Warning: Permanently added '[localhost]:27560' (ECDSA) to the list of known hosts. 2020/02/22 17:20:53 fuzzer started 2020/02/22 17:20:56 dialing manager at 10.0.2.10:42011 2020/02/22 17:20:56 syscalls: 2989 2020/02/22 17:20:56 code coverage: enabled 2020/02/22 17:20:56 comparison tracing: enabled 2020/02/22 17:20:56 extra coverage: enabled 2020/02/22 17:20:56 setuid sandbox: enabled 2020/02/22 17:20:56 namespace sandbox: enabled 2020/02/22 17:20:56 Android sandbox: /sys/fs/selinux/policy does not exist 2020/02/22 17:20:56 fault injection: enabled 2020/02/22 17:20:56 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/02/22 17:20:56 net packet injection: enabled 2020/02/22 17:20:56 net device setup: enabled 2020/02/22 17:20:56 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/02/22 17:20:56 devlink PCI setup: PCI device 0000:00:10.0 is not available 17:21:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes)\x00'}, 0x58) 17:21:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='clear_refs\x00') syncfs(r0) 17:21:51 executing program 2: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000000240)='./bus\x00', 0x105100, 0x0) read(r0, &(0x7f0000000180)=""/19, 0xfffffe47) syzkaller login: [ 221.407345][ T9057] IPVS: ftp: loaded support on port[0] = 21 [ 221.407461][ T9058] IPVS: ftp: loaded support on port[0] = 21 17:21:52 executing program 3: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0xe9, &(0x7f0000000980)=[{&(0x7f0000000000)="240000004f0007031dfffd946fa2830020020a0009000800001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 221.667314][ T9061] IPVS: ftp: loaded support on port[0] = 21 [ 221.942251][ T9057] chnl_net:caif_netlink_parms(): no params data found [ 221.955821][ T9062] IPVS: ftp: loaded support on port[0] = 21 [ 221.981898][ T9058] chnl_net:caif_netlink_parms(): no params data found [ 222.224870][ T9057] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.251545][ T9057] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.272339][ T9057] device bridge_slave_0 entered promiscuous mode [ 222.346062][ T9057] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.358629][ T9057] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.371489][ T9057] device bridge_slave_1 entered promiscuous mode [ 222.397204][ T9058] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.406375][ T9058] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.416859][ T9058] device bridge_slave_0 entered promiscuous mode [ 222.448700][ T9058] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.459237][ T9058] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.470443][ T9058] device bridge_slave_1 entered promiscuous mode [ 222.497800][ T9057] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 222.517322][ T9057] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 222.534095][ T9058] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 222.550974][ T9058] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 222.576632][ T9061] chnl_net:caif_netlink_parms(): no params data found [ 222.607423][ T9057] team0: Port device team_slave_0 added [ 222.625317][ T9057] team0: Port device team_slave_1 added [ 222.661569][ T9058] team0: Port device team_slave_0 added [ 222.690879][ T9058] team0: Port device team_slave_1 added [ 222.751400][ T9057] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 222.764984][ T9057] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 222.812296][ T9057] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 222.890079][ T9058] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 222.920396][ T9058] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 223.008296][ T9058] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 223.030640][ T9057] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 223.045888][ T9057] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 223.102890][ T9057] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 223.162216][ T9058] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 223.174521][ T9058] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 223.242447][ T9058] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 223.286297][ T9061] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.300931][ T9061] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.314431][ T9061] device bridge_slave_0 entered promiscuous mode [ 223.329069][ T9062] chnl_net:caif_netlink_parms(): no params data found [ 223.360831][ T9061] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.379341][ T9061] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.393059][ T9061] device bridge_slave_1 entered promiscuous mode [ 223.482890][ T9057] device hsr_slave_0 entered promiscuous mode [ 223.531128][ T9057] device hsr_slave_1 entered promiscuous mode [ 223.624101][ T9061] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 223.732259][ T9058] device hsr_slave_0 entered promiscuous mode [ 223.809967][ T9058] device hsr_slave_1 entered promiscuous mode [ 223.862171][ T9058] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 223.872759][ T9058] Cannot create hsr debugfs directory [ 223.892341][ T9061] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 223.968441][ T9061] team0: Port device team_slave_0 added [ 224.008525][ T9061] team0: Port device team_slave_1 added [ 224.021918][ T9062] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.032557][ T9062] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.045312][ T9062] device bridge_slave_0 entered promiscuous mode [ 224.096448][ T9062] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.118104][ T9062] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.143572][ T9062] device bridge_slave_1 entered promiscuous mode [ 224.185442][ T9061] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 224.196435][ T9061] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 224.235756][ T9061] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 224.270387][ T9061] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 224.281661][ T9061] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 224.329060][ T9061] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 224.354108][ T9062] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 224.378035][ T9062] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 224.419198][ T9062] team0: Port device team_slave_0 added [ 224.467131][ T9062] team0: Port device team_slave_1 added [ 224.582798][ T9061] device hsr_slave_0 entered promiscuous mode [ 224.630405][ T9061] device hsr_slave_1 entered promiscuous mode [ 224.709755][ T9061] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 224.722955][ T9061] Cannot create hsr debugfs directory [ 224.739431][ T9062] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 224.753990][ T9062] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 224.822782][ T9062] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 224.856463][ T9062] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 224.868746][ T9062] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 224.910012][ T9062] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 224.978155][ T9058] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 225.050598][ T9058] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 225.182240][ T9062] device hsr_slave_0 entered promiscuous mode [ 225.270000][ T9062] device hsr_slave_1 entered promiscuous mode [ 225.349847][ T9062] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 225.385516][ T9062] Cannot create hsr debugfs directory [ 225.420414][ T9058] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 225.525770][ T9058] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 225.651709][ T9057] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 225.715512][ T9057] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 225.811331][ T9057] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 225.882557][ T9057] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 226.033156][ T9061] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 226.113630][ T9061] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 226.213193][ T9061] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 226.333306][ T9061] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 226.487496][ T9062] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 226.578416][ T9062] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 226.658137][ T9062] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 226.715149][ T9062] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 226.901942][ T9057] 8021q: adding VLAN 0 to HW filter on device bond0 [ 226.926061][ T9058] 8021q: adding VLAN 0 to HW filter on device bond0 [ 226.954223][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 226.968324][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 226.989129][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 227.015317][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.053970][ T9057] 8021q: adding VLAN 0 to HW filter on device team0 [ 227.076740][ T9058] 8021q: adding VLAN 0 to HW filter on device team0 [ 227.099333][ T1242] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.118334][ T1242] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.144271][ T1242] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.164128][ T1242] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.188519][ T1242] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.203322][ T1242] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.215244][ T1242] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.228295][ T1242] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.245331][ T1242] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 227.256785][ T1242] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 227.278241][ T1242] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 227.308361][ T1242] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.339233][ T1242] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.355482][ T1242] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.367624][ T1242] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 227.381334][ T1242] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.393624][ T1242] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.405335][ T1242] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.438446][ T9061] 8021q: adding VLAN 0 to HW filter on device bond0 [ 227.453970][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 227.468561][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 227.487900][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 227.515178][ T9062] 8021q: adding VLAN 0 to HW filter on device bond0 [ 227.533063][ T1242] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 227.558051][ T1242] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 227.585444][ T1242] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.618172][ T1242] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 227.645620][ T1242] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 227.690263][ T1242] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 227.740512][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 227.791523][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 227.835750][ T9061] 8021q: adding VLAN 0 to HW filter on device team0 [ 227.883718][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 227.925325][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 227.967304][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 227.999471][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 228.042072][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 228.079023][ T9062] 8021q: adding VLAN 0 to HW filter on device team0 [ 228.105676][ T4015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 228.130161][ T4015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 228.182429][ T9057] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 228.228182][ T9057] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 228.288451][ T4015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 228.325389][ T4015] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 228.368977][ T4015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 228.402784][ T4015] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.422154][ T4015] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.437893][ T4015] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.457675][ T4015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 228.478944][ T4015] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 228.495584][ T4015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 228.518231][ T4015] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 228.539166][ T4015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.557712][ T4015] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.577242][ T4015] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.599858][ T4015] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.616498][ T4015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 228.634620][ T4015] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 