuous mode [ 216.622801][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 216.632621][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 216.644250][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 216.653601][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 216.664816][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.676673][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 216.688263][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 216.704961][ T7262] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 216.721023][ T7262] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 216.755543][ T7345] 8021q: adding VLAN 0 to HW filter on device bond0 [ 216.767278][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 216.775573][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 216.784369][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 216.792951][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.801644][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 216.809922][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 216.846790][ T7201] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 216.864196][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 216.873776][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 216.891877][ T6980] device veth0_macvtap entered promiscuous mode [ 216.908149][ T7345] 8021q: adding VLAN 0 to HW filter on device team0 [ 216.917229][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 216.929777][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 216.939170][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 216.948090][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 216.956113][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 216.964352][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 216.971879][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 216.998552][ T6980] device veth1_macvtap entered promiscuous mode [ 217.024371][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.034469][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.044106][ T7763] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.051220][ T7763] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.059164][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 217.067982][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.077249][ T7763] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.084384][ T7763] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.094041][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 10:28:02 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x12, 0x83, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, [0xc]}, 0x40) [ 217.122674][ T7262] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 217.148963][ T8065] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 217.160126][ T8065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 217.170129][ T8065] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 217.199573][ T8065] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.250838][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 217.258781][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 217.276127][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 217.289022][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 217.305296][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 217.316890][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 217.325933][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 217.334607][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 217.344091][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 10:28:02 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1a) close(r0) clone(0x1102900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000002c0)=',\x00\t\xa3@\xb3\xc1\a\x95>\xe9m\x11\'\xcb\xc3\xccw\xd03d\xabP\xe5]\xf1\x10z\x95Y^D\x15\x11vQ\xb92\xceO\xfe\xfe\x98 -r@\x83in~h\xf7cfx\x1a\xed\x93N/\xe7@\x04\xbf\xad\xecI\xcc\x01z\xb4\xbe\xbc\xf5\x88\xddO\x9e\x9e\xd5x\x18W\x12\xda\\?K\x15C(\xd2X\x83\xaeT\x02\xf2\xe2f\xc9O\xcbE\x87>@\x97\xa8H\x87\xf9\x87\x8b\x0f;\x1e\x83X|\xb9\xcd\xcb\xf4c?pWY\xe8\x1a\x19\"9\xbfC[k)\xe2J\xec\xca\xef\x04T\xfe\xb5\'\xfe\xfb\xf1\xbd\xb9R3=\x99!@f\xfd\x98`\x9d\xc4\xbaK @\xa6\x03\x00Ed\xc8\x95\xe5s\xcd\xd2f;\xd4\xee\x80\x1e\x8b\xa5%\x18\xb3\xc8\xef\x85\xf0\xbe\x1d\x99&%f\x1f]\xb2\xfd}\x05\xc2\x19\x85\x1f \xce\x18`\x04\xdd\xd4Xo\x10b\x8c\v\xd4\xb0s\xeek\x1b7\x8a\x1bq\xb4\x10\\g\x18\xb9\xa4\xb3L\xa8S\x80z\x97\xe2\x19\xc4\a>\xc67RPPrP\xd8\x15O\xda\x8d\x18@\xe3\xb8\xc1:\t\xc2!\x13\xd1v\xe5\x15%\x9a\xa4\xf1\xd6]\xdf\x0e\x15\xdc\xe2\x9a\f\xd2\x9a\x10\x92\x0e\xdd) \x11\xd2\x88\xba\x9b\xebj\xa0\xd0\xce1\xd1\xa5\x8b;\v,\xad\xe3kB\v\xd1\x1b\x9eb\xa3\xec.