[ 42.361718] audit: type=1800 audit(1581555147.763:30): pid=7905 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 46.166157] kauditd_printk_skb: 4 callbacks suppressed [ 46.166173] audit: type=1400 audit(1581555151.593:35): avc: denied { map } for pid=8082 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.63' (ECDSA) to the list of known hosts. 2020/02/13 00:52:38 fuzzer started [ 53.037968] audit: type=1400 audit(1581555158.463:36): avc: denied { map } for pid=8091 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2020/02/13 00:52:40 dialing manager at 10.128.0.105:36187 2020/02/13 00:52:40 syscalls: 2905 2020/02/13 00:52:40 code coverage: enabled 2020/02/13 00:52:40 comparison tracing: enabled 2020/02/13 00:52:40 extra coverage: extra coverage is not supported by the kernel 2020/02/13 00:52:40 setuid sandbox: enabled 2020/02/13 00:52:40 namespace sandbox: enabled 2020/02/13 00:52:40 Android sandbox: /sys/fs/selinux/policy does not exist 2020/02/13 00:52:40 fault injection: enabled 2020/02/13 00:52:40 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/02/13 00:52:40 net packet injection: enabled 2020/02/13 00:52:40 net device setup: enabled 2020/02/13 00:52:40 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/02/13 00:52:40 devlink PCI setup: PCI device 0000:00:10.0 is not available 00:55:52 executing program 0: [ 246.963666] audit: type=1400 audit(1581555352.383:37): avc: denied { map } for pid=8109 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=4465 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 247.147764] IPVS: ftp: loaded support on port[0] = 21 00:55:52 executing program 1: [ 247.276218] chnl_net:caif_netlink_parms(): no params data found [ 247.411802] IPVS: ftp: loaded support on port[0] = 21 [ 247.418461] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.425564] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.441051] device bridge_slave_0 entered promiscuous mode 00:55:52 executing program 2: [ 247.463298] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.470093] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.479114] device bridge_slave_1 entered promiscuous mode [ 247.538102] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 247.567571] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 247.652412] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 247.661706] team0: Port device team_slave_0 added [ 247.672961] chnl_net:caif_netlink_parms(): no params data found [ 247.684391] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 247.691831] team0: Port device team_slave_1 added [ 247.731459] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 247.744505] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 247.769985] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 00:55:53 executing program 3: [ 247.790955] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 247.804849] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 247.831519] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 247.851564] IPVS: ftp: loaded support on port[0] = 21 [ 247.857738] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 247.871954] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 247.987031] device hsr_slave_0 entered promiscuous mode [ 248.024003] device hsr_slave_1 entered promiscuous mode 00:55:53 executing program 4: [ 248.084355] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 248.085397] IPVS: ftp: loaded support on port[0] = 21 [ 248.091701] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 248.105790] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.112173] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.134760] device bridge_slave_0 entered promiscuous mode [ 248.176035] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.182414] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.214562] device bridge_slave_1 entered promiscuous mode [ 248.348014] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 248.361208] chnl_net:caif_netlink_parms(): no params data found [ 248.381325] bond0: Enslaving bond_slave_1 as an active interface with an up link 00:55:53 executing program 5: [ 248.429537] IPVS: ftp: loaded support on port[0] = 21 [ 248.486237] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 248.496696] team0: Port device team_slave_0 added [ 248.529310] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 248.539902] team0: Port device team_slave_1 added [ 248.595098] chnl_net:caif_netlink_parms(): no params data found [ 248.606683] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 248.612958] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 248.638855] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 248.659331] IPVS: ftp: loaded support on port[0] = 21 [ 248.676369] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 248.682653] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 248.708040] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 248.720640] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 248.730237] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 248.765431] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.771890] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.779899] device bridge_slave_0 entered promiscuous mode [ 248.787358] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.793862] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.801085] device bridge_slave_1 entered promiscuous mode [ 248.846403] device hsr_slave_0 entered promiscuous mode [ 248.893857] device hsr_slave_1 entered promiscuous mode [ 248.934588] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 248.955042] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 248.971017] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 249.023499] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 249.054222] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 249.127055] chnl_net:caif_netlink_parms(): no params data found [ 249.136374] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 249.145984] team0: Port device team_slave_0 added [ 249.151121] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.157768] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.165044] device bridge_slave_0 entered promiscuous mode [ 249.197972] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 249.205422] team0: Port device team_slave_1 added [ 249.217238] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.223860] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.230957] device bridge_slave_1 entered promiscuous mode [ 249.252973] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 249.285050] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 249.291430] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 249.317075] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 249.329018] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 249.336153] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 249.362916] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 249.384894] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 249.405605] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 249.426136] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 249.440117] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 249.467513] chnl_net:caif_netlink_parms(): no params data found [ 249.556578] device hsr_slave_0 entered promiscuous mode [ 249.613978] device hsr_slave_1 entered promiscuous mode [ 249.654520] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 249.661960] team0: Port device team_slave_0 added [ 249.668314] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 249.675973] team0: Port device team_slave_1 added [ 249.695672] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 249.708949] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 249.732898] 8021q: adding VLAN 0 to HW filter on device bond0 [ 249.745711] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.752143] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.759490] device bridge_slave_0 entered promiscuous mode [ 249.767471] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.773964] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.781373] device bridge_slave_1 entered promiscuous mode [ 249.788912] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 249.797033] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 249.822828] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 249.834843] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 249.841152] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 249.866488] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 249.897143] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 249.905790] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 249.925494] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 249.986633] device hsr_slave_0 entered promiscuous mode [ 250.024261] device hsr_slave_1 