228.665067][ T4015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 228.693666][ T4015] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.726336][ T4015] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.761308][ T4015] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.783029][ T4015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 228.805925][ T4015] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 228.826066][ T4015] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.840004][ T4015] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.861996][ T9058] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 228.902943][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.932201][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.951295][ T18] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.970913][ T18] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.986244][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 229.008046][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 229.030642][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 229.051285][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 229.089305][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 229.131213][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 229.171249][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 229.223571][ T9057] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 229.273461][ T9082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 229.320415][ T9082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 229.365760][ T9082] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 229.425974][ T9062] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 229.457578][ T9062] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 229.512846][ T9082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 229.544270][ T9082] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 229.568592][ T9082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 229.585474][ T9082] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 229.606490][ T9082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 229.630811][ T9082] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 229.652460][ T9082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 229.669066][ T9082] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 229.693727][ T9082] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 229.717986][ T9082] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 229.736888][ T9082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 229.759242][ T9082] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 229.783056][ T9082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 229.814569][ T9082] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 229.838514][ T9082] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 229.856222][ T9082] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 229.875360][ T9058] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 229.890000][ T9061] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 229.911729][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 229.924501][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 229.942124][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 229.953412][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 229.980728][ T3172] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 229.992667][ T3172] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 230.020139][ T9061] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 230.037289][ T9057] device veth0_vlan entered promiscuous mode [ 230.050528][ T9062] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 230.062777][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 230.079978][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 230.097541][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 230.120398][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 230.145340][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 230.160703][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 230.182202][ T9057] device veth1_vlan entered promiscuous mode [ 230.209012][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 230.220877][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 230.232622][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 230.245462][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 230.265670][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 230.278324][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 230.291189][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 230.304592][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 230.317503][ T9058] device veth0_vlan entered promiscuous mode [ 230.338878][ T4015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 230.359030][ T4015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 230.395001][ T4015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 230.410526][ T4015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 230.425208][ T4015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 230.437224][ T4015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 230.451624][ T9058] device veth1_vlan entered promiscuous mode [ 230.463388][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 230.477458][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 230.497069][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 230.513935][ T9057] device veth0_macvtap entered promiscuous mode [ 230.523733][ T9061] device veth0_vlan entered promiscuous mode [ 230.533107][ T3172] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 230.549423][ T3172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 230.563121][ T3172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 230.584301][ T3172] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 230.599961][ T3172] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 230.611397][ T9062] device veth0_vlan entered promiscuous mode [ 230.629806][ T9057] device veth1_macvtap entered promiscuous mode [ 230.647654][ T9061] device veth1_vlan entered promiscuous mode [ 230.667421][ T9062] device veth1_vlan entered promiscuous mode [ 230.705900][ T9057] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 230.718082][ T3172] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 230.727983][ T3172] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 230.738890][ T3172] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 230.749336][ T3172] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 