\xab\x9d\x81\x93I\xcf\xc9\xa3\xab\x8dGP\v\x1c\x87\x9c \xa9W\xa1[\xdf\xfcI*\xc2\x8f\xfc(', &(0x7f0000000040)='}\x00'], 0x0) [ 217.354469][ T7005] device veth0_vlan entered promiscuous mode [ 217.368208][ T6980] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 217.381247][ T6980] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 217.402214][ T6980] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 217.440445][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 217.449104][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 217.473810][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 217.482922][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 217.492899][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 217.502211][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 217.519524][ T7201] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 217.564226][ T6980] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 217.585483][ T6980] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 217.597989][ T6980] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 217.614014][ T7345] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 217.631438][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 217.640092][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 217.685052][ T7005] device veth1_vlan entered promiscuous mode [ 217.765104][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 217.773545][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 217.783797][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 217.792930][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 217.802010][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 217.930334][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 217.938797][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 217.947758][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 10:28:03 executing program 1: clone(0x1102900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x15, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}]}}, &(0x7f0000000300)=""/250, 0x2e, 0xfa, 0x8}, 0x20) [ 217.977064][ T7262] device veth0_vlan entered promiscuous mode [ 217.996694][ T7345] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 218.017811][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 218.035587][ T8140] BPF:Total section length too long [ 218.042711][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 218.065853][ T7262] device veth1_vlan entered promiscuous mode [ 218.097807][ T7201] device veth0_vlan entered promiscuous mode [ 218.114732][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 218.129866][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 218.151746][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 218.159847][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 218.186693][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 218.214530][ T7201] device veth1_vlan entered promiscuous mode [ 218.231485][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 218.239747][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 218.250973][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 218.258715][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 218.267921][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 218.277652][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 218.290074][ T7005] device veth0_macvtap entered promiscuous mode [ 218.319969][ T7005] device veth1_macvtap entered promiscuous mode [ 218.347566][ T7262] device veth0_macvtap entered promiscuous mode [ 218.364949][ T7262] device veth1_macvtap entered promiscuous mode [ 218.378862][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 218.388925][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 218.398084][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 218.406649][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 218.415581][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 218.424800][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 218.434688][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 218.478541][ T7262] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 218.489549][ T7262] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 218.501257][ T7262] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 218.512629][ T7262] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 218.524614][ T7262] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 218.538330][ T7005] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 218.550130][ T7005] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 218.561759][ T7005] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 218.572591][ T7005] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 218.586047][ T7005] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 218.601408][ T7005] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 218.612612][ T7005] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 218.623283][ T2498] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 218.632996][ T2498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 218.642003][ T2498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 218.651151][ T2498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 218.659701][ T2498] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 218.668854][ T2498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 218.681710][ T7262] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 218.696498][ T7262] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 218.706969][ T7262] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 218.717971][ T7262] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 218.729679][ T7262] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 218.740685][ T7005] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 218.752640][ T7005] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 218.763793][ T7005] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 