Warning: Permanently added '10.128.1.51' (ECDSA) to the list of known hosts. 2020/05/22 23:05:05 fuzzer started 2020/05/22 23:05:06 dialing manager at 10.128.0.105:38353 2020/05/22 23:05:06 syscalls: 3055 2020/05/22 23:05:06 code coverage: enabled 2020/05/22 23:05:06 comparison tracing: enabled 2020/05/22 23:05:06 extra coverage: enabled 2020/05/22 23:05:06 setuid sandbox: enabled 2020/05/22 23:05:06 namespace sandbox: enabled 2020/05/22 23:05:06 Android sandbox: /sys/fs/selinux/policy does not exist 2020/05/22 23:05:06 fault injection: enabled 2020/05/22 23:05:06 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/05/22 23:05:06 net packet injection: enabled 2020/05/22 23:05:06 net device setup: enabled 2020/05/22 23:05:06 concurrency sanitizer: enabled 2020/05/22 23:05:06 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/05/22 23:05:06 USB emulation: enabled syzkaller login: [ 49.203988][ T8916] KCSAN: could not find function: '_find_next_bit' 2020/05/22 23:05:10 adding functions to KCSAN blacklist: 'kcm_rfree' 'mod_timer' 'do_nanosleep' 'find_get_pages_range_tag' 'find_alive_thread' 'xas_clear_mark' 'copy_process' 'ext4_mark_iloc_dirty' 'generic_file_read_iter' 'ktime_get_real_seconds' '__ext4_new_inode' 'dd_has_work' '_find_next_bit' 'blk_mq_sched_dispatch_requests' 'shmem_file_read_iter' 'blk_mq_dispatch_rq_list' 'add_timer' 'generic_write_end' 'do_signal_stop' 'page_counter_charge' 'echo_char' 'ep_poll' 'ext4_free_inodes_count' 'pcpu_alloc' 'tick_nohz_idle_stop_tick' '__process_echoes' 'lruvec_lru_size' 'tick_sched_do_timer' 'generic_fillattr' '__add_to_page_cache_locked' '__snd_rawmidi_transmit_ack' 'run_timer_softirq' 'kauditd_thread' 'n_tty_receive_buf_common' 23:08:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0xfffffefc) getpgid(0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfea7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) [ 276.669716][ T8919] IPVS: ftp: loaded support on port[0] = 21 [ 276.745323][ T8919] chnl_net:caif_netlink_parms(): no params data found 23:08:56 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) getpgid(0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000380)="e29736fd1eebdf5e6f0704423d6807e84e6f9ea4173c84a5bcbcf55f661fe7af2693c00447e4a11a91f8894ffbc551011c334c8689427a2913cf7a3bc81634182589dfc22a555233326660e7da337fad87dd3ee95089af3bf164309e8262779f2410c842885266c10d81c82be046d0e2b4213c5678de618b7021aa5b488159b7e8061e45dc78818c899387898b5cb4a3a96536ab63dc024e0e8d748d9358b90fc8c048f2591e83d8c0250be54f67c0fd0637d7b0d492c4ce6370d998c5465967bc147d3268c47070aa6ec057e0b139b49f699022d1305a994260d598fd735b4844da4474c82d", 0xe6}, {&(0x7f0000000140)="a4f0bad173e4b7c6", 0x8}, {&(0x7f00000001c0)="74251edf15185628786991ce6ce2ac549df3", 0x12}], 0x3, 0xa83a566efcbe9a40) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) [ 276.796473][ T8919] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.803697][ T8919] bridge0: port 1(bridge_slave_0) entered disabled state [ 276.812938][ T8919] device bridge_slave_0 entered promiscuous mode [ 276.821759][ T8919] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.829834][ T8919] bridge0: port 2(bridge_slave_1) entered disabled state [ 276.837539][ T8919] device bridge_slave_1 entered promiscuous mode [ 276.866016][ T8919] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 276.891958][ T8919] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 276.938723][ T8919] team0: Port device team_slave_0 added [ 276.945958][ T8919] team0: Port device team_slave_1 added [ 276.976846][ T8919] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 276.997906][ T8919] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 277.028067][ T8919] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 277.044874][ T9065] IPVS: ftp: loaded support on port[0] = 21 [ 277.052793][ T8919] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 277.060183][ T8919] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 277.087688][ T8919] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 23:08:56 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) flistxattr(r0, 0x0, 0x0) [ 277.169713][ T8919] device hsr_slave_0 entered promiscuous mode [ 277.228076][ T8919] device hsr_slave_1 entered promiscuous mode [ 277.296239][ T9099] IPVS: ftp: loaded support on port[0] = 21 23:08:56 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000700)={0x7b}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x40000007, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 277.416575][ T9065] chnl_net:caif_netlink_parms(): no params data found [ 277.472663][ T8919] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 277.543637][ T8919] netdevsim netdevsim0 netdevsim1: renamed from eth1 23:08:57 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000), 0x6) getsockname(r0, 0x0, &(0x7f00000001c0)) [ 277.623100][ T9265] IPVS: ftp: loaded support on port[0] = 21 [ 277.635490][ T8919] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 277.691320][ T8919] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 277.846656][ T9099] chnl_net:caif_netlink_parms(): no params data found [ 277.865222][ T9307] IPVS: ftp: loaded support on port[0] = 21 [ 277.877914][ T9065] bridge0: port 1(bridge_slave_0) entered blocking state [ 277.884953][ T9065] bridge0: port 1(bridge_slave_0) entered disabled state 23:08:57 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = timerfd_create(0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffff7, 0x11, r5, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0xfffffef3) [ 277.898354][ T9065] device bridge_slave_0 entered promiscuous mode [ 277.933665][ T9065] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.942972][ T9065] bridge0: port 2(bridge_slave_1) entered disabled state [ 277.950750][ T9065] device bridge_slave_1 entered promiscuous mode [ 278.029914][ T9065] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 278.043417][ T9065] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 278.074735][ T9434] IPVS: ftp: loaded support on port[0] = 21 [ 278.093143][ T8919] 8021q: adding VLAN 0 to HW filter on device bond0 [ 278.104750][ T9099] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.111976][ T9099] bridge0: port 1(bridge_slave_0) entered disabled state [ 278.120839][ T9099] device bridge_slave_0 entered promiscuous mode [ 278.129377][ T9065] team0: Port device team_slave_0 added [ 278.155158][ T9265] chnl_net:caif_netlink_parms(): no params data found [ 278.168624][ T9099] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.175657][ T9099] bridge0: port 2(bridge_slave_1) entered disabled state [ 278.183689][ T9099] device bridge_slave_1 entered promiscuous mode [ 278.201794][ T9065] team0: Port device team_slave_1 added [ 278.236526][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 278.244259][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 278.258596][ T9099] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 278.289914][ T8919] 8021q: adding VLAN 0 to HW filter on device team0 [ 278.301524][ T9307] chnl_net:caif_netlink_parms(): no params data found [ 278.310654][ T9065] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 278.317617][ T9065] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 278.343739][ T9065] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 278.355774][ T9099] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 278.382671][ T9065] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 278.389723][ T9065] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 278.415650][ T9065] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 278.427087][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 278.437193][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 278.446027][ T3651] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.453095][ T3651] bridge0: port 1(bridge_slave_0) entered forwarding state [ 278.462677][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 278.471409][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 278.479856][ T3651] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.486927][ T3651] bridge0: port 2(bridge_slave_1) entered forwarding state [ 278.508728][ T9099] team0: Port device team_slave_0 added [ 278.544038][ T8557] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 278.552281][ T8557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 278.569208][ T9099] team0: Port device team_slave_1 added [ 278.629702][ T9065] device hsr_slave_0 entered promiscuous mode [ 278.678019][ T9065] device hsr_slave_1 entered promiscuous mode [ 278.727872][ T9065] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 278.735487][ T9065] Cannot create hsr debugfs directory [ 278.741605][ T9434] chnl_net:caif_netlink_parms(): no params data found [ 278.754492][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 278.777974][ T9099] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 278.785051][ T9099] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 278.812991][ T9099] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 278.828022][ T9099] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 278.834974][ T9099] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 278.861983][ T9099] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 278.878319][ T9265] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.885413][ T9265] bridge0: port 1(bridge_slave_0) entered disabled state [ 278.893886][ T9265] device bridge_slave_0 entered promiscuous mode [ 278.904141][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 278.912913][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 278.944785][ T9265] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.952867][ T9265] bridge0: port 2(bridge_slave_1) entered disabled state [ 278.962000][ T9265] device bridge_slave_1 entered promiscuous mode [ 278.973356][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 278.981687][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 278.990411][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 279.039897][ T9099] device hsr_slave_0 entered promiscuous mode [ 279.078080][ T9099] device hsr_slave_1 entered promiscuous mode [ 279.147871][ T9099] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 279.155433][ T9099] Cannot create hsr debugfs directory [ 279.174240][ T9265] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 279.195751][ T8557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 279.204031][ T8557] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 279.216047][ T9265] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 279.241011][ T9307] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.248303][ T9307] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.256031][ T9307] device bridge_slave_0 entered promiscuous mode [ 279.274020][ T9265] team0: Port device team_slave_0 added [ 279.286648][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 279.296456][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 279.309431][ T9307] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.316498][ T9307] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.325146][ T9307] device bridge_slave_1 entered promiscuous mode [ 279.332840][ T9265] team0: Port device