entered promiscuous mode [ 250.076666] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 250.085015] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 250.093059] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 250.108524] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 250.119961] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 250.134790] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 250.142660] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 250.169371] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 250.180524] team0: Port device team_slave_0 added [ 250.204181] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 250.210293] 8021q: adding VLAN 0 to HW filter on device team0 [ 250.227984] 8021q: adding VLAN 0 to HW filter on device bond0 [ 250.234754] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 250.242085] team0: Port device team_slave_1 added [ 250.251139] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.258128] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.269183] device bridge_slave_0 entered promiscuous mode [ 250.296937] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.303447] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.313861] device bridge_slave_1 entered promiscuous mode [ 250.326693] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 250.355448] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 250.362863] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 250.371942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 250.380521] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 250.388423] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.394961] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.403247] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 250.410709] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 250.437370] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 250.451349] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 250.458013] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 250.483949] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 250.497062] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 250.507737] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 250.515226] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 250.523880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 250.531260] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 250.538619] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 250.547612] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 250.566387] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 250.585430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 250.594224] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 250.602114] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.608586] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.617527] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 250.628991] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 250.648832] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 250.662456] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 250.669765] 8021q: adding VLAN 0 to HW filter on device team0 [ 250.676348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 250.684993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 250.692762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 250.700921] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 250.709703] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 250.726643] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 250.734594] team0: Port device team_slave_0 added [ 250.776530] device hsr_slave_0 entered promiscuous mode [ 250.834931] device hsr_slave_1 entered promiscuous mode [ 250.874660] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 250.885272] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 250.892379] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 250.903106] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 250.911740] team0: Port device team_slave_1 added [ 250.928835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 250.938088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 250.951280] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 250.970585] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 250.978795] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 250.985189] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 251.011331] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 251.023817] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 251.030076] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 251.055368] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 251.068501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 251.076333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 251.084184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 251.093396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 251.101484] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.107914] bridge0: port 1(bridge_slave_0) entered forwarding state [ 251.116756] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 251.123152] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 251.136361] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 251.156199] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 251.164593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 251.172955] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 251.182394] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 251.194040] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 251.201934] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 251.224056] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 251.230131] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 251.239021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 251.247596] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 251.255371] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.261724] bridge0: port 2(bridge_slave_1) entered forwarding state [ 251.278820] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 251.325396] device hsr_slave_0 entered promiscuous mode [ 251.383990] device hsr_slave_1 entered promiscuous mode [ 251.429820] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 251.437884] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 251.454994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 251.465417] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 251.476881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 251.513271] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 251.531431] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 251.558965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 251.567253] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 251.593874] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 251.602849] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 251.611395] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 251.618344] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 251.646552] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 251.654027] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 251.661838] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 251.692425] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 251.700699] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 251.709142] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 251.726289] 8021q: adding VLAN 0 to HW filter on device bond0 [ 251.745597] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 251.753774] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 251.761485] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 251.773284] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 251.782448] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 251.793308] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 251.803899] 8021q: adding VLAN 0 to HW filter on device bond0 [ 251.811886] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 251.820995] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 251.830206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 251.843804] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 251.851426] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 251.859222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 251.866669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 251.874622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 251.884322] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 251.890381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 251.902712] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 251.912116] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 251.918524] 8021q: adding VLAN 0 to HW filter on device team0 [ 251.938678] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 