218.774274][ T7005] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 218.784144][ T7005] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 218.794635][ T7005] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 218.807941][ T7005] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 218.819934][ T2498] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 218.828840][ T2498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 218.838287][ T2498] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 218.847040][ T2498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 218.855799][ T2498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 218.864690][ T2498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 218.884252][ T7201] device veth0_macvtap entered promiscuous mode [ 218.924732][ T7201] device veth1_macvtap entered promiscuous mode [ 218.984315][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 218.994793][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 219.004414][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 219.013185][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 219.026274][ T7345] device veth0_vlan entered promiscuous mode [ 219.094246][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 219.101939][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 219.116196][ T7345] device veth1_vlan entered promiscuous mode [ 219.327112][ T7201] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 219.351333][ T7201] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.369826][ T7201] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 219.387568][ T7201] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.425607][ T7201] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 219.443810][ T7201] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.458236][ T7201] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 219.472700][ T7201] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.484888][ T7201] batman_adv: batadv0: Interface activated: batadv_slave_0 10:28:04 executing program 2: socket$inet6(0xa, 0x0, 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000002c0)) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000080)={0x0, 0x0, [0x6]}) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) [ 219.572395][ T7345] device veth0_macvtap entered promiscuous mode [ 219.600665][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 219.609422][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 219.626755][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 219.637506][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 219.649737][ T7201] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 219.666483][ T7201] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.687026][ T8166] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 219.706388][ T7201] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 219.735222][ T7201] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.746761][ T7201] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 219.758078][ T7201] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.788380][ T7201] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 219.823301][ T7201] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.882100][ T7201] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 219.903395][ T7345] device veth1_macvtap entered promiscuous mode [ 219.915106][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 219.929275][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 219.939370][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 219.951917][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 220.002046][ T7345] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 220.013427][ T7345] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 220.025972][ T7345] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 220.037632][ T7345] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 220.048551][ T7345] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 220.059745][ T7345] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 220.070671][ T7345] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 220.081826][ T7345] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 220.094129][ T7345] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 220.105821][ T7345] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 220.119117][ T7345] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 220.230035][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 220.243628][ T8083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 220.255754][ T7345] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 220.267077][ T7345] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 220.277534][ T7345] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 220.288588][ T7345] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 220.298461][ T7345] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 220.309144][ T7345] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 220.321024][ T7345] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 220.331935][ T7345] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 220.341813][ T7345] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 220.352542][ T7345] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 220.364086][ T7345] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 220.437206][ T8065] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 220.446598][ T8065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 10:28:05 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r2, 0x48280) fcntl$setstatus(r1, 0x4, 0x6100) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) write(r1, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff75947b197090f1a00ba4bc31b20690000d2ac8c4153d039ac08a29508aad3fcffffffffffffffd0c4c2f912686d575c35ed5d7142f96f", 0xfffffffffffffe83) ftruncate(r0, 0x200004) r4 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r4, r4, 0x0, 0x8080fffffffe) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 10:28:05 executing program 0: socket$inet6(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @private2}}) 10:28:06 executing program 5: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f4, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @private2}}) 10:28:06 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r0, 0x2007ff9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x4ea00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x143042, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x40080ffff) 10:28:06 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x1262, 0x0) 10:28:06 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f000000dfaa)="5500000018007f5300fe01b2a4a280930a60000000a84302910000003900050035000c00060000001900150004000000000000dc1338d54400009b84136ef75afb83de4411000500c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 10:28:06 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f000000dfaa)="5500000018007f5300fe01b2a4a280930a60000000a84302910000003900090035000c0006003c011900150004000000000000dc1338d54400009b84136ef75afb83de4411000500c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 10:28:06 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x12, 0x83, 0x4, 0x8}, 0x40) 10:28:06 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x275a, 0x0) write$FUSE_ENTRY(r0, &(0x7f0000000280)={0x90}, 0x90) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000af"]) 10:28:06 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, r0, &(0x7f0000000240), 0x0) exit_group(0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000000), 0xc) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x20400, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000011c0), 0x1000) writev(0xffffffffffffffff, &(0x7f0000fb1000)=[{0x0}], 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000007580), 0x0, 0x0, 0x0) ioctl$TIOCL_SCROLLCONSOLE(0xffffffffffffffff, 0x541c, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x12, 0x83, 0x4, 0x8}, 0x40) bpf$BPF_GET_MAP_INFO(0x4, &(0x7f00000000c0)={r1, 0x28, &(0x7f00000003c0)}, 0x10) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f0000000280)={0x0, 0xfb, 0x42, 0x0, 0x0, "2e3366eb697eb9a934b1ca8490b29756", "eea8ebc54db38aca669c738802f3621e71b10164dfa8ff1b590dfb90d5f372c7aa2a1b6d4122ed3e440ec8b775"}, 0x42, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) [ 221.365194][ T28] audit: type=1800 audit(1594463286.696:2): pid=8218 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="memory.events" dev="sda1" ino=15773 res=0 [ 221.393444][ T8218] syz-executor.1 (8218) used greatest stack depth: 23752 bytes left 10:28:06 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendfile(r0, r0, &(0x7f0000000240), 0x4) exit_group(0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000200)=0x1000, 0x4) r1 = openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x20400, 0x0) read$FUSE(r1, &(0x7f00000011c0), 0x1000) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000fb1000)=[{&(0x7f0000000180)="480000001400197f09004b0101048c590a88ffffff010001000000000028213ee20600d4ff5bffff00c7e5ed5e00000000000000000000eaf60d18125d4b18857a9eace3dbe8b12c", 0x48}], 0x1) recvmmsg(r2, &(0x7f0000007580)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fstat(r2, &(0x7f0000000080)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000080)={0xa, 0x8000002, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x1000000000000003, 0x0) ioctl$TIOCL_SCROLLCONSOLE(0xffffffffffffffff, 0x541c, &(0x7f0000000000)={0xd, 0x4}) socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r4) 10:28:06 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0xdba3dd835d632dde}, 0x48) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000180)={r0}, 0x10) [ 221.496463][ T28] audit: type=1800 audit(1594463286.726:3): pid=8213 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=15774 res=0 10:28:06 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r2, 0x48280) fcntl$setstatus(r1, 0x4, 0x6100) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) write(r1, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff75947b197090f1a00ba4bc31b20690000d2ac8c4153d039ac08a29508aad3fcffffffffffffffd0c4c2f912686d575c35ed5d7142f96f", 0xfffffffffffffe83) ftruncate(r0, 0x200004) r4 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r4, r4, 0x0, 0x8080fffffffe) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 10:28:06 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f000000dfaa)="5500000018007f5300fe01b2a4a280930a60000000a84302910000003900090035000c00140000001900150004000000000000dc1338d54400009b84136ef75afb83de4411000500c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 