team_slave_1 added [ 279.341386][ T9434] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.348671][ T9434] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.356212][ T9434] device bridge_slave_0 entered promiscuous mode [ 279.364041][ T8919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 279.387198][ T9307] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 279.403371][ T9434] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.411092][ T9434] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.419520][ T9434] device bridge_slave_1 entered promiscuous mode [ 279.440267][ T9307] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 279.472320][ T9434] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 279.490357][ T9434] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 279.503196][ T9265] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 279.510697][ T9265] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 279.539227][ T9265] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 279.552172][ T9265] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 279.560222][ T9265] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 279.586279][ T9265] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 279.605338][ T9307] team0: Port device team_slave_0 added [ 279.612690][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 279.621642][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 279.648987][ T9434] team0: Port device team_slave_0 added [ 279.656021][ T9307] team0: Port device team_slave_1 added [ 279.673565][ T9434] team0: Port device team_slave_1 added [ 279.690500][ T9065] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 279.750467][ T9065] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 279.820189][ T9065] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 279.888413][ T9307] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 279.895394][ T9307] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 279.922957][ T9307] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 279.935979][ T9307] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 279.943760][ T9307] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 279.969855][ T9307] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 279.981398][ T9434] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 279.989054][ T9434] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 280.015299][ T9434] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 280.031355][ T9065] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 280.129328][ T9265] device hsr_slave_0 entered promiscuous mode [ 280.188077][ T9265] device hsr_slave_1 entered promiscuous mode [ 280.227674][ T9265] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 280.235258][ T9265] Cannot create hsr debugfs directory [ 280.243473][ T8919] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 280.259725][ T9434] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 280.266677][ T9434] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 280.292730][ T9434] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 280.316935][ T9099] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 280.390057][ T9099] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 280.489449][ T9307] device hsr_slave_0 entered promiscuous mode [ 280.528048][ T9307] device hsr_slave_1 entered promiscuous mode [ 280.567667][ T9307] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 280.575409][ T9307] Cannot create hsr debugfs directory [ 280.601778][ T9099] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 280.640315][ T9099] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 280.729415][ T9434] device hsr_slave_0 entered promiscuous mode [ 280.747945][ T9434] device hsr_slave_1 entered promiscuous mode [ 280.787690][ T9434] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 280.795241][ T9434] Cannot create hsr debugfs directory [ 280.835016][ T4150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 280.843723][ T4150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 280.910016][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 280.918574][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 280.928206][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 280.935794][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 280.953268][ T9265] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 281.000743][ T9265] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 281.039299][ T8919] device veth0_vlan entered promiscuous mode [ 281.045741][ T9265] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 281.106094][ T9065] 8021q: adding VLAN 0 to HW filter on device bond0 [ 281.115406][ T9265] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 281.160133][ T8919] device veth1_vlan entered promiscuous mode [ 281.188419][ T9307] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 281.200825][ T9307] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 281.241072][ T9307] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 281.301140][ T9307] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 281.371046][ T4150] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 281.379246][ T4150] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 281.387402][ T4150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 281.395563][ T4150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 281.405236][ T9065] 8021q: adding VLAN 0 to HW filter on device team0 [ 281.425497][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 281.434954][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 281.443528][ T4136] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.450692][ T4136] bridge0: port 1(bridge_slave_0) entered forwarding state [ 281.468070][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 281.475902][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 281.485413][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 281.493924][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.500982][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 281.509180][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 281.532000][ T9099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 281.539672][ T9434] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 281.584094][ T8919] device veth0_macvtap entered promiscuous mode [ 281.593343][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 281.603190][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 281.613438][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 281.622766][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 281.632744][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 281.642265][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 281.652550][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 281.662059][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 281.671763][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 281.680669][ T9434] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 281.740143][ T9434] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 281.790840][ T9434] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 281.857991][ T8919] device veth1_macvtap entered promiscuous mode [ 281.877087][ T9099] 8021q: adding VLAN 0 to HW filter on device team0 [ 281.884896][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 281.895503][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 281.904255][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 281.914325][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 281.922230][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 281.953256][ T9265] 8021q: adding VLAN 0 to HW filter on device bond0 [ 281.970548][ T8919] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 281.978126][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 281.986632][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 281.995104][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 282.003644][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 282.017566][ T4150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 282.025055][ T4150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 282.034751][ T9065] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 282.049277][ T9265] 8021q: adding VLAN 0 to HW filter on device team0 [ 282.057315][ T8919] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 282.067363][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 282.076508][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 282.085267][ T4136] bridge0: port 1(bridge_slave_0) entered blocking state [ 282.092373][ T4136] bridge0: port 1(bridge_slave_0) entered forwarding state [ 282.100190][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 282.108732][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 282.249339][ T4150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 282.257271][ T4150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 282.266488][ T4150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 282.275469][ T4150] bridge0: port 2(bridge_slave_1) entered blocking state [ 282.282858][ T4150] bridge0: port 2(bridge_slave_1) entered forwarding state [ 282.290801][ T4150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 282.299742][ T4150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 282.308525][ T4150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 282.316980][ T4150] bridge0: port 1(bridge_slave_0) entered blocking state [ 282.324075][ T4150] bridge0: port 1(bridge_slave_0) entered forwarding state [ 282.332831][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 282.411986][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 282.423305][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 282.431262][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 282.440590][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 282.455192][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 282.464151][ T4136] bridge0: port 2(bridge_slave_1) entered blocking state [ 282.471218][ T4136] bridge0: port 2(bridge_slave_1) entered forwarding state [ 282.479720][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 282.488672][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 282.497282][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 282.506396][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 282.515452][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 282.524935][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 282.541884][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 282.550740][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 282.566189][ T9307] 8021q: adding VLAN 0 to HW filter on device bond0 [ 282.579542][ T9099] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 282.591114][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 282.599068][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 282.608457][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 23:09:02 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000001c0)=0xffffffffffffffff, 0x12) [ 282.628065][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 282.637437][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 