251.955932] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 251.964623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 251.971759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 251.979068] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 251.987121] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 251.994988] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.001409] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.008653] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 252.022136] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 252.038605] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 252.050320] 8021q: adding VLAN 0 to HW filter on device team0 [ 252.065031] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 252.074071] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 252.082679] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 252.091588] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 252.099566] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.106017] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.113905] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 252.120674] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 252.128883] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 252.140396] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 252.155350] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 252.165165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 252.172446] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 252.180897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 252.189044] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.195458] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.202908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 252.211271] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 252.219104] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.225603] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.232469] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 252.243141] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 252.251108] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 252.258201] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 252.269418] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 252.283225] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 252.295257] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 252.309411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 252.318170] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 252.341995] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 252.353141] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 252.362175] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 252.370347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 252.379381] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 252.388730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 252.396255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 252.403954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 252.412282] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 252.420826] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 252.428428] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 252.438107] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 252.447596] device veth0_vlan entered promiscuous mode [ 252.460178] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 252.469344] 8021q: adding VLAN 0 to HW filter on device bond0 [ 252.481707] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 252.488294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 252.496472] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 252.504359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 252.512174] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 252.520487] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 252.533866] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 252.546151] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 252.557985] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 252.569604] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 252.577063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 252.585751] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 252.593383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 252.601484] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 252.609472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 252.617465] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 252.628860] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 252.643397] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 252.652160] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 252.661642] device veth1_vlan entered promiscuous mode [ 252.670478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 252.680232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 252.688662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 252.696521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 252.703486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 252.711368] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 252.721802] 8021q: adding VLAN 0 to HW filter on device bond0 [ 252.735093] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 252.741208] 8021q: adding VLAN 0 to HW filter on device team0 [ 252.751834] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 252.770313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 252.779872] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 252.789460] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 252.797038] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 252.811231] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 252.820166] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 252.835534] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 252.842792] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 252.850111] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 252.859576] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 252.866562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 252.875196] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 252.882865] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.889306] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.896602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 252.903647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 252.911386] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 252.917998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 252.929702] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 252.945358] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 252.957465] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 252.965070] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 252.972379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 252.980989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 252.988952] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.995364] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.002725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 253.010702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 253.024530] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 253.032806] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 253.045206] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 253.058068] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 253.066048] 8021q: adding VLAN 0 to HW filter on device team0 [ 253.075037] device veth0_vlan entered promiscuous mode [ 253.081804] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 253.093017] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 253.101564] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 253.108653] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 253.115816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 253.123781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 253.131572] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 253.139907] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 253.148475] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 253.156215] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.162615] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.170067] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 253.181062] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 253.190690] device veth0_macvtap entered promiscuous mode [ 253.197458] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 253.206917] device veth1_macvtap entered promiscuous mode [ 253.213233] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 253.226755] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 253.236156] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 253.242420] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 