10:28:06 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x12, 0x83, 0x4, 0x8}, 0x40) bpf$BPF_GET_MAP_INFO(0x4, &(0x7f00000000c0)={r0, 0x0, 0x0}, 0x10) 10:28:06 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x12, 0x83, 0x4, 0x8}, 0x40) 10:28:07 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendfile(r0, r0, &(0x7f0000000240), 0x4) exit_group(0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000200)=0x1000, 0x4) r1 = openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x20400, 0x0) read$FUSE(r1, &(0x7f00000011c0), 0x1000) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000fb1000)=[{&(0x7f0000000180)="480000001400197f09004b0101048c590a88ffffff010001000000000028213ee20600d4ff5bffff00c7e5ed5e00000000000000000000eaf60d18125d4b18857a9eace3dbe8b12c", 0x48}], 0x1) recvmmsg(r2, &(0x7f0000007580)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fstat(r2, &(0x7f0000000080)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000080)={0xa, 0x8000002, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x1000000000000003, 0x0) ioctl$TIOCL_SCROLLCONSOLE(0xffffffffffffffff, 0x541c, &(0x7f0000000000)={0xd, 0x4}) socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r4) 10:28:07 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0xc01812f4, 0x0) [ 221.772537][ T8250] IPv6: NLM_F_REPLACE set, but no existing node found! 10:28:07 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r0, 0x2007ff9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x4ea00) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x143042, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0xffffff11) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x40080ffff) 10:28:07 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a543) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x0, 0x40) openat$bsg(0xffffff9c, &(0x7f00000001c0)='/dev/bsg\x00', 0x0, 0x0) getpeername$unix(0xffffffffffffffff, 0x0, &(0x7f0000000200)) socket$inet6(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, 0xffffffffffffffff) recvfrom(r3, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012584, 0x0, 0xfffffe53) splice(r0, 0x0, r2, 0x0, 0x8900000, 0x0) 10:28:07 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendfile(r0, r0, &(0x7f0000000240), 0x4) exit_group(0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000200)=0x1000, 0x4) r1 = openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x20400, 0x0) read$FUSE(r1, &(0x7f00000011c0), 0x1000) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000fb1000)=[{&(0x7f0000000180)="480000001400197f09004b0101048c590a88ffffff010001000000000028213ee20600d4ff5bffff00c7e5ed5e00000000000000000000eaf60d18125d4b18857a9eace3dbe8b12c", 0x48}], 0x1) recvmmsg(r2, &(0x7f0000007580)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fstat(r2, &(0x7f0000000080)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000080)={0xa, 0x8000002, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x1000000000000003, 0x0) ioctl$TIOCL_SCROLLCONSOLE(0xffffffffffffffff, 0x541c, &(0x7f0000000000)={0xd, 0x4}) socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r4) 10:28:07 executing program 2: r0 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000000)="03", 0x1, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)=@keyring={'key_or_keyring:'}) 10:28:07 executing program 0: r0 = fanotify_init(0x0, 0x0) ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f0000000080)={0x0, 0x989680}, 0x0, 0x0) 10:28:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) [ 222.288771][ T28] audit: type=1800 audit(1594463287.616:4): pid=8277 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="memory.events" dev="sda1" ino=15781 res=0 [ 222.378216][ T28] audit: type=1800 audit(1594463287.656:5): pid=8266 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=15786 res=0 [ 222.506469][ T28] audit: type=1800 audit(1594463287.656:6): pid=8278 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=15786 res=0 10:28:07 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x1263, &(0x7f0000000140)) 10:28:07 executing program 4: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0x10, 0x0, 0x0) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46000) io_setup(0x2349, &(0x7f0000000240)=0x0) io_submit(r1, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 10:28:07 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendfile(r0, r0, &(0x7f0000000240), 0x4) exit_group(0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000200)=0x1000, 0x4) r1 = openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x20400, 0x0) read$FUSE(r1, &(0x7f00000011c0), 0x1000) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000fb1000)=[{&(0x7f0000000180)="480000001400197f09004b0101048c590a88ffffff010001000000000028213ee20600d4ff5bffff00c7e5ed5e00000000000000000000eaf60d18125d4b18857a9eace3dbe8b12c", 0x48}], 0x1) recvmmsg(r2, &(0x7f0000007580)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fstat(r2, &(0x7f0000000080)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000080)={0xa, 0x8000002, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x1000000000000003, 0x0) ioctl$TIOCL_SCROLLCONSOLE(0xffffffffffffffff, 0x541c, &(0x7f0000000000)={0xd, 0x4}) socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r4) 10:28:07 