230.760089][ T3172] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 230.770197][ T3172] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 230.780059][ T3172] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 230.791400][ T3172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 230.802329][ T3172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 230.813623][ T3172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 230.827645][ T9057] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 230.844265][ T9058] device veth0_macvtap entered promiscuous mode [ 230.856169][ T9082] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 230.872767][ T9082] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 230.892437][ T9082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 230.928854][ T9058] device veth1_macvtap entered promiscuous mode [ 230.947758][ T3172] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 230.975362][ T9061] device veth0_macvtap entered promiscuous mode [ 231.009246][ T3172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 231.033804][ T3172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 231.062785][ T3172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 231.079310][ T3172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 231.094360][ T3172] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 231.182612][ T9062] device veth0_macvtap entered promiscuous mode [ 231.203817][ T9058] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 231.247998][ T9058] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 231.290896][ T9058] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 231.323960][ T9061] device veth1_macvtap entered promiscuous mode [ 231.484234][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 231.502536][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 231.522445][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 231.544663][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 231.564852][ T9058] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 231.583038][ T9058] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 231.607144][ T9058] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 231.723551][ T9083] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 231.763471][ T9083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 231.813038][ T9061] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 231.855497][ T9061] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 231.876172][ T9061] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 231.892002][ T9061] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 17:22:02 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setresgid(0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='clear_refs\x00') syz_open_procfs(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) fallocate(0xffffffffffffffff, 0x100000003, 0xfb7d, 0x28120001) r2 = creat(&(0x7f0000000440)='./bus\x00', 0x40) lseek(r2, 0x7ffffc, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x55aa40be, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r4, 0x407, 0x200006) splice(r3, 0x0, r4, 0x0, 0x55aa40be, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r5, 0x407, 0x200006) splice(0xffffffffffffffff, 0x0, r5, 0x0, 0x55aa40be, 0x0) socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000006c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) [ 231.916630][ T9061] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 231.941780][ T9062] device veth1_macvtap entered promiscuous mode [ 231.973157][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 231.997453][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 232.014949][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 232.158220][ T9061] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 232.179189][ T9061] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 232.197833][ T9061] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 232.217955][ T9061] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 232.235719][ T9061] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 232.268762][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 232.284998][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 232.310930][ T9062] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 17:22:02 executing program 1: r0 = timerfd_create(0x7, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) [ 232.341431][ T9062] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 17:22:02 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setresgid(0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='clear_refs\x00') syz_open_procfs(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) fallocate(0xffffffffffffffff, 0x100000003, 0xfb7d, 0x28120001) r2 = creat(&(0x7f0000000440)='./bus\x00', 0x40) lseek(r2, 0x7ffffc, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x55aa40be, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r4, 0x407, 0x200006) splice(r3, 0x0, r4, 0x0, 0x55aa40be, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r5, 0x407, 0x200006) splice(0xffffffffffffffff, 0x0, r5, 0x0, 0x55aa40be, 0x0) socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000006c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 17:22:02 executing program 1: r0 = timerfd_create(0x7, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) [ 232.381486][ T9062] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 17:22:03 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setresgid(0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='clear_refs\x00') syz_open_procfs(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) fallocate(0xffffffffffffffff, 0x100000003, 0xfb7d, 0x28120001) r2 = creat(&(0x7f0000000440)='./bus\x00', 0x40) lseek(r2, 0x7ffffc, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x55aa40be, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r4, 0x407, 0x200006) splice(r3, 0x0, r4, 0x0, 0x55aa40be, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r5, 0x407, 0x200006) splice(0xffffffffffffffff, 0x0, r5, 0x0, 0x55aa40be, 0x0) socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000006c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) [ 232.416480][ T9062] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 232.444386][ T9062] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 232.472705][ T9062] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 232.509264][ T9062] batman_adv: batadv0: Interface activated: batadv_slave_0 17:22:03 executing program 0: mkdir(&(0x7f0000000100)='./control\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000300)='./control\x00', 0x81000050) [ 232.625606][ T9082] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 232.650498][ T9082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 232.667574][ T9062] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 232.684927][ T9062] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 232.701316][ T9062] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 232.716403][ T9062] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 232.730821][ T9062] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 232.745681][ T9062] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 232.760786][ T9062] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 232.775949][ T9082] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 232.787595][ T9082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 17:22:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xa0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000089, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) sendmsg$IPVS_CMD_DEL_SERVICE(r3, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x48, 0x0, 0x3c, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x4}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}]}, 0x48}}, 0x0) [ 233.056721][ T40] audit: type=1804 audit(1582392123.633:31): pid=9132 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/syzkaller-testdir598886418/syzkaller.tKKBVi/0/bus" dev="sda1" ino=16554 res=1 [ 233.103640][ T40] audit: type=1804 audit(1582392123.633:32): pid=9132 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/syzkaller-testdir598886418/syzkaller.tKKBVi/0/bus" dev="sda1" ino=16554 res=1 [ 233.172791][ T9137] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 233.205248][ T0] NOHZ: local_softirq_pending 08 [ 233.261687][ T9140] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 233.283631][ T9140] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 233.303879][ T9140] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 233.325027][ T9141] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 17:22:03 executing program 3: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0xe9, &(0x7f0000000980)=[{&(0x7f0000000000)="240000004f0007031dfffd946fa2830020020a0009000800001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 17:22:03 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgroups(0x0, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) fsetxattr$system_posix_acl(r0, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000100)={{}, {}, [], {}, [{0x8, 0x0, r2}]}, 0x2c, 0x0) 17:22:03 executing program 1: wait4(0x0, 0x0, 0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x0, 0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) ioprio_set$pid(0x2, r0, 0x0) [ 233.391021][ T9149] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 17:22:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f00000025c0)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') [ 233.435272][ T9149] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 17:22:04 executing program 3: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0xe9, &(0x7f0000000980)=[{&(0x7f0000000000)="240000004f0007031dfffd946fa2830020020a0009000800001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 17:22:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r2, &(0x7f0000000200)=ANY=[], 0xffdc) recvmmsg(r2, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000005b00)=[{&(0x7f00000005c0)=""/4106, 0x100a}], 0x1}}], 0x1, 0x0, 0x0) [ 233.481115][ T9157] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 233.497451][ T9157] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 17:22:04 executing program 3: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0xe9, &(0x7f0000000980)=[{&(0x7f0000000000)="240000004f0007031dfffd946fa2830020020a0009000800001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 233.501175][ T9160] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 233.557050][ T9164] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 233.571852][ T9164] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 17:22:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xa0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000089, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) sendmsg$IPVS_CMD_DEL_SERVICE(r3, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x48, 0x0, 0x3c, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x4}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}]}, 0x48}}, 0x0) 17:22:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r2, &(0x7f0000000200)=ANY=[], 0xffdc) recvmmsg(r2, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000005b00)=[{&(0x7f00000005c0)=""/4106, 0x100a}], 0x1}}], 0x1, 0x0, 0x0) 17:22:04 executing program 3: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0xe9, &(0x7f0000000980)=[{&(0x7f0000000000)="240000004f0007031dfffd946fa2830020020a0009000800001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 17:22:04 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgroups(0x0, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) fsetxattr$system_posix_acl(r0, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000100)={{}, {}, [], {}, [{0x8, 0x0, r2}]}, 0x2c, 0x0) 17:22:04 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xe9, &(0x7f0000000980)=[{&(0x7f0000000000)="240000004f0007031dfffd946fa2830020020a0009000800001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 17:22:04 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x208200) getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r3, 0x0) pipe(&(0x7f0000000040)) 17:22:04 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xe9, &(0x7f0000000980)=[{&(0x7f0000000000)="240000004f0007031dfffd946fa2830020020a0009000800001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 17:22:04 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xe9, &(0x7f0000000980)=[{&(0x7f0000000000)="240000004f0007031dfffd946fa2830020020a0009000800001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 17:22:05 executing program 2: clone(0x10008100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000180)) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ptrace(0x10, r0) 17:22:05 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') creat(&(0x7f0000000140)='./file0\x00', 0x0) getdents64(r0, &(0x7f0000000380)=""/87, 0x1f7) getdents64(r0, &(0x7f0000000080)=""/167, 0xa7) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57, 