282.646218][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 282.655868][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 282.664864][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 282.672770][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 282.681452][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 282.696658][ T9065] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 282.724786][ T9265] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 282.757484][ T9265] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 23:09:02 executing program 0: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x549c599b1b8b14c5, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f00000000c0)={0x0, 0xfdfffffc}) [ 282.780400][ T9307] 8021q: adding VLAN 0 to HW filter on device team0 [ 282.811427][ T9434] 8021q: adding VLAN 0 to HW filter on device bond0 [ 282.828802][ T8557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 282.837065][ T8557] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 282.861936][ T8557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 282.892209][ T8557] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 23:09:02 executing program 0: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00002be13a0fbd93ca27d0ddbde8bd8dbd70f11f643d9a6ea27700f100020005fe0098"], 0x1c}, 0x1, 0x0, 0x0, 0x400c004}, 0x18) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x808}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x0, 0x200, 0x70bd2c, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x40002}, 0x4000) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f00000009c0)=ANY=[@ANYBLOB="8402000092abbf02684fefedabaa7714edccee0c266ed2bb0250a30dcce04192528cc6bfa144fa6c7ea633852da1ac96f3ac3d8bd46a0a7936b8ab56047e9857101a25f91bf94f4a45ae3ce02d21be676a0131ca3042b655806dd4017e1c21bd47c81b204d7ab30a22b0214ee46d150b6eab423cfd8db55cac3e04abfac2acf2069271b7f6fb92fb153720b64c8ef9fff56d766b5b984c186db45e282032fe2e7b416a57cd9eb033692bd324562739bebc987fce77632f21cac6a7891221534f77618dad6b91bd196eb3ec11a544b28787c0cbc0fed324395410", @ANYRES16, @ANYBLOB="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"], 0x284}, 0x1, 0x0, 0x0, 0x40}, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x20000084, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @empty}, 0x1c) shutdown(r1, 0x1) accept(r0, 0x0, 0x0) [ 282.941031][ T8557] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 282.970818][ T8557] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 282.989547][ T8557] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 282.996962][ T8557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 283.006080][ T8557] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 283.017434][ T8557] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.024469][ T8557] bridge0: port 1(bridge_slave_0) entered forwarding state [ 283.077095][ T9099] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 283.101247][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 283.114067][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 283.127154][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 283.139227][ C1] hrtimer: interrupt took 24135 ns [ 283.148530][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 23:09:02 executing program 0: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00002be13a0fbd93ca27d0ddbde8bd8dbd70f11f643d9a6ea27700f100020005fe0098"], 0x1c}, 0x1, 0x0, 0x0, 0x400c004}, 0x18) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x808}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x0, 0x200, 0x70bd2c, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x40002}, 0x4000) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f00000009c0)=ANY=[@ANYBLOB="8402000092abbf02684fefedabaa7714edccee0c266ed2bb0250a30dcce04192528cc6bfa144fa6c7ea633852da1ac96f3ac3d8bd46a0a7936b8ab56047e9857101a25f91bf94f4a45ae3ce02d21be676a0131ca3042b655806dd4017e1c21bd47c81b204d7ab30a22b0214ee46d150b6eab423cfd8db55cac3e04abfac2acf2069271b7f6fb92fb153720b64c8ef9fff56d766b5b984c186db45e282032fe2e7b416a57cd9eb033692bd324562739bebc987fce77632f21cac6a7891221534f77618dad6b91bd196eb3ec11a544b28787c0cbc0fed324395410", @ANYRES16, @ANYBLOB="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"], 0x284}, 0x1, 0x0, 0x0, 0x40}, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x20000084, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @empty}, 0x1c) shutdown(r1, 0x1) accept(r0, 0x0, 0x0) [ 283.187416][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 283.196082][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 283.206937][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.214128][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 283.224432][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 283.233614][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 283.245185][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 283.257157][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 283.271388][ T9434] 8021q: adding VLAN 0 to HW filter on device team0 [ 283.294629][ T9265] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 283.304315][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 283.333719][ T8557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready 23:09:02 executing program 0: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00002be13a0fbd93ca27d0ddbde8bd8dbd70f11f643d9a6ea27700f100020005fe0098"], 0x1c}, 0x1, 0x0, 0x0, 0x400c004}, 0x18) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x808}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x0, 0x200, 0x70bd2c, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x40002}, 0x4000) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f00000009c0)=ANY=[@ANYBLOB="8402000092abbf02684fefedabaa7714edccee0c266ed2bb0250a30dcce04192528cc6bfa144fa6c7ea633852da1ac96f3ac3d8bd46a0a7936b8ab56047e9857101a25f91bf94f4a45ae3ce02d21be676a0131ca3042b655806dd4017e1c21bd47c81b204d7ab30a22b0214ee46d150b6eab423cfd8db55cac3e04abfac2acf2069271b7f6fb92fb153720b64c8ef9fff56d766b5b984c186db45e282032fe2e7b416a57cd9eb033692bd324562739bebc987fce77632f21cac6a7891221534f77618dad6b91bd196eb3ec11a544b28787c0cbc0fed324395410", @ANYRES16, @ANYBLOB="000327bd7000fbdbdf25030000009c010c800c000b800800090066497e2414000b800800090022e9723f08000a003933000044000b8008000a009db60000080009007747f55d08000900b6944a3508000a000100000008000a00275a000008000a00d653000008000a00b3ef000008000a004132000034000b8008000a001133000008000a00163b000008000900d9c09b3b08000a0043c90000080009006db7c854080009003a1a4b2a14000b8008000a00f31900000800090014885b7654000b8008000900383abd1b08000a0069b8000008000a00382300000800090027f9c24108000a00a01c000008000a00446f000008000a0072c500000800090063ddc41208000a004902000008000a00f46c00002c000b8008000a007128000008000a00ad40000008000900a2265221080009003ae2502f08000a006195000024000b8007000900b4ba144f08000a0046b9000008000a00e0750000080009008583260024000b80080009009996df1908000a000200000008000a0002ed000008000900d2f93f6c24000b8008000a00b04c00000800090097668c7f0800090046d8753608000900407dec10c400088044000780080006008100000008000600340000000800060037000000080006001f0000000800050071e4ea38080006000800000008000500db95e0730800060085000000440007800800050053ec0f6e080006003d000000080005006f362576080005005b94544408000600dc0000000800060006000000080006005b00000008000600d30000000c0007800800050040a338312c0007800800050098c4d804080006007f0000000800050083ac6e520800060021000000080006002300000008000100020000000800020001000000"], 0x284}, 0x1, 0x0, 0x0, 0x40}, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x20000084, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @empty}, 0x1c) shutdown(r1, 0x1) accept(r0, 0x0, 0x0) [ 283.350811][ T8557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 283.369844][ T8557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 283.382020][ T8557] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 283.449236][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 283.457064][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 283.467091][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 283.476388][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 283.476772][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 23:09:02 executing program 0: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00002be13a0fbd93ca27d0ddbde8bd8dbd70f11f643d9a6ea27700f100020005fe0098"], 0x1c}, 0x1, 0x0, 0x0, 0x400c004}, 0x18) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x808}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x0, 0x200, 0x70bd2c, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x40002}, 0x4000) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f00000009c0)=ANY=[@ANYBLOB="8402000092abbf02684fefedabaa7714edccee0c266ed2bb0250a30dcce04192528cc6bfa144fa6c7ea633852da1ac96f3ac3d8bd46a0a7936b8ab56047e9857101a25f91bf94f4a45ae3ce02d21be676a0131ca3042b655806dd4017e1c21bd47c81b204d7ab30a22b0214ee46d150b6eab423cfd8db55cac3e04abfac2acf2069271b7f6fb92fb153720b64c8ef9fff56d766b5b984c186db45e282032fe2e7b416a57cd9eb033692bd324562739bebc987fce77632f21cac6a7891221534f77618dad6b91bd196eb3ec11a544b28787c0cbc0fed324395410", @ANYRES16, @ANYBLOB="000327bd7000fbdbdf25030000009c010c800c000b800800090066497e2414000b800800090022e9723f08000a003933000044000b8008000a009db60000080009007747f55d08000900b6944a3508000a000100000008000a00275a000008000a00d653000008000a00b3ef000008000a004132000034000b8008000a001133000008000a00163b000008000900d9c09b3b08000a0043c90000080009006db7c854080009003a1a4b2a14000b8008000a00f31900000800090014885b7654000b8008000900383abd1b08000a0069b8000008000a00382300000800090027f9c24108000a00a01c000008000a00446f000008000a0072c500000800090063ddc41208000a004902000008000a00f46c00002c000b8008000a007128000008000a00ad40000008000900a2265221080009003ae2502f08000a006195000024000b8007000900b4ba144f08000a0046b9000008000a00e0750000080009008583260024000b80080009009996df1908000a000200000008000a0002ed000008000900d2f93f6c24000b8008000a00b04c00000800090097668c7f0800090046d8753608000900407dec10c400088044000780080006008100000008000600340000000800060037000000080006001f0000000800050071e4ea38080006000800000008000500db95e0730800060085000000440007800800050053ec0f6e080006003d000000080005006f362576080005005b94544408000600dc0000000800060006000000080006005b00000008000600d30000000c0007800800050040a338312c0007800800050098c4d804080006007f0000000800050083ac6e520800060021000000080006002300000008000100020000000800020001000000"], 0x284}, 0x1, 0x0, 0x0, 0x40}, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x20000084, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @empty}, 0x1c) shutdown(r1, 0x1) accept(r0, 0x0, 0x0) [ 283.498764][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 283.509276][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 283.518769][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 283.538033][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 283.546547][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 283.560164][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.567204][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 283.575717][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 283.585942][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 