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x275a, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000000000afd56a6bd6a51f4184c546216d689806dd8b1f68"]) 10:28:07 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f000000dfaa)="5500000018007f5300fe01b2a4a280930a60000000a84302910000003900090035000c00060000071900150004000000000000dc1338d54400009b84136ef75afb83de4411000500c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 10:28:08 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r0, 0x2007ff9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x4ea00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000100)='/s\xcb2\x1d\b\x00\xe8\xdc[\x17\x8b\xb2\xf7W\xf0hW\xdd\xbd\xc8k\xc0\xa5velindf\r(\x90\xe0\xe0\r\xa6R\xb4\xb8\xa1\x98\xb43\xa7,\xa6<\x13\xfe\xa8\xc3\x01\xbd\x96:\xe2\x13\x02\xfaw\xaa\xef\x96\xfbi\xf8\x00\bbQ\xd8gC\xb2-\xa1s\xeb\x0f\x8e\xe93\xf2\xd6\x03\'\xb0(\x8f\xaf\f7\n$\x03\x89\xf7\xb6\xcd\xd0\xd2\x86i\xb6o\x9e\x1e\xad\x18j\x8f\x9b\xd1\x8a\xda\\;\xb6\xf4\'y\x1f?\xc5\x90\xcc\xe9\xdc\xa7\a\xe2J', 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000380)={'batadv0\x00', 0xc08e}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x40080ffff) 10:28:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x1c, 0x0, 0x1, 0x201, 0x0, 0x0, {}, [@CTA_ZONE={0x6}]}, 0x1c}}, 0x0) 10:28:08 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$procfs(0xffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) connect$caif(r0, &(0x7f0000000300)=@dbg={0x25, 0xfe, 0x5}, 0x18) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000003c0)}, 0x9000, 0x0, 0x0, 0x1, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NLBL_UNLABEL_C_LIST(0xffffffffffffffff, 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, 0x0, 0x4) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x183, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) 10:28:08 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) unlink(&(0x7f00000019c0)='./file0\x00') write$9p(r0, &(0x7f0000000200)=';', 0x1) 10:28:08 executing program 3: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x8d, 0x400000008d}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x183, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 10:28:08 executing program 4: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f000000dfaa)="5500000018007f5300fe01b2a4a280930a60000000a84302910000001e00090035000c00060000001900150004000000000000dc1338d54400009b84136ef75afb83de4411000500c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 10:28:08 executing program 0: r0 = socket(0x1000000010, 0x80002, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f00000000c0)=0x1, 0x4) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="2c000000240001"], 0x2c}, 0x8}, 0x0) [ 222.975296][ T8308] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. 10:28:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x1c, 0x1, 0x1, 0x301, 0x0, 0x0, {}, [@CTA_MARK={0x8}]}, 0x1c}}, 0x0) [ 223.019941][ T8311] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 10:28:08 executing program 5: socket$inet6(0x10, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x15) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, 0x0) setxattr$trusted_overlay_upper(0x0, &(0x7f0000000440)='trusted.overlay.upper\x00', &(0x7f0000000340)=ANY=[@ANYBLOB], 0x58, 0x3) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000915}, 0x80) sendmsg(0xffffffffffffffff, &(0x7f0000000040), 0x881) [ 223.084288][ T8319] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 10:28:08 executing program 4: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f000000dfaa)="5500000018007f5300fe01b2a4a280930a60000000a84302910000002100090035000c00060000001900150004000000000000dc1338d54400009b84136ef75afb83de4411000500c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 10:28:08 executing program 0: clone(0x1102900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2}]}}, &(0x7f0000000300)=""/250, 0x2a, 0xfa, 0x8}, 0x20) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 223.335497][ T8332] netlink: 21 bytes leftover after parsing attributes in process `syz-executor.4'. 10:28:08 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f000000dfaa)="5500000018007f5300fe01b2a4a280930a60000000a84302910000003900090035003900060000001900150004000000000000dc1338d54400009b84136ef75afb83de4411000500c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 223.402293][ T8336] BPF:[1] INT [ 223.416824][ T28] audit: type=1800 audit(1594463288.746:7): pid=8301 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=15790 res=0 [ 223.420253][ T8336] BPF:size=0 bits_offset=6 nr_bits=0 encoding=CHAR [ 223.445319][ T8341] BPF:[1] INT [ 223.448798][ T8341] BPF:size=0 bits_offset=6 nr_bits=0 encoding=CHAR 10:28:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) sendmmsg(r0, &(0x7f0000007500)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[{0xc, 0x1, 0x2}], 0xc}}], 0x1, 0x0) 10:28:08 executing program 2: sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4188aea7, &(0x7f0000000080)) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) [ 223.484508][ T8341] BPF: [ 223.489124][ T8341] BPF:nr_bits exceeds type_size [ 223.501459][ T8336] BPF: [ 223.505426][ T8341] BPF: [ 223.505426][ T8341] [ 223.515023][ T8336] BPF:nr_bits exceeds type_size 10:28:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)={0x28, 0xc, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) 10:28:08 executing program 0: clone(0x1102900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2}]}}, &(0x7f0000000300)=""/250, 0x2a, 0xfa, 0x8}, 0x20) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 223.532624][ T8336] BPF: [ 223.532624][ T8336] 10:28:08 executing program 3: r0 = memfd_create(&(0x7f0000000540)='/s\xcb\x9cF2\x1d\b\x00\xca\xdc[\x17\x8b\xb2\xf7W\xf0hW\xdd\xca\xc8k\xc0\xa5velindf\r(\x90\xe0\xe0\r\xa6R\xb4\xb8\xa1\x98\xb43\xa6,\xa6<\x13\xfe\x04\x00\x01\xbd\x96:\xe2\x13\x02\xfaw\xaa\xef\x96\xfbi\xf8\x00\bbQ\xd8gC\xb2-\xa1\x06\x00\x00\x00\xe93\xf2\xd6\x03\'\xaa(\x8f\xaf\f7\n\xcf\xaf\xd6\x1fK\xe0\xf3g\x81\xf3o$\x03\x89\xf7\xb6\xed\xd0\xd2\x18j\x8f\x9b\xd1\x8a\xda\\;\xb6\xf4\'y\x17?