0x39}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x3c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:22:05 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x3}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000a) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) setresgid(0x0, 0x0, 0x0) r4 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r4, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r5 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r5, 0x7ffffc, 0x0) write$binfmt_elf64(r5, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) ioctl$FS_IOC_FIEMAP(r5, 0xc020660b, &(0x7f0000000100)={0x0, 0x78c14229}) r6 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r6, 0x7ffffc, 0x0) 17:22:05 executing program 3: r0 = socket$inet(0x10, 0x0, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0xe9, &(0x7f0000000980)=[{&(0x7f0000000000)="240000004f0007031dfffd946fa2830020020a0009000800001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 17:22:05 executing program 3: r0 = socket$inet(0x10, 0x0, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0xe9, &(0x7f0000000980)=[{&(0x7f0000000000)="240000004f0007031dfffd946fa2830020020a0009000800001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 17:22:05 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') creat(&(0x7f0000000140)='./file0\x00', 0x0) getdents64(r0, &(0x7f0000000380)=""/87, 0x1f7) getdents64(r0, &(0x7f0000000080)=""/167, 0xa7) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57, 0x39}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x3c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:22:05 executing program 3: r0 = socket$inet(0x10, 0x0, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0xe9, &(0x7f0000000980)=[{&(0x7f0000000000)="240000004f0007031dfffd946fa2830020020a0009000800001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 17:22:05 executing program 2: timer_create(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x204) r0 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf\x00\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0x0) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 17:22:05 executing program 3: socket$inet(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xe9, &(0x7f0000000980)=[{&(0x7f0000000000)="240000004f0007031dfffd946fa2830020020a0009000800001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 234.996131][ T9233] ERROR: Domain ' /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /syz-fuzzer /syz-executor.2 proc:/self/fd/3' not defined. 17:22:06 executing program 3: socket$inet(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xe9, &(0x7f0000000980)=[{&(0x7f0000000000)="240000004f0007031dfffd946fa2830020020a0009000800001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 17:22:06 executing program 2: timer_create(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x204) r0 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf\x00\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0x0) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 17:22:06 executing program 0: timer_create(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x204) r0 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf\x00\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0x0) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 17:22:06 executing program 3: socket$inet(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xe9, &(0x7f0000000980)=[{&(0x7f0000000000)="240000004f0007031dfffd946fa2830020020a0009000800001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 235.695511][ T9254] ERROR: Domain ' /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /syz-fuzzer /syz-executor.0 proc:/self/fd/3' not defined. 17:22:08 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0x4}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r0, 0x24000) getrandom(&(0x7f0000000040)=""/87, 0x57, 0x2) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_open_pts(r1, 0x15b201) 17:22:08 executing program 3: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, 0x0, 0x0) 17:22:08 executing program 0: getrandom(&(0x7f0000000040)=""/87, 0x57, 0x2) 17:22:08 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000070002000000f286005b0830"], 0xd) 17:22:08 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fremovexattr(r0, &(0x7f0000000080)=@random={'trusted.', '\x00'}) 17:22:08 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000070002000000f286005b0830"], 0xd) 17:22:08 executing program 3: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, 0x0, 0x0) 17:22:08 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='cgroup\x00', 0x0, 0x0) chdir(&(0x7f0000000440)='./file0\x00') r0 = openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) sendfile(r0, r0, 0x0, 0x80000000a) 17:22:09 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) keyctl$unlink(0x9, 0x0, 0x0) tkill(0x0, 0x0) 17:22:09 executing program 3: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, 0x0, 0x0) 17:22:09 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) read$rfkill(r0, &(0x7f00000000c0), 0x8) 17:22:09 executing program 0: request_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='veth0_to_bond\x00', 0xfffffffffffffffd) 17:22:09 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000540)) creat(0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) socket$inet(0x2, 0x803, 0xa0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4010, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) eventfd2(0x0, 0x0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) stat(0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x881806) r4 = memfd_create(&(0x7f0000000240)='t\bnu\x8c\xc4', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000380)="ea", 0x1}], 0x1, 0x881806) read(r4, &(0x7f0000000000)=""/30, 0xfffffe4c) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) 17:22:09 executing program 3: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 17:22:09 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) read$rfkill(r0, &(0x7f00000000c0), 0x8) 17:22:09 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) keyctl$unlink(0x9, 0x0, 0x0) tkill(0x0, 0x0) 17:22:09 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) pipe(&(0x7f0000000440)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, 0x0, 0x0) write$binfmt_aout(r0, 0x0, 0x0) 17:22:09 executing program 3: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 17:22:09 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) keyctl$unlink(0x9, 0x0, 0x0) tkill(0x0, 0x0) 17:22:09 executing program 3: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 