283.597998][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.605081][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 283.617177][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 283.631834][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 23:09:03 executing program 0: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00002be13a0fbd93ca27d0ddbde8bd8dbd70f11f643d9a6ea27700f100020005fe0098"], 0x1c}, 0x1, 0x0, 0x0, 0x400c004}, 0x18) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x808}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x0, 0x200, 0x70bd2c, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x40002}, 0x4000) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f00000009c0)=ANY=[@ANYBLOB="8402000092abbf02684fefedabaa7714edccee0c266ed2bb0250a30dcce04192528cc6bfa144fa6c7ea633852da1ac96f3ac3d8bd46a0a7936b8ab56047e9857101a25f91bf94f4a45ae3ce02d21be676a0131ca3042b655806dd4017e1c21bd47c81b204d7ab30a22b0214ee46d150b6eab423cfd8db55cac3e04abfac2acf2069271b7f6fb92fb153720b64c8ef9fff56d766b5b984c186db45e282032fe2e7b416a57cd9eb033692bd324562739bebc987fce77632f21cac6a7891221534f77618dad6b91bd196eb3ec11a544b28787c0cbc0fed324395410", @ANYRES16, @ANYBLOB="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"], 0x284}, 0x1, 0x0, 0x0, 0x40}, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x20000084, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @empty}, 0x1c) shutdown(r1, 0x1) accept(r0, 0x0, 0x0) [ 283.644483][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 283.660193][ T9307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 283.698469][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 283.706387][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 283.717633][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 283.726156][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 283.746017][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 283.759368][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 283.773156][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 283.787777][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 283.809328][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 283.837914][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 283.846524][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 283.855164][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 283.864101][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 283.871795][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 283.879656][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 283.895587][ T9065] device veth0_vlan entered promiscuous mode [ 283.907619][ T4150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 283.917195][ T4150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 283.953251][ T9265] device veth0_vlan entered promiscuous mode [ 283.973491][ T9065] device veth1_vlan entered promiscuous mode [ 283.987594][ T4150] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 283.995791][ T4150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 284.006670][ T4150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 284.015903][ T4150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 284.024761][ T4150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 284.033564][ T4150] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 284.041808][ T4150] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 284.050789][ T4150] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 284.058746][ T4150] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 284.070464][ T9434] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 284.085865][ T9307] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 284.102701][ T9099] device veth0_vlan entered promiscuous mode [ 284.109894][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 284.118460][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 284.126611][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 284.149191][ T9265] device veth1_vlan entered promiscuous mode [ 284.157914][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 284.167054][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 284.174970][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 284.183138][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 284.190823][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 284.190905][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 284.191564][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 284.220953][ T9434] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 284.228942][ T9065] device veth0_macvtap entered promiscuous mode [ 284.239955][ T9099] device veth1_vlan entered promiscuous mode [ 284.266927][ T9065] device veth1_macvtap entered promiscuous mode [ 284.297895][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 284.307230][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 284.316151][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 284.324847][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 284.333294][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 284.341596][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 284.350267][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 284.367569][ T8557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 284.375955][ T8557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 284.388650][ T9265] device veth0_macvtap entered promiscuous mode [ 284.403486][ T9065] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 284.414145][ T9065] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 284.428752][ T9065] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 284.438978][ T9099] device veth0_macvtap entered promiscuous mode [ 284.449606][ T9265] device veth1_macvtap entered promiscuous mode [ 284.459249][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 284.467200][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 284.475783][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 284.484452][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 284.493397][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 284.509455][ T9065] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 284.519955][ T9065] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 284.531705][ T9065] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 284.541490][ T9099] device veth1_macvtap entered promiscuous mode [ 284.558249][ T4150] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 284.566773][ T4150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 284.576098][ T4150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 284.585178][ T4150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 284.614263][ T4150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 284.623629][ T4150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 284.640892][ T9265] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 284.651368][ T9265] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 284.663402][ T9265] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 284.673873][ T9265] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 284.685146][ T9265] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 284.774185][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 284.784736][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 284.798481][ T9099] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 284.809797][ T9099] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 284.819787][ T9099] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 284.830462][ T9099] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 284.841116][ T9099] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 284.851722][ T9099] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 284.862806][ T9099] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 284.933068][ T9434] device veth0_vlan entered promiscuous mode [ 284.941828][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 284.968512][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 284.990300][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 284.999911][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 285.009183][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 285.018177][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 285.028702][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready 23:09:04 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000005c000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000038000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) [ 285.036332][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 285.045729][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 285.054457][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 285.063493][ T9265] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 285.081355][ T9265] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.103743][ T9265] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 285.116225][ T9265] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.127574][T10233] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 285.145834][ T9265] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 285.155539][ T9307] device veth0_vlan entered promiscuous mode [ 285.176411][ T9434] device veth1_vlan entered promiscuous mode [ 285.191907][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 285.207724][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 285.216351][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 285.248103][ T9099] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 285.265090][ T9099] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.276773][ T9099] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 285.287967][ T9099] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.298450][ T9099] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 285.319752][ T9099] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.331373][ T9099] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 285.356997][ T9307] device veth1_vlan entered promiscuous mode [ 285.381547][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 285.391974][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 285.412123][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 285.423817][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 285.558963][ T4150] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 285.583189][ T9434] device veth0_macvtap entered promiscuous mode [ 285.629001][ T4150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 285.639619][ T4150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 285.690921][ T9434] device veth1_macvtap entered promiscuous mode [ 285.748370][T10172] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 285.759686][T10172] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 285.776613][T10249] kvm [10248]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x40000040 [ 285.798413][ T8562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 285.806886][ T8562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 285.832040][ T9307] device veth0_macvtap entered promiscuous mode [ 285.854023][ T9434] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 285.879401][ T9434] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.889965][ T9434] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 285.920235][ T9434] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.946056][ T9434] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 285.959095][ T9434] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.969149][ T9434] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 285.981809][ T9434] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.993515][ T9434] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 286.007926][ T4150] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 286.016351][ T4150] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 286.027726][ T4150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 286.039920][ T9307] device veth1_macvtap entered promiscuous mode [ 286.051853][ T9434] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 286.067212][ T9434] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 286.081319][ T9434] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 286.092957][ T9434] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 286.117171][ T9434] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 286.143820][ T9434] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 286.162089][ T9434] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 286.176419][ T9434] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 286.188568][ T9434] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 286.210253][ T8557] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 23:09:05 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x4dd) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_setup(0x7, &(0x7f0000000280)=0x0) io_destroy(r3) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 23:09:05 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) [ 286.220798][ T8557] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 286.231734][ T8557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 286.312488][ T9307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 286.324951][ T9307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 286.338535][ T9307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 286.353103][ T9307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 286.363232][ T9307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 286.373987][ T9307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 286.384135][ T9307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 286.396044][ T9307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 286.406068][ T9307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 286.416739][ T9307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 286.428099][ T9307] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 286.468244][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 286.476834][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 286.498124][ T9307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 286.512730][ T9307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 286.523469][ T9307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 286.534485][ T9307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 286.545105][ T9307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 286.556766][ T9307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 286.567270][ T9307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 286.578322][ T9307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 286.589173][ T9307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 286.600437][ T9307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 286.612541][ T9307] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 286.624989][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 286.634972][ T3651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 23:09:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66731f66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) write$FUSE_DIRENT(r1, &(0x7f0000000340)=ANY=[], 0x98) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}}, 0xfde0) 23:09:06 executing program 1: modify_ldt$write(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x84002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) clone(0x22004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000002540)=[{{0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) exit(0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp\x00') setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x902) bind$packet(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1b4, 0x0) 23:09:06 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000700)={0x7b}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x40000007, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:09:06 executing program 0: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x3, 0x80) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000840)=@filter={'filter\x00', 0x50, 0x4, 0x3c0, 0xd0, 0x0, 0x1f8, 0x0, 0xd0, 0x2f0, 0x2f0, 0x2f0, 0x2f0, 0x2f0, 0x4, 0x0, {[{{@ipv6={@mcast1, @loopback, [], [], 'bond_slave_0\x00', 'syzkaller1\x00', {}, {}, 0x6, 0x0, 0x7}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x6}}}, {{@ipv6={@dev, @mcast1, [], [], 'dummy0\x00', 'veth0_to_bond\x00'}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@frag={{0x30, 'frag\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@remote, @mcast1, [], [], 'ip6tnl0\x00', 'ip_vti0\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@icmp6={{0x28, 'icmp6\x00'}, {0x0, '% '}}]}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x420) 23:09:06 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x4dd) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_setup(0x7, &(0x7f0000000280)=0x0) io_destroy(r3) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 23:09:06 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_RESERVE(r0, 0x401070cd, 0x0) [ 286.962850][T10300] x_tables: ip6_tables: REJECT target: used from hooks POSTROUTING, but only usable from INPUT/FORWARD/OUTPUT 23:09:06 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="40000000090601010000feffffffffffffff00000500010006000000100008800c0007800800094004000000090002"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 287.046317][T10309] kvm [10304]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x40000040 23:09:06 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x1000, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 23:09:06 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='net/ip6_flowlabel\x00') preadv(r0, &(0x7f00000017c0)=[{&(0x7f00000003c0)=""/253, 0xfd}], 0x1, 0x3) [ 287.184649][ T27] audit: type=1800 audit(1590188946.642:2): pid=10317 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="loop4" ino=23 res=0 [ 287.303157][ T27] audit: type=1800 audit(1590188946.672:3): pid=10317 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="loop4" ino=23 res=0 [ 287.327607][T10330] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 23:09:06 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6a) 23:09:06 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_RESERVE(r0, 0x401870cc, 0x0) 23:09:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x6, 0x0) read$char_usb(r0, &(0x7f00000000c0)=""/4096, 0x2580) 23:09:07 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_RESERVE(r0, 0x401870cc, 0x0) 23:09:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 23:09:07 executing program 3: modify_ldt$write(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) clone(0x22004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000002540)=[{{0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) exit(0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x902) bind$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x1, 0x6, @broadcast}, 0x14) preadv(r0, &(0x7f00000017c0), 0x1b4, 0x0) 23:09:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x6, 0x0) read$char_usb(r0, &(0x7f00000000c0)=""/4096, 0x2580) 23:09:07 executing program 1: modify_ldt$write(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x84002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) clone(0x22004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000002540)=[{{0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) exit(0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp\x00') setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x902) bind$packet(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1b4, 0x0) 23:09:07 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f00000001c0)={0x7b}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x40000007, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 288.023592][T10360] kvm [10355]: vcpu0, guest rIP: 0x135 Hyper-V unhandled rdmsr: 0x40000024 [ 288.065758][T10360] kvm [10355]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x4000007e [ 288.105315][T10360] kvm [10355]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x40000052 23:09:07 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x6, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read$char_usb(r0, &(0x7f00000000c0)=""/4096, 0x2580) 23:09:07 executing program 4: [ 288.133354][T10360] kvm [10355]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x40000016 23:09:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) write$P9_RSTAT(r3, 0x0, 0x50) sendmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000190007841dfffd946f610500020081001f03fe020400080008001e000a00ff7e", 0x24}], 0x1}, 0x0) [ 288.186477][T10360] kvm [10355]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x4000006a 23:09:07 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 23:09:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b63e069efb29797573b8530e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45991fbdce6793c8a4785ee8b60092659b941bbd694d1f8898b3e6"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000100)=""/188) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd1fffffff00002c00632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) 23:09:07 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) syz_emit_ethernet(0x42, &(0x7f0000000180)={@local, @link_local, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "6a2bde", 0x8, 0x3a, 0x0, @private2, @private0, {[], @mlv2_report}}}}}, 0x0) 23:09:07 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000012000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000000)="660f3882b748000000410f01c266450f3adfc4550f070f01c33e45edb8010000000f01d9660f11e966b815000f00d8edf0448029bf", 0x32}], 0x1, 0x0, 0x0, 0x4c) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000140)={0x0, 0x11d000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:09:08 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 288.805564][T10402] kvm: emulating exchange as write 23:09:08 executing program 3: modify_ldt$write(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) clone(0x22004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000002540)=[{{0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) exit(0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x902) bind$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x1, 