253.250269] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 253.258343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 253.266540] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 253.273224] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 253.280765] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 253.287784] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 253.297464] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 253.307709] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 253.318637] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 253.331396] device veth1_vlan entered promiscuous mode [ 253.338225] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 253.344972] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 253.352200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 253.360888] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 253.368907] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 253.377015] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.385168] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.391818] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.398841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 253.409803] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 253.422965] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 253.432194] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 253.440000] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 253.447976] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 253.458610] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 253.471085] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 253.480358] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 253.492729] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 253.501348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 253.510126] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 253.519939] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 253.540826] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 253.548432] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 253.561023] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 253.575298] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 253.582828] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 253.591101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 253.599406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 253.607717] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 253.617981] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 253.626709] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 253.636155] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 253.643033] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 253.654831] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 253.663415] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 253.674791] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 253.680854] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 253.689129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 253.698262] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 253.706226] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 253.714403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 253.722228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 253.730272] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 253.738236] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 253.748797] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 253.787405] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 253.795704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 253.807789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 253.817361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 253.826100] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 253.835905] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 253.844156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 253.851998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 253.864522] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 253.880350] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 253.899775] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 253.915026] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 253.922642] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 253.934580] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 253.944635] device veth0_macvtap entered promiscuous mode [ 253.951110] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 253.960897] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 253.975095] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 253.982341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 253.990841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 254.007473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 254.016551] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 254.024883] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 254.031741] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 254.042691] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 254.053829] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 254.059917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 254.072594] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 254.081534] device veth1_macvtap entered promiscuous mode [ 254.094800] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 254.107620] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 254.116536] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 254.123424] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 254.141981] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 254.150665] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 254.160202] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 254.167895] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 254.175379] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 254.183973] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 254.200120] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 254.211776] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 254.220697] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 254.229194] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 254.236882] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 254.243743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 254.251216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 254.264880] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 254.275098] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 254.286425] device veth0_vlan entered promiscuous mode [ 254.297555] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 254.310764] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 254.318749] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 254.325995] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 254.334405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 254.343400] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 254.356190] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 254.366466] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 254.378298] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 254.387657] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 254.398914] device veth1_vlan entered promiscuous mode [ 254.405884] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 254.412754] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 254.430092] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 254.437760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 254.445645] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 254.454346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 254.462675] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 254.469878] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 254.480120] device veth0_vlan entered promiscuous mode [ 254.494036] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 254.504445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 254.515351] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 254.522280] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 254.533114] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 254.546234] device veth1_vlan entered promiscuous mode [ 254.552171] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 254.559724] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 254.568531] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 254.576618] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 254.585347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 254.597244] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 254.618934] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 254.639845] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 