17:22:09 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0x580, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000b85fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x1a100) 17:22:09 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) keyctl$unlink(0x9, 0x0, 0x0) tkill(0x0, 0x0) 17:22:09 executing program 3: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000980)}, 0x0) 17:22:09 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xfffffff0}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) [ 239.001914][ T9350] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 17:22:10 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) dup2(r1, r0) 17:22:10 executing program 3: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000980)}, 0x0) 17:22:10 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xfffffff0}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x40}}, 0x0) 17:22:10 executing program 0: clone(0x10008100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000180)) ptrace(0x10, r0) 17:22:10 executing program 3: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000980)}, 0x0) 17:22:10 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) dup2(r1, r0) [ 239.979255][ T9365] ================================================================== 17:22:10 executing program 3: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000980)=[{0x0}], 0x1}, 0x0) 17:22:10 executing program 0: clone(0x10008100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000180)) ptrace(0x10, r0) [ 240.008418][ T9365] BUG: KASAN: use-after-free in ethnl_update_bitset32.part.0+0x8db/0x1820 [ 240.045110][ T9365] Read of size 4 at addr ffff8880470df83c by task syz-executor.1/9365 [ 240.068299][ T9365] [ 240.068299][ T9365] CPU: 1 PID: 9365 Comm: syz-executor.1 Not tainted 5.6.0-rc2-syzkaller #0 [ 240.139120][ T9365] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 240.189784][ T9365] Call Trace: [ 240.189784][ T9365] dump_stack+0x197/0x210 [ 240.241866][ T9365] ? ethnl_update_bitset32.part.0+0x8db/0x1820 [ 240.241866][ T9365] print_address_description.constprop.0.cold+0xd4/0x30b [ 240.241866][ T9365] ? ethnl_update_bitset32.part.0+0x8db/0x1820 [ 240.340588][ T9365] ? ethnl_update_bitset32.part.0+0x8db/0x1820 [ 240.363399][ T9365] __kasan_report.cold+0x1b/0x32 [ 240.389930][ T9365] ? ethnl_update_bitset32.part.0+0x8db/0x1820 [ 240.409996][ T9365] kasan_report+0x12/0x20 [ 240.419865][ T9365] __asan_report_load4_noabort+0x14/0x20 [ 240.449911][ T9365] ethnl_update_bitset32.part.0+0x8db/0x1820 [ 240.469769][ T9365] ? __mutex_lock+0x458/0x13c0 [ 240.480972][ T9365] ? lock_downgrade+0x920/0x920 [ 240.480972][ T9365] ? ethnl_bitmap32_clear+0x390/0x390 [ 240.530156][ T9365] ? mutex_trylock+0x2d0/0x2d0 [ 240.539685][ T9365] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 240.559756][ T9365] ? ethnl_default_notify+0x6b0/0x6b0 [ 240.579945][ T9365] ? sock_sendmsg+0xd7/0x130 [ 240.599816][ T9365] ethnl_update_bitset+0x4d/0x67 [ 240.619814][ T9365] ethnl_set_linkmodes+0x461/0xc30 [ 240.629790][ T9365] ? lock_downgrade+0x920/0x920 [ 240.639755][ T9365] ? linkmodes_prepare_data+0x2a0/0x2a0 [ 240.649807][ T9365] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 240.659712][ T9365] ? apparmor_cred_prepare+0x7b0/0x7b0 [ 240.669697][ T9365] ? kfree_skbmem+0xfb/0x1c0 [ 240.669697][ T9365] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 240.679699][ T9365] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 240.689754][ T9365] ? security_capable+0x95/0xc0 [ 240.699705][ T9365] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 240.709796][ T9365] ? genl_family_rcv_msg_attrs_parse+0x1c6/0x300 [ 240.719659][ T9365] genl_rcv_msg+0x67d/0xea0 [ 240.729889][ T9365] ? genl_rcv_msg+0x67d/0xea0 [ 240.739612][ T9365] ? genl_family_rcv_msg_attrs_parse+0x300/0x300 [ 240.749977][ T9365] ? __kasan_check_read+0x11/0x20 [ 240.749977][ T9365] ? find_held_lock+0x35/0x130 [ 240.759641][ T9365] netlink_rcv_skb+0x177/0x450 [ 240.769834][ T9365] ? genl_family_rcv_msg_attrs_parse+0x300/0x300 [ 240.769834][ T9365] ? netlink_ack+0xb50/0xb50 [ 240.779712][ T9365] ? __kasan_check_write+0x14/0x20 [ 240.789727][ T9365] ? netlink_deliver_tap+0x248/0xbf0 [ 240.801606][ T9365] genl_rcv+0x29/0x40 [ 240.809721][ T9365] netlink_unicast+0x59e/0x7e0 [ 240.819742][ T9365] ? netlink_attachskb+0x870/0x870 [ 240.829685][ T9365] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 240.839732][ T9365] ? __check_object_size+0x3d/0x437 [ 240.839732][ T9365] netlink_sendmsg+0x91c/0xea0 [ 240.849756][ T9365] ? netlink_unicast+0x7e0/0x7e0 [ 240.860016][ T9365] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 240.860016][ T9365] ? apparmor_socket_sendmsg+0x2a/0x30 [ 240.869768][ T9365] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 240.889817][ T9365] ? security_socket_sendmsg+0x8d/0xc0 [ 240.899890][ T9365] ? netlink_unicast+0x7e0/0x7e0 [ 240.909792][ T9365] sock_sendmsg+0xd7/0x130 [ 240.919605][ T9365] ____sys_sendmsg+0x753/0x880 [ 240.919605][ T9365] ? kernel_sendmsg+0x50/0x50 [ 240.929645][ T9365] ? find_held_lock+0x35/0x130 [ 240.939612][ T9365] ___sys_sendmsg+0x100/0x170 [ 240.939612][ T9365] ? sendmsg_copy_msghdr+0x70/0x70 [ 240.949748][ T9365] ? __kasan_check_read+0x11/0x20 [ 240.960247][ T9365] ? __fget_files+0x359/0x520 [ 240.970067][ T9365] ? ksys_dup3+0x3e0/0x3e0 [ 240.970067][ T9365] ? __fget_light+0x1ad/0x270 [ 240.979738][ T9365] ? __fdget+0x1b/0x20 [ 240.989726][ T9365] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 240.999627][ T9365] __sys_sendmsg+0x105/0x1d0 [ 240.999627][ T9365] ? __sys_sendmsg_sock+0xc0/0xc0 [ 241.009748][ T9365] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 241.019699][ T9365] ? do_fast_syscall_32+0xd1/0xe16 [ 241.019699][ T9365] ? entry_SYSENTER_compat+0x70/0x7f [ 241.029879][ T9365] ? do_fast_syscall_32+0xd1/0xe16 [ 241.040959][ T9365] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 241.049768][ T9365] do_fast_syscall_32+0x27b/0xe16 [ 241.049768][ T9365] entry_SYSENTER_compat+0x70/0x7f [ 241.070024][ T9365] RIP: 0023:0xf7f15e39 [ 241.081409][ T9365] Code: 1d 00 00 00 89 d3 5b 5e 5d c3 8b 04 24 c3 8b 1c 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 241.119809][ T9365] RSP: 002b:00000000f5d100bc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 241.129833][ T9365] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000240 [ 241.139721][ T9365] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 241.149738][ T9365] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 241.169873][ T9365] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 