0x6, @broadcast}, 0x14) preadv(r0, &(0x7f00000017c0), 0x1b4, 0x0) 23:09:08 executing program 4: 23:09:08 executing program 5: 23:09:08 executing program 2: 23:09:08 executing program 1: modify_ldt$write(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) clone(0x22004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000002540)=[{{0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) exit(0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp\x00') open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x902) bind$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x1, 0x6, @broadcast}, 0x14) preadv(r0, &(0x7f00000017c0), 0x1b4, 0x0) 23:09:08 executing program 0: 23:09:08 executing program 4: 23:09:08 executing program 5: 23:09:08 executing program 0: 23:09:08 executing program 2: 23:09:08 executing program 4: 23:09:09 executing program 0: 23:09:09 executing program 3: 23:09:09 executing program 5: 23:09:09 executing program 2: 23:09:09 executing program 4: 23:09:09 executing program 1: 23:09:09 executing program 0: 23:09:09 executing program 2: 23:09:09 executing program 5: 23:09:09 executing program 4: 23:09:09 executing program 3: 23:09:09 executing program 0: 23:09:09 executing program 5: 23:09:09 executing program 4: 23:09:09 executing program 1: 23:09:09 executing program 2: 23:09:09 executing program 3: 23:09:09 executing program 0: 23:09:09 executing program 5: 23:09:10 executing program 1: 23:09:10 executing program 2: 23:09:10 executing program 4: 23:09:10 executing program 3: 23:09:10 executing program 0: 23:09:10 executing program 5: 23:09:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@local, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000005c000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd65660f382201c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d6830f01caed", 0x14}], 0x1, 0x0, 0x0, 0x25a) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000038000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) 23:09:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) recvmmsg(r2, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) 23:09:10 executing program 4: modify_ldt$write(0x1, &(0x7f0000000080)={0x80, 0x20000000, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1}, 0x10) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x84002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) clock_gettime(0x0, 0x0) clone(0x22004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000002540)=[{{0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) exit(0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp\x00') symlink(&(0x7f0000000100)='./file0\x00', 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="090000000100000014"], 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@filter={'filter\x00', 0xe, 0x3, 0x652, [0x0, 0x20000480, 0x20000834, 0x20000cda], 0x0, &(0x7f0000000240), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x2, [{0x9, 0x10, 0xa01, 'syzkaller0\x00', 'veth1_to_batadv\x00', 'erspan0\x00', 'bond0\x00', @random="afe17b61aa32", [], @local, [0x0, 0x0, 0x0, 0xff, 0xff], 0xe6, 0x216, 0x246, [@ip6={{'ip6\x00', 0x0, 0x50}, {{@local, @remote, [0xff000000, 0xff, 0xffffffff, 0xff], [0xff000000, 0x0, 0xffffffff, 0x1fe000000], 0x8, 0xa5, 0x21, 0x3, 0x4e24, 0x4e20, 0x4e20, 0x4e21}}}], [@common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x100, 'system_u:object_r:inetd_log_t:s0\x00'}}}], @common=@AUDIT={'AUDIT\x00', 0x8, {{0x1}}}}, {0x0, 0x0, 0x1, 'wg0\x00', 'ip6gre0\x00', 'sit0\x00', 'veth0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0x0, 0xff, 0x0, 0xff, 0xff], @random="0bcd80bf3bd6", [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], 0xee, 0xee, 0x13e, [@quota={{'quota\x00', 0x0, 0x18}, {{0x1, 0x0, 0x211, {0x3}}}}, @time={{'time\x00', 0x0, 0x18}, {{0xdf4, 0x401, 0x488e, 0x5962, 0x7, 0xd2, 0x3}}}], [], @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x80000000, 'syz1\x00', {0xfffffffffffff001}}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{0x11, 0x15, 0xf8, 'veth1_virt_wifi\x00', 'veth0_vlan\x00', 'bridge0\x00', 'veth0_vlan\x00', @empty, [0x0, 0xff, 0x0, 0x0, 0xff, 0xff], @multicast, [0x0, 0xff], 0xae, 0x10e, 0x23e, [@quota={{'quota\x00', 0x0, 0x18}, {{0x0, 0x0, 0x8}}}], [@common=@STANDARD={'\x00', 0x8, {0xffffffffffffffff}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffc}}}], @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:kvm_device_t:s0\x00'}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc}]}, 0x6ca) bind$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x1, 0x6, @broadcast}, 0x14) preadv(r0, &(0x7f00000017c0), 0x1b4, 0x0) 23:09:10 executing program 0: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000480)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x54c, 0x3d5, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0xc, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x40029}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000002c40)=ANY=[@ANYBLOB="000029000000230090a6895aefd79b87429d14ba8a6a2c922a8bb666b2dfea61dcba9f5bf786627df702a30d6479aa"], 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 23:09:10 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r0, &(0x7f0000003b40)=[{{0x0, 0x1010000, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x26f0ffff}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) [ 290.883975][T10479] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 23:09:10 executing program 3: 23:09:10 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r0, &(0x7f0000003b40)=[{{0x0, 0x1010000, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x26f0ffff}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 23:09:10 executing program 2: 23:09:10 executing program 3: 23:09:10 executing program 1: 23:09:10 executing program 2: 23:09:10 executing program 3: 23:09:10 executing program 4: modify_ldt$write(0x1, &(0x7f0000000080)={0x80, 0x20000000, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1}, 0x10) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x84002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) clock_gettime(0x0, 0x0) clone(0x22004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000002540)=[{{0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) exit(0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp\x00') symlink(&(0x7f0000000100)='./file0\x00', 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="090000000100000014"], 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@filter={'filter\x00', 0xe, 0x3, 0x652, [0x0, 0x20000480, 0x20000834, 0x20000cda], 0x0, &(0x7f0000000240), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x2, [{0x9, 0x10, 0xa01, 'syzkaller0\x00', 'veth1_to_batadv\x00', 'erspan0\x00', 'bond0\x00', @random="afe17b61aa32", [], @local, [0x0, 0x0, 0x0, 0xff, 0xff], 0xe6, 0x216, 0x246, [@ip6={{'ip6\x00', 0x0, 0x50}, {{@local, @remote, [0xff000000, 0xff, 0xffffffff, 0xff], [0xff000000, 0x0, 0xffffffff, 0x1fe000000], 0x8, 0xa5, 0x21, 0x3, 0x4e24, 0x4e20, 0x4e20, 0x4e21}}}], [@common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x100, 'system_u:object_r:inetd_log_t:s0\x00'}}}], @common=@AUDIT={'AUDIT\x00', 0x8, {{0x1}}}}, {0x0, 0x0, 0x1, 'wg0\x00', 'ip6gre0\x00', 'sit0\x00', 'veth0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0x0, 0xff, 0x0, 0xff, 0xff], @random="0bcd80bf3bd6", [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], 0xee, 0xee, 0x13e, [@quota={{'quota\x00', 0x0, 0x18}, {{0x1, 0x0, 0x211, {0x3}}}}, @time={{'time\x00', 0x0, 0x18}, {{0xdf4, 0x401, 0x488e, 0x5962, 0x7, 0xd2, 0x3}}}], [], @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x80000000, 'syz1\x00', {0xfffffffffffff001}}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{0x11, 0x15, 0xf8, 'veth1_virt_wifi\x00', 'veth0_vlan\x00', 'bridge0\x00', 'veth0_vlan\x00', @empty, [0x0, 0xff, 0x0, 0x0, 0xff, 0xff], @multicast, [0x0, 0xff], 0xae, 0x10e, 0x23e, [@quota={{'quota\x00', 0x0, 0x18}, {{0x0, 0x0, 0x8}}}], [@common=@STANDARD={'\x00', 0x8, {0xffffffffffffffff}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffc}}}], @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:kvm_device_t:s0\x00'}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc}]}, 0x6ca) bind$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x1, 0x6, @broadcast}, 0x14) preadv(r0, &(0x7f00000017c0), 0x1b4, 0x0) [ 291.286801][T10172] usb 1-1: new high-speed USB device number 2 using dummy_hcd 23:09:10 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000900)='/proc/capi/capi20\x00', 0x78c962f81fa5cb5d, 0x0) ioctl$SIOCPNDELRESOURCE(r1, 0x89ef, &(0x7f0000000940)=0x2) r2 = dup(r0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)={0x60, 0x0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x34, 0x1, @in={0x2, 0x0, @local}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @remote}}}}]}]}, 0x60}}, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_NET_GET(r3, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="bc010000", @ANYRES16=r4, @ANYBLOB="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"], 0x1bc}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000440)=@mangle={'mangle\x00', 0x44, 0x6, 0x458, 0x0, 0x138, 0x138, 0x2f8, 0x138, 0x3c0, 0x3c0, 0x3c0, 0x3c0, 0x3c0, 0x6, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'geneve1\x00', 'ip6gre0\x00', {}, {}, 0x6, 0x0, 0x48}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @multicast2}}}, {{@uncond, 0x0, 0x70, 0x98}, @TTL={0x28, 'TTL\x00'}}, {{@uncond, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@ipv4={[], [], @remote}}}}, {{@ip={@rand_addr, @multicast2, 0x0, 0x0, 'syzkaller0\x00', 'bond0\x00'}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@osf={{0x50, 'osf\x00'}, {'syz0\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@inet=@dccp={{0x30, 'dccp\x00'}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4b8) getsockopt$inet_mreqsrc(r5, 0x0, 0x0, &(0x7f0000000780)={@broadcast, @multicast2, @loopback}, &(0x7f00000007c0)=0xc) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)={0x60, r6, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x34, 0x1, @in={0x2, 0x0, @local}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @remote}}}}]}]}, 0x60}}, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000880)={&(0x7f0000000740)={0x14, r6, 0x8, 0x70bd28, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 23:09:10 executing program 1: [ 291.377039][T10172] usb 1-1: Using ep0 maxpacket: 8 23:09:10 executing program 2: [ 291.459605][T10512] xt_TPROXY: Can be used only with -p tcp or -p udp [ 291.474181][T10512] tipc: Invalid UDP bearer configuration [ 291.474194][T10512] tipc: Enabling of bearer rejected, failed to enable media [ 291.497133][T10172] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 291.519017][T10172] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 291.557049][T10172] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 12 [ 291.573197][T10512] xt_TPROXY: Can be used only with -p tcp or -p udp [ 291.580050][T10515] tipc: Invalid UDP bearer configuration [ 291.580078][T10515] tipc: Enabling of bearer rejected, failed to enable media [ 291.587054][T10172] usb 1-1: New USB device found, idVendor=054c, idProduct=03d5, bcdDevice= 0.00 [ 