\xc5\x90\xcc\xe9\xdc\xa7\a\xe2J8x\xad/\xba\xb1mJ\x7f\xe4m\xe6T\xe9\x00\x00\x00\x00Y\x92$O_\xf6\xb6\x1ce\xd0R\xcf\x1c\xbd\x03\x9a\xca\xc1_\xfb\xd0n\xc0\xc6\x04\xa8\x9c\xf5\xa7\xde\xf8&5\xefD\x04\x160\xafy\x02\\\x15F\x0f\f:\xae\xabm\x8f\xaeh\x8c~8\x9f\xc8\xedO\x00\xbf\x1d\xb1\x84', 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000380)=ANY=[@ANYBLOB="f30700000000000001f0ffffffffffff"]) 10:28:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x21112, r0, 0x0) 10:28:09 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x800812a0, &(0x7f0000000140)) 10:28:09 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x31, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000}, 0x20) [ 223.675106][ T8362] BPF:[1] INT [ 223.691516][ T8362] BPF:size=0 bits_offset=6 nr_bits=0 encoding=CHAR 10:28:09 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000180)=0x7fffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001c80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/37, 0x25}}], 0x1, 0x0, 0x0) 10:28:09 executing program 2: sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4188aea7, &(0x7f0000000080)) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) [ 223.735688][ T8362] BPF: [ 223.744644][ T8362] BPF:nr_bits exceeds type_size [ 223.763357][ T8362] BPF: [ 223.763357][ T8362] 10:28:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TYPE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0xd, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x5}]}, 0x1c}}, 0x0) 10:28:09 executing program 0: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) mmap(&(0x7f00008da000/0x1000)=nil, 0x1000, 0x0, 0xb5972, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46000) io_setup(0x2349, &(0x7f0000000240)=0x0) io_submit(r1, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 10:28:09 executing program 4: futex(&(0x7f0000000200), 0x8b, 0x80000, 0x0, 0x0, 0x0) [ 223.834471][ T8375] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 10:28:09 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_int(r0, 0x1, 0x24, &(0x7f0000000000)=0x8, 0x4) 10:28:09 executing program 2: sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4188aea7, &(0x7f0000000080)) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) 10:28:09 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x500, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 10:28:09 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000500)={&(0x7f0000002100)={0x18, 0x0, 0x200, 0x70bd2a, 0x0, {}, [@NL80211_ATTR_IE_RIC={0x4}]}, 0x18}}, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) openat$procfs(0xffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x183, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:28:09 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000340)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86\x06\x00\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa9\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\x02j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x02\x00\x00\x00\x00\x00\x00\x00_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2\x03\x00\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU=.\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\xe4u\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf1J\xd9\x13Q\x94R/\xdf\x1e\x9e\xe57\xda{\xe1D\x00\x00\x00\x00H\xe6\x0f\xe0]\xef\x8b\xcdk\xfe\xf6\xcc+rp\xd5\b~\xf6\xa2\x87\xed<\xc2bO\x88\x03n% \xaf\x86\xc9@\x92>\xd9\xc8f\x8d\x16BBX\xa7x`\xc1\x94ZR\x9e\xf7\x9aQeh\xbe\xe7O\x0e\x9c7\xff\x1c,\xe9l+g\xe617s\xcf+#\x04\xcdhml\x8e\xfa\xa5\xcd.(\r1\x9c\x9b\xe7\xc4\xcb\\\xa7\xf7b\xa5\x9f\x87\xb9 Y\av\x06<\x9c2\xd5#\xe5\xa5\xea\x10\x94\x8e7D%\xbdQ\xd0\xb3~^%\xa8\xcc\xd5z7\xe3|\x8f\xcb\xe1\xa5@\xce;\xf2,', 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0xffffffffffffffff) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = gettid() tkill(r2, 0x1000000000016) fanotify_init(0x0, 0x0) 10:28:09 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f000000dfaa)="5500000018007f5300fe01b2a4a280930a60000000a84302910000003900090035080c00060000001900150004000000000000dc1338d54400009b84136ef75afb83de4411000500c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 10:28:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x2a, 0x0, &(0x7f0000000180)=0x700) 10:28:09 executing program 2: sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4188aea7, &(0x7f0000000080)) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) 10:28:09 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r2, 0x48280) fcntl$setstatus(r1, 0x4, 0x6100) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) write(r1, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff75947b197090f1a00ba4bc31b20690000d2ac8c4153d039ac08a29508aad3fcffffffffffffffd0c4c2f912686d575c35ed5d7142f96f", 0xfffffffffffffe83) ftruncate(r0, 0x200004) r4 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r4, r4, 0x0, 0x8080fffffffe) 10:28:09 executing program 5: clone(0x1102900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x1, 0x3) write$binfmt_misc(0xffffffffffffffff, 0x0, 0xfffffecc) [ 224.206281][ T8406] ERROR: Domain ' /sbin/init /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.4 proc:/self/fd/3' not defined. 