254.647751] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 254.655659] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 254.673793] audit: type=1400 audit(1581555360.093:38): avc: denied { associate } for pid=8110 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 254.704712] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 254.714995] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 254.736708] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 254.743859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 254.759321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 254.768736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 254.782262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 254.790228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 254.798102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 254.806014] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 254.812961] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 254.823449] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 254.837197] device veth0_macvtap entered promiscuous mode [ 254.850291] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 254.871313] device veth0_vlan entered promiscuous mode 00:56:00 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000140)=ANY=[@ANYBLOB="0a00000000000000e910bef74ff2339ac700000005000000c90b86f483f9d795063f83da321d100b0fc02d78acf5a9543dc4097b0832e4dbbd87266d3307f781e0e43a29275083802fb902c840c14d1ca56a9bf2179a2ba53381a198d8fef4b324337404797218df84be2476d65f3bbf1b360d00fbef2ea255d82f6c14ac67268242b9094be44374321d62acc718059f13eaf33b02a3d9d02c0b17e260e47e01e30f5917d47f7cb7fe25cb34761f29fb1b65c222ea9fa28974d2d609695f921054c041b72bf81888189a3bbee7b13639fa9d60e3dc19dfc6a8a6fb2949d68ae69c76ce47ba27b60c0172fd8e875bb9b930"]) [ 254.896835] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 254.936944] device veth1_macvtap entered promiscuous mode [ 254.943307] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 254.960665] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 254.971238] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 254.979511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 254.987425] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 254.998964] device veth0_macvtap entered promiscuous mode [ 255.005402] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 255.013744] device veth1_vlan entered promiscuous mode [ 255.019859] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 255.035869] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 255.054443] device veth1_macvtap entered promiscuous mode [ 255.060851] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 255.072279] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 255.087126] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready 00:56:00 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0xb, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='cpuset.sched_load_balance\x00', 0x2, 0x0) gettid() perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4956, 0x400, 0x5, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xc44}, 0x0, 0x0, 0x0, 0x8, 0x7e528870, 0x3f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, 0x0) gettid() socket$kcm(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r3 = gettid() r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="214e017c6f767920"], 0xda00) r6 = gettid() openat$cgroup(r2, &(0x7f0000000c00)='syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x9, 0x19, 0x7d, 0x0, 0x0, 0x81, 0x20000, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, 0x1, @perf_config_ext={0x0, 0xffffffff}, 0x2040, 0xffff, 0x0, 0x0, 0x0, 0x6, 0x69}, 0x0, 0x1, 0xffffffffffffffff, 0x2) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r7, 0x18000000000002a0, 0x6e, 0x6e, &(0x7f0000000280)="b9ff030084000d698cb89e499df6a4784636b19d00de0500000377fb7f11c72be9400000000000000000988103279122db2461f6f5b86ecd3ca00f90e09d2f86db9cc4c65a47a617e746257260cb58287e08b002a0ba9444f217b3ff01000093092ff962b60f0cd5eadbfb0e8ed9776e86a97ac72f9eefec6ba70b1c14b30f8d2df172d6cc6ff919", 0x0, 0x100, 0x0, 0x3b3, 0xfffffffffffffda8, &(0x7f0000000640)="97e365fe4fcb298113c04ace07adda8f1b6b81cc1c292ce1acd402575cfc25b425cadff5e19b9f78aabdbd1290c3979fd034847ec519a0aa9dd5d8f697e79ba02f529fb6246e5d6f236432cf849803466563fcb08e47f7c2390a0721e2641e2a5c2330c1daae9e364243755c05acba456a844a8c3a82fc16bdc7789d83f1af4872fc5cc0a8c8d4f0101022569cded0a684d08cf58a76cd04e46435a9523649cc3296da6b8adaa3cb044444910dbe9370"}, 0x28) write$cgroup_subtree(r4, &(0x7f00000000c0)=ANY=[@ANYRESOCT=r3, @ANYRESHEX, @ANYRESDEC, @ANYPTR64=&(0x7f0000000d40)=ANY=[@ANYPTR64=&(0x7f0000000d00)=ANY=[@ANYRES16=r6, @ANYPTR], @ANYRES64, @ANYRESDEC=r5], @ANYRESOCT=r2], 0x5c) perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0xf, 0x0, 0x1f, 0x9, 0x0, 0x0, 0x8, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0x7, @perf_bp={0x0, 0x4}, 0x1, 0x7, 0xcc, 0xf, 0x81, 0xffff7fff, 0x42a7}, 0x0, 0xb, r5, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') r8 = gettid() perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0, 0x8}}, r8, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0x1, 0x0, 0xfa, 0x2, 0x0, 0x8, 0x800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000380), 0x2}, 0x8800, 0x2, 0xfffffffb, 0x1, 0x47a, 0x683}, r8, 0xc, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 255.100014] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 255.119795] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 255.131018] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 255.153955] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.163113] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 255.178284] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.188971] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 255.196115] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 255.206564] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 255.214861] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 255.221741] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 255.234220] hrtimer: interrupt took 30015 ns [ 255.239880] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 255.244781] audit: type=1400 audit(1581555360.663:39): avc: denied { prog_load } for pid=8230 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 255.258524] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 255.283444] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 255.292211] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 255.307121] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 255.315344] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 255.322481] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 255.330491] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 255.339253] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 255.347411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 255.357018] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 255.367136] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.377635] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 255.387778] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.398038] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 255.405104] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 255.418712] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 255.428837] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.438477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 255.448382] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.457583] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 255.467466] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.477626] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 255.484768] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 255.494855] device veth0_macvtap entered promiscuous mode [ 255.501127] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 255.511067] device veth1_macvtap entered promiscuous mode [ 255.517803] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 255.534909] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 255.543033] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 255.556771] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 255.573123] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 255.582285] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 255.590738] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 255.598635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 255.616551] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 255.625201] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 255.635721] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.645190] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 255.656641] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.665800] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 