291.620613][T10172] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 291.639517][T10172] usb 1-1: config 0 descriptor?? [ 292.129171][T10172] input: HID 054c:03d5 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/0003:054C:03D5.0001/input/input5 [ 292.158290][T10172] sony 0003:054C:03D5.0001: input,hidraw0: USB HID v0.00 Joystick [HID 054c:03d5] on usb-dummy_hcd.0-1/input0 [ 292.330808][ T49] usb 1-1: USB disconnect, device number 2 [ 293.107485][ T8557] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 293.197280][ T8557] usb 1-1: Using ep0 maxpacket: 8 [ 293.336926][ T8557] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 293.347902][ T8557] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 293.357746][ T8557] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 12 [ 293.370647][ T8557] usb 1-1: New USB device found, idVendor=054c, idProduct=03d5, bcdDevice= 0.00 [ 293.379776][ T8557] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 293.390468][ T8557] usb 1-1: config 0 descriptor?? [ 293.711890][ T8557] input: HID 054c:03d5 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/0003:054C:03D5.0002/input/input6 [ 293.729279][ T8557] sony 0003:054C:03D5.0002: input,hidraw0: USB HID v0.00 Joystick [HID 054c:03d5] on usb-dummy_hcd.0-1/input0 23:09:13 executing program 0: 23:09:13 executing program 4: 23:09:13 executing program 3: 23:09:13 executing program 2: 23:09:13 executing program 1: 23:09:13 executing program 5: [ 293.916612][ T49] usb 1-1: USB disconnect, device number 3 23:09:13 executing program 1: 23:09:13 executing program 3: 23:09:13 executing program 4: 23:09:13 executing program 5: 23:09:13 executing program 2: 23:09:13 executing program 0: 23:09:13 executing program 4: 23:09:13 executing program 5: 23:09:13 executing program 1: 23:09:13 executing program 3: 23:09:13 executing program 2: 23:09:13 executing program 0: 23:09:13 executing program 4: 23:09:13 executing program 5: 23:09:13 executing program 1: 23:09:13 executing program 3: 23:09:13 executing program 2: 23:09:13 executing program 0: 23:09:13 executing program 4: 23:09:14 executing program 5: 23:09:14 executing program 3: 23:09:14 executing program 1: 23:09:14 executing program 4: 23:09:14 executing program 2: 23:09:14 executing program 0: 23:09:14 executing program 5: 23:09:14 executing program 3: 23:09:14 executing program 1: 23:09:14 executing program 4: 23:09:14 executing program 2: 23:09:14 executing program 5: 23:09:14 executing program 3: 23:09:14 executing program 0: 23:09:14 executing program 1: 23:09:14 executing program 4: 23:09:14 executing program 2: 23:09:14 executing program 0: 23:09:14 executing program 4: 23:09:14 executing program 5: 23:09:14 executing program 1: 23:09:14 executing program 3: 23:09:14 executing program 0: 23:09:14 executing program 2: 23:09:14 executing program 3: 23:09:14 executing program 1: 23:09:14 executing program 5: 23:09:14 executing program 4: 23:09:14 executing program 0: 23:09:14 executing program 2: 23:09:14 executing program 3: 23:09:14 executing program 5: 23:09:14 executing program 1: 23:09:14 executing program 4: 23:09:14 executing program 0: 23:09:14 executing program 2: 23:09:15 executing program 5: 23:09:15 executing program 1: 23:09:15 executing program 3: 23:09:15 executing program 4: 23:09:15 executing program 0: 23:09:15 executing program 2: 23:09:15 executing program 1: 23:09:15 executing program 5: 23:09:15 executing program 3: 23:09:15 executing program 4: 23:09:15 executing program 0: 23:09:15 executing program 2: 23:09:15 executing program 5: 23:09:15 executing program 1: 23:09:15 executing program 4: 23:09:15 executing program 3: 23:09:15 executing program 1: 23:09:15 executing program 2: 23:09:15 executing program 0: 23:09:15 executing program 5: 23:09:15 executing program 2: 23:09:15 executing program 3: 23:09:15 executing program 4: 23:09:15 executing program 1: 23:09:15 executing program 0: 23:09:15 executing program 5: 23:09:15 executing program 1: 23:09:15 executing program 2: 23:09:15 executing program 4: 23:09:15 executing program 3: 23:09:15 executing program 1: 23:09:15 executing program 0: 23:09:15 executing program 5: 23:09:15 executing program 2: 23:09:15 executing program 4: 23:09:15 executing program 3: 23:09:16 executing program 1: 23:09:16 executing program 0: 23:09:16 executing program 4: 23:09:16 executing program 5: 23:09:16 executing program 2: 23:09:16 executing program 3: 23:09:16 executing program 5: 23:09:16 executing program 3: 23:09:16 executing program 1: 23:09:16 executing program 0: 23:09:16 executing program 2: 23:09:16 executing program 4: 23:09:16 executing program 5: 23:09:16 executing program 4: 23:09:16 executing program 3: 23:09:16 executing program 0: 23:09:16 executing program 1: 23:09:16 executing program 2: 23:09:16 executing program 5: 23:09:16 executing program 4: 23:09:16 executing program 1: 23:09:16 executing program 2: 23:09:16 executing program 0: 23:09:16 executing program 3: 23:09:16 executing program 4: 23:09:16 executing program 5: 23:09:16 executing program 0: 23:09:16 executing program 1: 23:09:16 executing program 2: 23:09:16 executing program 3: 23:09:16 executing program 4: 23:09:17 executing program 5: 23:09:17 executing program 1: 23:09:17 executing program 2: 23:09:17 executing program 3: 23:09:17 executing program 0: 23:09:17 executing program 4: 23:09:17 executing program 5: 23:09:17 executing program 1: 23:09:17 executing program 2: 23:09:17 executing program 3: 23:09:17 executing program 0: 23:09:17 executing program 4: 23:09:17 executing program 5: 23:09:17 executing program 1: 23:09:17 executing program 2: 23:09:17 executing program 3: 23:09:17 executing program 4: 23:09:17 executing program 0: 23:09:17 executing program 2: 23:09:17 executing program 1: 23:09:17 executing program 5: 23:09:17 executing program 3: 23:09:17 executing program 4: 23:09:17 executing program 0: 23:09:17 executing program 2: 23:09:17 executing program 5: 23:09:17 executing program 1: 23:09:17 executing program 3: 23:09:17 executing program 1: 23:09:17 executing program 0: 23:09:17 executing program 4: 23:09:17 executing program 5: 23:09:17 executing program 2: 23:09:18 executing program 3: 23:09:18 executing program 1: 23:09:18 executing program 0: 23:09:18 executing program 5: 23:09:18 executing program 4: 23:09:18 executing program 2: 23:09:18 executing program 0: 23:09:18 executing program 1: 23:09:18 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000000)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r0, 0x1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000080)=0x8) 23:09:18 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) migrate_pages(r1, 0x0, 0x0, 0x0) 23:09:18 executing program 4: syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='sunit=0x']) 23:09:18 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000140)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x0, @dev}}}, 0xa0) 23:09:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='illinois\x00', 0x9) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffdc0, 0x20001732, &(0x7f00000003c0)={0x2, 0x4e20, @local}, 0x4a) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000100)=""/90, 0xffffffffffffff5e, 0x1010c, 0x0, 0xfffffe59) 23:09:18 executing program 1: unshare(0x40000000) mmap(&(0x7f0000910000/0x1000)=nil, 0x1000, 0x3, 0xbf5527e3e5ea793d, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x4e21, 0x801, @mcast2, 0x20000000}, {0xa, 0xffff, 0x0, @private2}, 0x0, [0x9, 0x7, 0x0, 0xffff, 0xfffffffc, 0x0, 0x6]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x4e20, 0x3a, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3f}, {0xa, 0x4e24, 0x0, @mcast1, 0x3ff}, 0x7, [0x3, 0x2, 0x1, 0x1, 0x4d0e, 0x800, 0x8, 0x8ab4]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, 0x0, 0x0) 23:09:18 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, 0x3b) [ 299.074879][T10798] xfs: Bad value for 'sunit' 23:09:18 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="0201a9ffffff0a100000ff45ac0000ffffff820008000000000000000240605d8714a7ed08d11400ffffff", 0x2b, 0x1c0}]) 23:09:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000080)=0x4000000) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000008}, 0xc, 0x0}, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x40000007, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_bp={&(0x7f0000000200)}, 0x8, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:09:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg(r0, &(0x7f0000002b80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000140)=@l2tp={0x2, 0x0, @local}, 0x80, 0x0, 0x0, &(0x7f0000002540)=[{0xc}, {0xc}], 0x18}}], 0x2, 0x0) [ 299.127703][T10805] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 299.156828][T10809] IPVS: ftp: loaded support on port[0] = 21 [ 299.206609][T10798] xfs: Bad value for 'sunit' 23:09:18 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f0000001640)=[{0x0, 0x0, 0xffffff7f}, {&(0x7f00000003c0)="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", 0x12c, 0xc3}, {&(0x7f00000013c0)="2a7f8bf35cf78d3235983c492885659105a49d6aa8369cb50e5e12b0b7eea0e2962fb029afa502ccb53509115d3dba2da1ef7195a25dd0066168b6fabcb231ce570cb9ce21ece1f3e43526243d727423ed2ed2c979e25f54ab160213afb9d0e3b587ea88e2efe9dcb92fe24babc5755bc0eaf980b872d30871e5c99192c61e27a2211845066734e831cb1615471a79b6b8c9fdbbcd90174929f50ad2e33ab476e677b5ab89132786702b7edce1c282325585196b65a4b2f659b4531d5678c5f69455161a1b4e3f1ee762698d7771f283958af6075d02dc54646c913e4977904f40bbcdd269", 0xe5, 0xf0}]) [ 299.259553][T10809] IPVS: ftp: loaded support on port[0] = 21 23:09:18 executing program 4: io_setup(0xa, &(0x7f0000000080)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x806, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'\x00', 0x20000005002}) io_submit(r0, 0x8, &(0x7f0000000280)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000040), 0xa}]) [ 299.329659][T10836] Dev loop2: unable to read RDB block 1 [ 299.335389][T10836] loop2: unable to read partition table [ 299.361642][T10836] loop2: partition table beyond EOD, truncated [ 299.368691][T10836] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 23:09:18 executing program 1: unshare(0x40000000) mmap(&(0x7f0000910000/0x1000)=nil, 0x1000, 0x3, 0xbf5527e3e5ea793d, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x4e21, 0x801, @mcast2, 0x20000000}, {0xa, 0xffff, 0x0, @private2}, 0x0, [0x9, 0x7, 0x0, 0xffff, 0xfffffffc, 0x0, 0x6]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x4e20, 0x3a, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3f}, {0xa, 0x4e24, 0x0, @mcast1, 0x3ff}, 0x7, [0x3, 0x2, 0x1, 0x1, 0x4d0e, 0x800, 0x8, 0x8ab4]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, 0x0, 0x0) [ 299.418611][T10848] kvm [10840]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x40000006 [ 299.442738][T10848] kvm [10840]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x40000058 [ 299.452110][T10848] kvm [10840]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x4000006e [ 299.463280][T10848] kvm [10840]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x40000018 [ 299.472492][T10848] kvm [10840]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x40000034 [ 