10:28:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000001c40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=[{0xc, 0x1}], 0xc}}], 0x2, 0x0) 10:28:09 executing program 2: sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4188aea7, &(0x7f0000000080)) 10:28:09 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f00000000c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 10:28:09 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000340)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86\x06\x00\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa9\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\x02j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x02\x00\x00\x00\x00\x00\x00\x00_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2\x03\x00\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU=.\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\xe4u\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf1J\xd9\x13Q\x94R/\xdf\x1e\x9e\xe57\xda{\xe1D\x00\x00\x00\x00H\xe6\x0f\xe0]\xef\x8b\xcdk\xfe\xf6\xcc+rp\xd5\b~\xf6\xa2\x87\xed<\xc2bO\x88\x03n% \xaf\x86\xc9@\x92>\xd9\xc8f\x8d\x16BBX\xa7x`\xc1\x94ZR\x9e\xf7\x9aQeh\xbe\xe7O\x0e\x9c7\xff\x1c,\xe9l+g\xe617s\xcf+#\x04\xcdhml\x8e\xfa\xa5\xcd.(\r1\x9c\x9b\xe7\xc4\xcb\\\xa7\xf7b\xa5\x9f\x87\xb9 Y\av\x06<\x9c2\xd5#\xe5\xa5\xea\x10\x94\x8e7D%\xbdQ\xd0\xb3~^%\xa8\xcc\xd5z7\xe3|\x8f\xcb\xe1\xa5@\xce;\xf2,', 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0xffffffffffffffff) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = gettid() tkill(r2, 0x1000000000016) fanotify_init(0x0, 0x0) 10:28:09 executing program 5: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @private2}}) [ 224.483233][ T8065] ------------[ cut here ]------------ [ 224.488853][ T8065] WARNING: CPU: 1 PID: 8065 at fs/read_write.c:427 __kernel_read+0x41d/0x4d0 [ 224.563264][ T8065] Kernel panic - not syncing: panic_on_warn set ... [ 224.569915][ T8065] CPU: 1 PID: 8065 Comm: kworker/1:4 Not tainted 5.8.0-rc4-syzkaller #0 [ 224.578231][ T8065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 224.588292][ T8065] Workqueue: events p9_read_work [ 224.593249][ T8065] Call Trace: [ 224.596542][ T8065] dump_stack+0x18f/0x20d [ 224.600892][ T8065] panic+0x2e3/0x75c [ 224.604818][ T8065] ? __warn_printk+0xf3/0xf3 [ 224.610099][ T8065] ? printk+0xba/0xed [ 224.614071][ T8065] ? log_store.cold+0x16/0x16 [ 224.618738][ T8065] ? __warn.cold+0x5/0x45 [ 224.623059][ T8065] ? __warn+0xd6/0x1f2 [ 224.627119][ T8065] ? __kernel_read+0x41d/0x4d0 [ 224.631874][ T8065] __warn.cold+0x20/0x45 [ 224.636110][ T8065] ? __kernel_read+0x41d/0x4d0 [ 224.640866][ T8065] report_bug+0x1bd/0x210 [ 224.645194][ T8065] handle_bug+0x38/0x90 [ 224.649341][ T8065] ? fsnotify_first_mark+0x1f0/0x1f0 [ 224.654615][ T8065] exc_invalid_op+0x13/0x40 [ 224.659110][ T8065] asm_exc_invalid_op+0x12/0x20 [ 224.663952][ T8065] RIP: 0010:__kernel_read+0x41d/0x4d0 [ 224.669311][ T8065] Code: fd ff ff e8 75 19 b6 ff 45 31 c9 45 31 c0 b9 01 00 00 00 4c 89 f2 89 ee 4c 89 ef e8 5d 22 12 00 e9 46 ff ff ff e8 53 19 b6 ff <0f> 0b 49 c7 c4 ea ff ff ff e9 11 fe ff ff 4c 89 f7 e8 2d 76 f5 ff [ 224.688907][ T8065] RSP: 0018:ffffc90016c77bc8 EFLAGS: 00010293 [ 224.694962][ T8065] RAX: 0000000000000000 RBX: ffff888094ff55c0 RCX: ffffffff81bd9ac4 [ 224.702924][ T8065] RDX: ffff888097f30480 RSI: ffffffff81bd9e3d RDI: 0000000000000005 [ 224.710891][ T8065] RBP: ffff8880925c4c60 R08: 0000000000000000 R09: 0000000000000000 [ 224.718863][ T8065] R10: 0000000000000000 R11: 0000000000000000 R12: 00000000081d801e [ 224.726827][ T8065] R13: ffffc90016c77c98 R14: ffff888094ff5644 R15: 0000000000000007 [ 224.734804][ T8065] ? __kernel_read+0xa4/0x4d0 [ 224.739470][ T8065] ? __kernel_read+0x41d/0x4d0 [ 224.744228][ T8065] ? __kernel_read+0x41d/0x4d0 [ 224.748986][ T8065] kernel_read+0x52/0x70 [ 224.753228][ T8065] p9_read_work+0x2ac/0xff0 [ 224.757725][ T8065] ? do_raw_spin_lock+0x120/0x2b0 [ 224.762740][ T8065] ? p9_fd_request+0x330/0x330 [ 224.767522][ T8065] ? _raw_spin_unlock_irq+0x1f/0x80 [ 224.772759][ T8065] ? lock_is_held_type+0xb0/0xe0 [ 224.777694][ T8065] process_one_work+0x94c/0x1670 [ 224.782632][ T8065] ? lock_release+0x8d0/0x8d0 [ 224.787300][ T8065] ? pwq_dec_nr_in_flight+0x2d0/0x2d0 [ 224.792668][ T8065] ? rwlock_bug.part.0+0x90/0x90 [ 224.797624][ T8065] ? lockdep_hardirqs_off+0x66/0xa0 [ 224.802821][ T8065] worker_thread+0x64c/0x1120 [ 224.807496][ T8065] ? __kthread_parkme+0x13f/0x1e0 [ 224.812512][ T8065] ? process_one_work+0x1670/0x1670 [ 224.817700][ T8065] kthread+0x3b5/0x4a0 [ 224.821760][ T8065] ? __kthread_bind_mask+0xc0/0xc0 [ 224.826868][ T8065] ? __kthread_bind_mask+0xc0/0xc0 [ 224.831979][ T8065] ret_from_fork+0x1f/0x30 [ 224.837698][ T8065] Kernel Offset: disabled [ 224.842078][ T8065] Rebooting in 86400 seconds..