255.675619] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.685964] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 255.692868] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 255.706034] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready 00:56:01 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002000000000000000000000402000000000020fcbb779aca8df23cc84d3f5f9c1d8352f4bd7b52fb33bee3a3f3974ce50f76bc0b6e0e2829742c"], 0x0, 0x26}, 0x20) socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x1b, &(0x7f0000000040)=r1, 0x52d) close(r1) [ 255.721195] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 255.729091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 255.737421] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 255.749311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 255.771648] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 255.792457] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.802239] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 255.812039] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.821637] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 255.831426] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.840685] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 255.850508] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.860647] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 255.867950] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 255.875694] device veth0_vlan entered promiscuous mode [ 255.886637] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 255.894172] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 255.901252] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 255.909611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 255.922889] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 255.940873] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.950781] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 255.960925] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.970403] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 255.983581] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.993365] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 256.003245] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.013418] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 256.020744] batman_adv: batadv0: Interface activated: batadv_slave_1 00:56:01 executing program 0: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f0000000100)={0xa, 0x28000004e22, 0x0, @empty}, 0x1c) [ 256.065976] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 256.085506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 00:56:01 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xb3550aa4ba878254}, 0x9c) [ 256.132312] device veth1_vlan entered promiscuous mode [ 256.142446] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 256.159296] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 256.200556] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 256.244948] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 256.268797] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 256.286285] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready 00:56:01 executing program 0: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f0000000100)={0xa, 0x28000004e22, 0x0, @empty}, 0x1c) [ 256.299242] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 256.317795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 256.340810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 256.352864] device veth0_macvtap entered promiscuous mode [ 256.375878] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 256.390719] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:56:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) [ 256.441026] device veth1_macvtap entered promiscuous mode [ 256.450770] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 256.477260] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 256.527890] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 256.562679] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 256.605675] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.644203] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 00:56:02 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x19, 0x0, 0x0) [ 256.661446] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.671460] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 256.702827] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.726226] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 256.760505] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.780569] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 256.823330] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.861235] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 256.872675] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 256.888645] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 256.909773] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 256.918907] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 256.927151] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 256.941438] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 256.961853] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.979424] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 257.000072] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.009450] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 257.020783] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.029977] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 257.039802] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.048973] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 257.058997] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.071527] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 257.078919] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 257.091019] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 257.100337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 00:56:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000003c0)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x7fff, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x9}]}}) [ 257.269160] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 00:56:02 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000080)=[@ip_ttl={{0x14}}], 0x18}, 0x0) 00:56:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000540)={@in={{0x2, 0x4e24, @broadcast}}, 0x0, 0x0, 0x0, 0x0, "7ff85baddd4869874bb6e3add80d81e4a9e616aaf7f367284e0700000000000000fce2583a669a14b12e708d51d786ada22966ece8dd253c799adf85bc54ae1a030f96e8ef0f093eb6acb9973a457a7f"}, 0xd8) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='bbr\x00', 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) 00:56:03 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) dup(0xffffffffffffffff) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xb3550aa4ba878254}, 0x9c) 00:56:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") set_mempolicy(0x2, &(0x7f0000000300)=0x762, 0x9) timer_create(0x0, 0x0, &(0x7f0000000480)) 00:56:03 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xb3550aa4ba878254}, 0x9c) 00:56:03 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xb3550aa4ba878254}, 0x9c) 00:56:03 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400c00) write$cgroup_int(r0, 0x0, 0x7ffffffff000) 00:56:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2c, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, &(0x7f0000000040), 0x5e0) gettid() 00:56:03 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmmsg(r0, &(0x7f0000009f00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=[{0xc}, {0xc}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000006080)=[{0xc, 0x1}], 0xc}}], 0x2, 0x0) 00:56:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) dup2(r2, r0) 00:56:03 executing program 0: ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000000)) r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000700)={'vlan0\x00', @random="904d00d8c8b9"}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000700)={'vlan0\x00', @random="37a655944a7e"}) 00:56:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') sendfile(r0, r1, 0x0, 0x1) 00:56:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) dup2(r2, r0) [ 258.271949] device vlan0 entered promiscuous mode 00:56:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000001000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00000000000000", 0x48}], 0x1) [ 258.368951] syz-executor.0 uses obsolete (PF_INET,SOCK_PACKET) 00:56:03 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) 