299.482209][T10848] kvm [10840]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x4000006c [ 299.491160][T10848] kvm [10840]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x40000024 [ 299.500093][T10848] kvm [10840]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x40000004 [ 299.508926][T10848] kvm [10840]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x40000040 23:09:19 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f0000001640)=[{0x0, 0x0, 0xffffff7f}, {&(0x7f00000003c0)="90a73d881894196a139b7449e8697cd53ea9b887370e13601af6d75f988a746d937dbee24b361f81c65e0b82b65253fcfb2aa6037df6838f86ed79cb43432b487e0834b6c1461cee7fb895d926c04c94246d1a9efcbe57fdd4e6e2f5984b97c82ba20e3eb63d44fd671c7c757376292ed351627427709d58e2b6de9bcdf4e8baac02d558f58874f7f22ecba84397b1cd752b371b6438e4b3a6b96be2f3af77f4c867b518b93d5abd9130896e062997682f681b69b6fc1ef631851713195c4ecc8d29e98bae804cc8b6fd0836590f7986f0743b596d2c80b3380f708782fec41afba68a0fa807a7e7978b82771edae1a10e0bec93a6d5b6995fa9422d4a5d752f44bae2a657fd3876de9ddb9f5014e6bb02ac89778d8e3e8e8f8871dacefe532e3ae922e46bc43fe77050fd39", 0x12c, 0xc3}, {&(0x7f00000013c0)="2a7f8bf35cf78d3235983c492885659105a49d6aa8369cb50e5e12b0b7eea0e2962fb029afa502ccb53509115d3dba2da1ef7195a25dd0066168b6fabcb231ce570cb9ce21ece1f3e43526243d727423ed2ed2c979e25f54ab160213afb9d0e3b587ea88e2efe9dcb92fe24babc5755bc0eaf980b872d30871e5c99192c61e27a2211845066734e831cb1615471a79b6b8c9fdbbcd90174929f50ad2e33ab476e677b5ab89132786702b7edce1c282325585196b65a4b2f659b4531d5678c5f69455161a1b4e3f1ee762698d7771f283958af6075d02dc54646c913e4977904f40bbcdd269", 0xe5, 0xf0}]) 23:09:19 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="0201a9ffffff0a100000ff45ac0000ffffff820008000000000000000240605d8714a7ed08d11400ffffff", 0x2b, 0x1c0}]) [ 299.576968][ T44] tipc: TX() has been purged, node left! [ 299.601107][T10895] IPVS: ftp: loaded support on port[0] = 21 [ 299.616472][T10871] kvm [10840]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x40000006 23:09:19 executing program 3: ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "549b2241f34d761e"}) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00', 0x1f}) dup(0xffffffffffffffff) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) [ 299.778815][T10925] Dev loop2: unable to read RDB block 1 [ 299.784650][T10925] loop2: unable to read partition table [ 299.790479][T10925] loop2: partition table beyond EOD, truncated [ 299.797984][T10925] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 23:09:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='illinois\x00', 0x9) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffdc0, 0x20001732, &(0x7f00000003c0)={0x2, 0x4e20, @local}, 0x4a) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000100)=""/90, 0xffffffffffffff5e, 0x1010c, 0x0, 0xfffffe59) 23:09:19 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x1000c}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0017010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b383600543ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e8189d0f8969b72d9c65400"}, 0x80) getsockname$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x7, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 23:09:19 executing program 1: unshare(0x40000000) mmap(&(0x7f0000910000/0x1000)=nil, 0x1000, 0x3, 0xbf5527e3e5ea793d, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x4e21, 0x801, @mcast2, 0x20000000}, {0xa, 0xffff, 0x0, @private2}, 0x0, [0x9, 0x7, 0x0, 0xffff, 0xfffffffc, 0x0, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x4e20, 0x3a, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3f}, {0xa, 0x4e24, 0x0, @mcast1, 0x3ff}, 0x7, [0x3, 0x2, 0x1, 0x1, 0x4d0e, 0x800, 0x8, 0x8ab4]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, 0x0, 0x0) 23:09:19 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f0000001640)=[{0x0, 0x0, 0xffffff7f}, {&(0x7f00000003c0)="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", 0x12c, 0xc3}, {&(0x7f00000013c0)="2a7f8bf35cf78d3235983c492885659105a49d6aa8369cb50e5e12b0b7eea0e2962fb029afa502ccb53509115d3dba2da1ef7195a25dd0066168b6fabcb231ce570cb9ce21ece1f3e43526243d727423ed2ed2c979e25f54ab160213afb9d0e3b587ea88e2efe9dcb92fe24babc5755bc0eaf980b872d30871e5c99192c61e27a2211845066734e831cb1615471a79b6b8c9fdbbcd90174929f50ad2e33ab476e677b5ab89132786702b7edce1c282325585196b65a4b2f659b4531d5678c5f69455161a1b4e3f1ee762698d7771f283958af6075d02dc54646c913e4977904f40bbcdd269", 0xe5, 0xf0}]) 23:09:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='illinois\x00', 0x9) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffdc0, 0x20001732, &(0x7f00000003c0)={0x2, 0x4e20, @local}, 0x4a) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000100)=""/90, 0xffffffffffffff5e, 0x1010c, 0x0, 0xfffffe59) [ 300.029414][T10937] IPVS: ftp: loaded support on port[0] = 21 [ 300.067408][T10953] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 300.100088][T10937] IPVS: ftp: loaded support on port[0] = 21 23:09:19 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f0000001640)=[{0x0, 0x0, 0xffffff7f}, {&(0x7f00000003c0)="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", 0x12c, 0xc3}, {&(0x7f00000013c0)="2a7f8bf35cf78d3235983c492885659105a49d6aa8369cb50e5e12b0b7eea0e2962fb029afa502ccb53509115d3dba2da1ef7195a25dd0066168b6fabcb231ce570cb9ce21ece1f3e43526243d727423ed2ed2c979e25f54ab160213afb9d0e3b587ea88e2efe9dcb92fe24babc5755bc0eaf980b872d30871e5c99192c61e27a2211845066734e831cb1615471a79b6b8c9fdbbcd90174929f50ad2e33ab476e677b5ab89132786702b7edce1c282325585196b65a4b2f659b4531d5678c5f69455161a1b4e3f1ee762698d7771f283958af6075d02dc54646c913e4977904f40bbcdd269", 0xe5, 0xf0}]) 23:09:19 executing program 5: syz_read_part_table(0x0, 0x0, 0x0) 23:09:20 executing program 5: syz_read_part_table(0x0, 0x0, 0x0) 23:09:20 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000001640)=[{&(0x7f00000000c0)="df6cc3446720d497a11063c445c9bed29fdc01448a1b758b8a7655a6e7d786b8d391c272fc3810fbbdf5a36b4d17ca81a2c54231d040d2c22cece3740a10a1e882ea96ca38804a352fadd21e416fcd349ab43c045402662c5ddae5b0d2612329d64e53e561b60b303d29aa6f335d5adb0f14f4e86b94ec7c895f1a9e476c89fd03c4f6ec1a26dcf9013a92e92aa4b8c3134351806334ee05ddbf5bf487796d86de8bd17d780a", 0xa6}]) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "0000004de70008000000de0016e193b8ee0023"}) r1 = syz_open_pts(r0, 0x1) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) dup3(r1, r0, 0x0) 23:09:20 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0x0) 23:09:20 executing program 5: syz_read_part_table(0x0, 0x0, 0x0) [ 301.865009][T10931] ================================================================== [ 301.873113][T10931] BUG: KCSAN: data-race in snd_seq_check_queue / snd_seq_control_queue [ 301.881332][T10931] [ 301.883669][T10931] write to 0xffff88811e71b2a4 of 1 bytes by interrupt on cpu 1: [ 301.891277][T10931] snd_seq_control_queue+0x15a/0x320 [ 301.896538][T10931] event_input_timer+0x29/0x40 [ 301.901328][T10931] snd_seq_deliver_single_event.constprop.0+0x403/0x500 [ 301.908257][T10931] snd_seq_deliver_event+0x2eb/0x4b0 [ 301.913535][T10931] snd_seq_dispatch_event+0x9d/0x300 [ 301.918799][T10931] snd_seq_check_queue+0xf1/0x250 [ 301.923799][T10931] snd_seq_timer_interrupt+0x222/0x260 [ 301.929234][T10931] snd_timer_process_callbacks+0x1eb/0x230 [ 301.935030][T10931] snd_timer_interrupt+0x488/0x950 [ 301.940154][T10931] snd_hrtimer_callback+0x188/0x250 [ 301.945330][T10931] __hrtimer_run_queues+0x271/0x600 [ 301.950503][T10931] hrtimer_interrupt+0x226/0x490 [ 301.955419][T10931] smp_apic_timer_interrupt+0xd8/0x270 [ 301.960875][T10931] apic_timer_interrupt+0xf/0x20 [ 301.965811][T10931] __tsan_read1+0x6d/0x110 [ 301.970232][T10931] strcmp+0x27/0x70 [ 301.974033][T10931] kernfs_dop_revalidate+0x137/0x230 [ 301.979311][T10931] lookup_fast+0x22a/0x3a0 [ 301.983704][T10931] walk_component+0x6a/0x390 [ 301.988288][T10931] link_path_walk.part.0+0x469/0x700 [ 301.993565][T10931] path_lookupat.isra.0+0x75/0x350 [ 301.998667][T10931] filename_lookup+0x145/0x2c0 [ 302.003406][T10931] user_path_at_empty+0x47/0x60 [ 302.008249][T10931] vfs_statx+0xdb/0x190 [ 302.012403][T10931] __do_sys_newlstat+0x50/0xb0 [ 302.017143][T10931] __x64_sys_newlstat+0x37/0x50 [ 302.021974][T10931] do_syscall_64+0xc7/0x3b0 [ 302.026474][T10931] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 302.032354][T10931] [ 302.034664][T10931] read to 0xffff88811e71b2a4 of 1 bytes by task 10931 on cpu 0: [ 302.042286][T10931] snd_seq_check_queue+0x67/0x250 [ 302.047302][T10931] snd_seq_enqueue_event+0x15a/0x2a0 [ 302.052566][T10931] snd_seq_client_enqueue_event.constprop.0+0x187/0x2a0 [ 302.059486][T10931] snd_seq_write+0x227/0x4e0 [ 302.064056][T10931] __vfs_write+0x58/0xb0 [ 302.068286][T10931] vfs_write+0x189/0x380 [ 302.072503][T10931] ksys_write+0x16a/0x1a0 [ 302.076821][T10931] __x64_sys_write+0x49/0x60 [ 302.081413][T10931] do_syscall_64+0xc7/0x3b0 [ 302.085893][T10931] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 302.091755][T10931] [ 302.094073][T10931] Reported by Kernel Concurrency Sanitizer on: [ 302.100221][T10931] CPU: 0 PID: 10931 Comm: syz-executor.3 Not tainted 5.7.0-rc1-syzkaller #0 [ 302.108878][T10931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.118918][T10931] ================================================================== [ 302.126955][T10931] Kernel panic - not syncing: panic_on_warn set ... [ 302.133531][T10931] CPU: 0 PID: 10931 Comm: syz-executor.3 Not tainted 5.7.0-rc1-syzkaller #0 [ 302.142171][T10931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.152220][T10931] Call Trace: [ 302.155491][T10931] dump_stack+0x11d/0x187 [ 302.159801][T10931] panic+0x210/0x640 [ 302.163694][T10931] ? vprintk_func+0x89/0x13a [ 302.168260][T10931] kcsan_report.cold+0xc/0x1a [ 302.172934][T10931] kcsan_setup_watchpoint+0x3fb/0x440 [ 302.178297][T10931] snd_seq_check_queue+0x67/0x250 [ 302.183305][T10931] snd_seq_enqueue_event+0x15a/0x2a0 [ 302.188577][T10931] ? queueptr+0x84/0x90 [ 302.192716][T10931] snd_seq_client_enqueue_event.constprop.0+0x187/0x2a0 [ 302.199631][T10931] snd_seq_write+0x227/0x4e0 [ 302.204205][T10931] ? snd_seq_kernel_client_enqueue+0x160/0x160 [ 302.210377][T10931] __vfs_write+0x58/0xb0 [ 302.214625][T10931] vfs_write+0x189/0x380 [ 302.218876][T10931] ksys_write+0x16a/0x1a0 [ 302.223197][T10931] __x64_sys_write+0x49/0x60 [ 302.227772][T10931] do_syscall_64+0xc7/0x3b0 [ 302.232271][T10931] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 302.238139][T10931] RIP: 0033:0x45ca29 [ 302.242034][T10931] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 302.261635][T10931] RSP: 002b:00007f92ce722c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 302.270023][T10931] RAX: ffffffffffffffda RBX: 000000000050d2c0 RCX: 000000000045ca29 [ 302.277990][T10931] RDX: 00000000fffffee4 RSI: 00000000200000c0 RDI: 0000000000000003 [ 302.285956][T10931] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 302.293904][T10931] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 302.301871][T10931] R13: 0000000000000d12 R14: 00000000004cf641 R15: 00007f92ce7236d4 [ 303.415971][T10931] Shutting down cpus with NMI [ 303.421956][T10931] Kernel Offset: disabled [ 303.426276][T10931] Rebooting in 86400 seconds..