241.179728][ T9365] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 241.199695][ T9365] [ 241.199695][ T9365] The buggy address belongs to the page: [ 241.209675][ T9365] page:ffffea00011c37c0 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 [ 241.219711][ T9365] flags: 0x4fffe0000000000() [ 241.229640][ T9365] raw: 04fffe0000000000 ffffea00011c37c8 ffffea00011c37c8 0000000000000000 [ 241.239609][ T9365] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 241.249723][ T9365] page dumped because: kasan: bad access detected [ 241.259663][ T9365] [ 241.259663][ T9365] Memory state around the buggy address: [ 241.259663][ T9365] ffff8880470df700: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 241.289651][ T9365] ffff8880470df780: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 241.299741][ T9365] >ffff8880470df800: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 241.310435][ T9365] ^ [ 241.319723][ T9365] ffff8880470df880: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 241.329673][ T9365] ffff8880470df900: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 241.339679][ T9365] ================================================================== [ 241.349748][ T9365] Disabling lock debugging due to kernel taint [ 241.372068][ T9365] Kernel panic - not syncing: panic_on_warn set ... [ 241.383387][ T9365] CPU: 1 PID: 9365 Comm: syz-executor.1 Tainted: G B 5.6.0-rc2-syzkaller #0 [ 241.400797][ T9365] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 241.420553][ T9365] Call Trace: [ 241.420553][ T9365] dump_stack+0x197/0x210 [ 241.429709][ T9365] panic+0x2e3/0x75c [ 241.429709][ T9365] ? add_taint.cold+0x16/0x16 [ 241.440644][ T9365] ? ethnl_update_bitset32.part.0+0x8db/0x1820 [ 241.449707][ T9365] ? preempt_schedule+0x4b/0x60 [ 241.460741][ T9365] ? ___preempt_schedule+0x16/0x18 [ 241.460741][ T9365] ? trace_hardirqs_on+0x5e/0x240 [ 241.469786][ T9365] ? ethnl_update_bitset32.part.0+0x8db/0x1820 [ 241.481081][ T9365] end_report+0x47/0x4f [ 241.489802][ T9365] ? ethnl_update_bitset32.part.0+0x8db/0x1820 [ 241.500596][ T9365] __kasan_report.cold+0xe/0x32 [ 241.509694][ T9365] ? ethnl_update_bitset32.part.0+0x8db/0x1820 [ 241.521397][ T9365] kasan_report+0x12/0x20 [ 241.521397][ T9365] __asan_report_load4_noabort+0x14/0x20 [ 241.539933][ T9365] ethnl_update_bitset32.part.0+0x8db/0x1820 [ 241.540917][ T9365] ? __mutex_lock+0x458/0x13c0 [ 241.549742][ T9365] ? lock_downgrade+0x920/0x920 [ 241.549742][ T9365] ? ethnl_bitmap32_clear+0x390/0x390 [ 241.560786][ T9365] ? mutex_trylock+0x2d0/0x2d0 [ 241.569790][ T9365] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 241.580556][ T9365] ? ethnl_default_notify+0x6b0/0x6b0 [ 241.580556][ T9365] ? sock_sendmsg+0xd7/0x130 [ 241.590093][ T9365] ethnl_update_bitset+0x4d/0x67 [ 241.601039][ T9365] ethnl_set_linkmodes+0x461/0xc30 [ 241.609700][ T9365] ? lock_downgrade+0x920/0x920 [ 241.620655][ T9365] ? linkmodes_prepare_data+0x2a0/0x2a0 [ 241.629708][ T9365] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 241.639697][ T9365] ? apparmor_cred_prepare+0x7b0/0x7b0 [ 241.640650][ T9365] ? kfree_skbmem+0xfb/0x1c0 [ 241.650129][ T9365] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 241.660623][ T9365] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 241.669706][ T9365] ? security_capable+0x95/0xc0 [ 241.669706][ T9365] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 241.680572][ T9365] ? genl_family_rcv_msg_attrs_parse+0x1c6/0x300 [ 241.689646][ T9365] genl_rcv_msg+0x67d/0xea0 [ 241.700663][ T9365] ? genl_rcv_msg+0x67d/0xea0 [ 241.709745][ T9365] ? genl_family_rcv_msg_attrs_parse+0x300/0x300 [ 241.720752][ T9365] ? __kasan_check_read+0x11/0x20 [ 241.729717][ T9365] ? find_held_lock+0x35/0x130 [ 241.740804][ T9365] netlink_rcv_skb+0x177/0x450 [ 241.749830][ T9365] ? genl_family_rcv_msg_attrs_parse+0x300/0x300 [ 241.759767][ T9365] ? netlink_ack+0xb50/0xb50 [ 241.770737][ T9365] ? __kasan_check_write+0x14/0x20 [ 241.779744][ T9365] ? netlink_deliver_tap+0x248/0xbf0 [ 241.790924][ T9365] genl_rcv+0x29/0x40 [ 241.790924][ T9365] netlink_unicast+0x59e/0x7e0 [ 241.799642][ T9365] ? netlink_attachskb+0x870/0x870 [ 241.809664][ T9365] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 241.810835][ T9365] ? __check_object_size+0x3d/0x437 [ 241.819603][ T9365] netlink_sendmsg+0x91c/0xea0 [ 241.829772][ T9365] ? netlink_unicast+0x7e0/0x7e0 [ 241.841222][ T9365] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 241.849719][ T9365] ? apparmor_socket_sendmsg+0x2a/0x30 [ 241.860623][ T9365] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 241.869826][ T9365] ? security_socket_sendmsg+0x8d/0xc0 [ 241.879829][ T9365] ? netlink_unicast+0x7e0/0x7e0 [ 241.880702][ T9365] sock_sendmsg+0xd7/0x130 [ 241.889780][ T9365] ____sys_sendmsg+0x753/0x880 [ 241.900655][ T9365] ? kernel_sendmsg+0x50/0x50 [ 241.909801][ T9365] ? find_held_lock+0x35/0x130 [ 241.921210][ T9365] ___sys_sendmsg+0x100/0x170 [ 241.930643][ T9365] ? sendmsg_copy_msghdr+0x70/0x70 [ 241.940747][ T9365] ? __kasan_check_read+0x11/0x20 [ 241.949669][ T9365] ? __fget_files+0x359/0x520 [ 241.960646][ T9365] ? ksys_dup3+0x3e0/0x3e0 [ 241.969810][ T9365] ? __fget_light+0x1ad/0x270 [ 241.980861][ T9365] ? __fdget+0x1b/0x20 [ 241.989999][ T9365] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 242.000947][ T9365] __sys_sendmsg+0x105/0x1d0 [ 242.010114][ T9365] ? __sys_sendmsg_sock+0xc0/0xc0 [ 242.010114][ T9365] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 242.020717][ T9365] ? do_fast_syscall_32+0xd1/0xe16 [ 242.030082][ T9365] ? entry_SYSENTER_compat+0x70/0x7f [ 242.040642][ T9365] ? do_fast_syscall_32+0xd1/0xe16 [ 242.049652][ T9365] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 242.049652][ T9365] do_fast_syscall_32+0x27b/0xe16 [ 242.069726][ T9365] entry_SYSENTER_compat+0x70/0x7f [ 242.079820][ T9365] RIP: 0023:0xf7f15e39 [ 242.081390][ T9365] Code: 1d 00 00 00 89 d3 5b 5e 5d c3 8b 04 24 c3 8b 1c 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 242.120654][ T9365] RSP: 002b:00000000f5d100bc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 242.139626][ T9365] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000240 [ 242.149746][ T9365] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 242.161752][ T9365] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 242.169645][ T9365] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 242.180608][ T9365] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 242.200630][ T9365] Kernel Offset: disabled [ 242.200630][ T9365] Rebooting in 86400 seconds..