00:56:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f00000013c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000200000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000003180f370223d6ad5bba646758b51fae9be85e2280eb2dade989932df70117e861db939b1d4dc672786ed2057814196c6fa660b0758b3e5194bc5335a0219e379b05aee150a693e2610c8a9dc28c6fd2dc9f327472bb4d85a7137f7f799f1914294de2712e18e67b75dfe78a0ca0e98295f02d80cf6c1e80e1034c091e877652ef3c90d78e44e2ec83bf71d7ecafb41374d3f5d2a83540e5f5a3072114afb3422"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007fdffffff1a07a2a30005020000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000500)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0x7}}, [@filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x20, 0x2, [@TCA_ROUTE4_ACT={0x1c, 0x6, [@m_skbmod={0x18, 0x1, 0x0, 0x0, {{0xb, 0x1, 'skbmod\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x50}}, 0x0) 00:56:03 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xb3550aa4ba878254}, 0x9c) 00:56:04 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$KVM_S390_VCPU_FAULT(0xffffffffffffffff, 0x4008ae52, &(0x7f0000000140)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x2002, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, 0x0) read(r1, &(0x7f0000000340)=""/175, 0xaf) r2 = getpid() fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x1, 0x0, 0xd5, 0x1ff, r2}) perf_event_open(&(0x7f0000000880)={0x2, 0x70, 0x20, 0x0, 0x8, 0xc8, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x101, 0x3}, 0x9120, 0x3, 0x6, 0x6, 0x8, 0x3f, 0xffff}, r2, 0x0, r1, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x440101, 0x0) r4 = socket(0x1e, 0x4, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="01f399dc4600000086cb0f4cc62fc91192d32a5bf1791a2297c523fb2779274c0c6f2d9d5ce7c4dbc54eec71489b9351267f86576b44677c1bc00b1b0e64575b917ac7a1fe29b9e74848cc55cf830779ce4fa186ae087eadbb5dd5aef5906e5a662e91b9abdfc21fcf552f03cba1d30e8766ed6f671bbb4449d6c623144443f3e6eec6358e87dcba4847fdafb43708615ea0f5550c3a61c096f2e8f5aa7bfa33c2eafde037f5ec26d5c790178dac6fafcb0b5fe6c54cc6537c", @ANYRES32=0x0], &(0x7f0000000000)=0x80f806766c7df7b9) setsockopt$inet_sctp_SCTP_MAXSEG(r4, 0x84, 0x19, &(0x7f0000000140)=@assoc_value={r6}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f00000001c0)={0x0, 0x7ff, 0xf, 0xb8b, 0x7fff, 0x2, 0xf6f5, 0x3, r6}, &(0x7f0000000200)=0x20) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='clear_refs\x00') ioctl$DRM_IOCTL_RES_CTX(r7, 0xc0106426, &(0x7f0000000280)={0x4, &(0x7f0000000240)=[{}, {0x0}, {}, {}]}) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f00000002c0)={r8}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000100)={r8, &(0x7f0000000040)=""/163}) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000180), 0x8) [ 258.988260] device vlan0 left promiscuous mode 00:56:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000100)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x18, 0x6, 0x0, @dev, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3, 0x87}]}}}}}}}}, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x6e, 0x0) 00:56:04 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$KVM_S390_VCPU_FAULT(0xffffffffffffffff, 0x4008ae52, &(0x7f0000000140)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x2002, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, 0x0) read(r1, &(0x7f0000000340)=""/175, 0xaf) r2 = getpid() fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x1, 0x0, 0xd5, 0x1ff, r2}) perf_event_open(&(0x7f0000000880)={0x2, 0x70, 0x20, 0x0, 0x8, 0xc8, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x101, 0x3}, 0x9120, 0x3, 0x6, 0x6, 0x8, 0x3f, 0xffff}, r2, 0x0, r1, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x440101, 0x0) r4 = socket(0x1e, 0x4, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYRES32=0x0], &(0x7f0000000000)=0x1) setsockopt$inet_sctp_SCTP_MAXSEG(r4, 0x84, 0x19, &(0x7f0000000140)=@assoc_value={r6}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f00000001c0)={0x0, 0x7ff, 0xf, 0xb8b, 0x7fff, 0x2, 0xf6f5, 0x3, r6}, &(0x7f0000000200)=0x20) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='clear_refs\x00') ioctl$DRM_IOCTL_RES_CTX(r7, 0xc0106426, &(0x7f0000000280)={0x5, &(0x7f0000000240)=[{}, {0x0}, {}, {}, {}]}) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f00000002c0)={r8}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000100)={r8, &(0x7f0000000040)=""/163}) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000180), 0x8) [ 259.028809] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 259.094439] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready 00:56:04 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x3, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f0000000100)={0xa, 0x28000004e22, 0x0, @empty}, 0x1c) 00:56:04 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[@ANYBLOB="0a00000000000000e910bef74ff2339ac700000005000000c90b86f483f9d795063f83da321d100b0fc02d78acf5a9543d"]) [ 259.176346] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 259.187514] TCP: tcp_parse_options: Illegal window scaling value 135 > 14 received [ 259.288343] syz-executor.4 (8441) used greatest stack depth: 22032 bytes left 00:56:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000700)=ANY=[@ANYBLOB="340000002c002700b77213bba5520df09ea103ea086ec08a9e65d0ee8d2b8b2ab7afbea89241dc60b9d170447b21d7a38a8c1ab08c739c493f289502b843308ac83275ddc6e215f079968fcc19f09df71cf0b3091e2ae2b4aa0e4290424437d0e65c813604791159655a0062d7c90100000000000000", @ANYRES32, @ANYBLOB="000b0000000000000f0000000004000200"], 0x34}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'bridge_slave_0\x00'}) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x4c80, 0xfffffffffffffffe) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) 00:56:04 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') dup(r0) write(0xffffffffffffffff, &(0x7f00000000c0)="240000004e001f00ff07f4f9002304000a04", 0x12) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0xe0002011}) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000000)={0xe0002011}) r2 = epoll_create(0x6) openat$cuse(0xffffffffffffff9c, 0x0, 0x82, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, 0x0) epoll_wait(r2, 0x0, 0x0, 0x0) r3 = epoll_create(0x6) openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) epoll_wait(r3, &(0x7f0000000100)=[{}], 0x1, 0x0) r4 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0xe0002011}) dup2(r4, r2) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f00000001c0)) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x20201, 0x6) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r5, &(0x7f00000000c0)='./file0\x00') mkdirat(r5, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3a) r6 = open(&(0x7f0000000300)='.\x00', 0x0, 0xc1) renameat2(r6, &(0x7f0000000180)='./file0\x00', r5, &(0x7f0000000640)='./file0/file0\x00', 0x0) r7 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r7, 0x0) open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', r7, &(0x7f0000000640)='./file0/file0\x00', 0x0) [ 259.365262] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:56:04 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x3, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f0000000100)={0xa, 0x28000004e22, 0x0, @empty}, 0x1c) 00:56:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f00000013c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000200000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000003180f370223d6ad5bba646758b51fae9be85e2280eb2dade989932df70117e861db939b1d4dc672786ed2057814196c6fa660b0758b3e5194bc5335a0219e379b05aee150a693e2610c8a9dc28c6fd2dc9f327472bb4d85a7137f7f799f1914294de2712e18e67b75dfe78a0ca0e98295f02d80cf6c1e80e1034c091e877652ef3c90d78e44e2ec83bf71d7ecafb41374d3f5d2a83540e5f5a3072114afb3422"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007fdffffff1a07a2a30005020000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000500)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x7}}, [@filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x20, 0x2, [@TCA_ROUTE4_ACT={0x1c, 0x6, [@m_skbmod={0x18, 0x1, 0x0, 0x0, {{0xb, 0x1, 'skbmod\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x50}}, 0x0) [ 259.598322] audit: type=1400 audit(1581555365.023:40): avc: denied { create } for pid=8462 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 259.610839] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:56:05 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$KVM_S390_VCPU_FAULT(0xffffffffffffffff, 0x4008ae52, &(0x7f0000000140)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x2002, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, 0x0) read(r1, &(0x7f0000000340)=""/175, 0xaf) r2 = getpid() fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x1, 0x0, 0xd5, 0x1ff, r2}) perf_event_open(&(0x7f0000000880)={0x2, 0x70, 0x20, 0x0, 0x8, 0xc8, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x101, 0x3}, 0x9120, 0x3, 0x6, 0x6, 0x8, 0x3f, 0xffff}, r2, 0x0, r1, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x440101, 0x0) r4 = socket(0x1e, 0x4, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="01f399dc4600000086cb0f4cc62fc91192d32a5bf1791a2297c523fb2779274c0c6f2d9d5ce7c4dbc54eec71489b9351267f86576b44677c1bc00b1b0e64575b917ac7a1fe29b9e74848cc55cf830779ce4fa186ae087eadbb5dd5aef5906e5a662e91b9abdfc21fcf552f03cba1d30e8766ed6f671bbb4449d6c623144443f3e6eec6358e87dcba4847fdafb43708615ea0f5550c3a61c096f2e8f5aa7bfa33c2eafde037f5ec26d5c790178dac6fafcb0b5fe6c54cc6537c", @ANYRES32=0x0], &(0x7f0000000000)=0x80f806766c7df7b9) setsockopt$inet_sctp_SCTP_MAXSEG(r4, 0x84, 0x19, &(0x7f0000000140)=@assoc_value={r6}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f00000001c0)={0x0, 0x7ff, 0xf, 0xb8b, 0x7fff, 0x2, 0xf6f5, 0x3, r6}, &(0x7f0000000200)=0x20) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='clear_refs\x00') ioctl$DRM_IOCTL_RES_CTX(r7, 0xc0106426, &(0x7f0000000280)={0x4, &(0x7f0000000240)=[{}, {0x0}, {}, {}]}) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f00000002c0)={r8}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000100)={r8, &(0x7f0000000040)=""/163}) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000180), 0x8) 00:56:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2c, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, &(0x7f0000000040), 0x5e0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) [ 259.643934] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 259.660315] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 00:56:05 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x3, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x28000003, &(0x7f0000000100)={0xa, 0x28000004e22, 0x0, @empty}, 0x1c) 00:56:05 executing program 4: [ 259.844974] audit: type=1400 audit(1581555365.073:41): avc: denied { write } for pid=8462 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 259.856406] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:56:05 executing program 4: 00:56:05 executing program 3: 00:56:05 executing program 5: 00:56:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f00000013c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000200000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000003180f370223d6ad5bba646758b51fae9be85e2280eb2dade989932df70117e861db939b1d4dc672786ed2057814196c6fa660b0758b3e5194bc5335a0219e379b05aee150a693e2610c8a9dc28c6fd2dc9f327472bb4d85a7137f7f799f1914294de2712e18e67b75dfe78a0ca0e98295f02d80cf6c1e80e1034c091e877652ef3c90d78e44e2ec83bf71d7ecafb41374d3f5d2a83540e5f5a3072114afb3422"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007fdffffff1a07a2a30005020000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000500)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x7}}, [@filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x20, 0x2, [@TCA_ROUTE4_ACT={0x1c, 0x6, [@m_skbmod={0x18, 0x1, 0x0, 0x0, {{0xb, 0x1, 'skbmod\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x50}}, 0x0) 00:56:05 executing program 1: 00:56:05 executing program 4: [ 259.957731] audit: type=1400 audit(1581555365.133:42): avc: denied { read } for pid=8462 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:56:05 executing program 5: 00:56:05 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$KVM_S390_VCPU_FAULT(0xffffffffffffffff, 0x4008ae52, &(0x7f0000000140)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x2002, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, 0x0) read(r1, &(0x7f0000000340)=""/175, 0xaf) r2 = getpid() fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x1, 0x0, 0xd5, 0x1ff, r2}) perf_event_open(&(0x7f0000000880)={0x2, 0x70, 0x20, 0x0, 0x8, 0xc8, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x101, 0x3}, 0x9120, 0x3, 0x6, 0x6, 0x8, 0x3f, 0xffff}, r2, 0x0, r1, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x440101, 0x0) r4 = socket(0x1e, 0x4, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="01f399dc4600000086cb0f4cc62fc91192d32a5bf1791a2297c523fb2779274c0c6f2d9d5ce7c4dbc54eec71489b9351267f86576b44677c1bc00b1b0e64575b917ac7a1fe29b9e74848cc55cf830779ce4fa186ae087eadbb5dd5aef5906e5a662e91b9abdfc21fcf552f03cba1d30e8766ed6f671bbb4449d6c623144443f3e6eec6358e87dcba4847fdafb43708615ea0f5550c3a61c096f2e8f5aa7bfa33c2eafde037f5ec26d5c790178dac6fafcb0b5fe6c54cc6537c", @ANYRES32=0x0], &(0x7f0000000000)=0x80f806766c7df7b9) setsockopt$inet_sctp_SCTP_MAXSEG(r4, 0x84, 0x19, &(0x7f0000000140)=@assoc_value={r6}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f00000001c0)={0x0, 0x7ff, 0xf, 0xb8b, 0x7fff, 0x2, 0xf6f5, 0x3, r6}, &(0x7f0000000200)=0x20) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='clear_refs\x00') ioctl$DRM_IOCTL_RES_CTX(r7, 0xc0106426, &(0x7f0000000280)={0x4, &(0x7f0000000240)=[{}, {0x0}, {}, {}]}) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f00000002c0)={r8}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000100)={r8, &(0x7f0000000040)=""/163}) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000180), 0x8) 00:56:05 executing program 4: 00:56:05 executing program 3: 00:56:05 executing program 1: 00:56:05 executing program 1: 00:56:05 executing program 4: 00:56:05 executing program 3: 00:56:05 executing program 0: 00:56:05 executing program 5: 00:56:05 executing program 4: 00:56:05 executing program 1: 00:56:05 executing program 0: 00:56:06 executing program 2: 00:56:06 executing program 5: 00:56:06 executing program 4: 00:56:06 executing program 3: 00:56:06 executing program 1: 00:56:06 executing program 0: 00:56:06 executing program 4: 00:56:06 executing program 1: 00:56:06 executing program 5: 00:56:06 executing program 3: 00:56:06 executing program 0: 00:56:06 executing program 4: 00:56:06 executing program 2: 00:56:06 executing program 1: 00:56:06 executing program 3: 00:56:06 executing program 5: 00:56:06 executing program 0: 00:56:06 executing program 2: 00:56:06 executing program 1: 00:56:06 executing program 4: 00:56:06 executing program 5: 00:56:06 executing program 0: 00:56:06 executing program 3: 00:56:06 executing program 4: 00:56:06 executing program 1: 00:56:06 executing program 2: 00:56:06 executing program 5: 00:56:06 executing program 3: 00:56:06 executing program 0: 00:56:06 executing program 1: 00:56:06 executing program 4: 00:56:06 executing program 5: 00:56:06 executing program 2: 00:56:06 executing program 0: 00:56:06 executing program 3: 00:56:07 executing program 2: 00:56:07 executing program 5: 00:56:07 executing program 1: 00:56:07 executing program 4: 00:56:07 executing program 3: 00:56:07 executing program 2: 00:56:07 executing program 4: 00:56:07 executing program 0: 00:56:07 executing program 5: 00:56:07 executing program 3: 00:56:07 executing program 1: 00:56:07 executing program 4: 00:56:07 executing program 5: 00:56:07 executing program 0: 00:56:07 executing program 3: 00:56:07 executing program 2: 00:56:07 executing program 4: 00:56:07 executing program 1: 00:56:07 executing program 5: 00:56:07 executing program 3: 00:56:07 executing program 0: 00:56:07 executing program 2: 00:56:07 executing program 1: 00:56:07 executing program 5: 00:56:07 executing program 4: 00:56:07 executing program 3: 00:56:07 executing program 2: 00:56:07 executing program 4: 00:56:07 executing program 0: 00:56:07 executing program 1: 00:56:07 executing program 3: 00:56:07 executing program 5: 00:56:07 executing program 4: 00:56:07 executing program 2: 00:56:07 executing program 3: 00:56:08 executing program 0: 00:56:08 executing program 5: 00:56:08 executing program 2: 00:56:08 executing program 1: 00:56:08 executing program 4: 00:56:08 executing program 3: 00:56:08 executing program 1: 00:56:08 executing program 2: 00:56:08 executing program 0: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) 00:56:08 executing program 5: creat(&(0x7f0000000580)='./file0\x00', 0x0) lstat(&(0x7f00000032c0)='./file0/file0\x00', 0x0) 00:56:08 executing program 4: creat(&(0x7f0000000580)='./file0\x00', 0x0) r0 = socket$unix(0x1, 0x2, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)=@file={0x1, './file0/file0\x00'}, 0x6e) 00:56:08 executing program 3: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000002840)='./file0\x00', 0x82, 0x0) write$P9_RATTACH(r0, 0x0, 0x0) 00:56:08 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) chdir(&(0x7f0000000540)='./file0/file1\x00') 00:56:08 executing program 2: socket$unix(0x1, 0x2, 0x0) 00:56:08 executing program 5: symlink(&(0x7f0000001080)='./file0\x00', &(0x7f00000010c0)='./file0\x00') execve(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 00:56:08 executing program 4: sync() mknod$loop(0x0, 0x0, 0x1) rename(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./file1\x00') llistxattr(&(0x7f0000000140)='./file1/file0\x00', 0x0, 0x0) 00:56:08 executing program 0: setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5452, 0x0) 00:56:08 executing program 3: symlink(&(0x7f0000000600)='./file0\x00', &(0x7f00000010c0)='./file0\x00') removexattr(&(0x7f0000000180)='./file0\x00', 0x0) 00:56:08 executing program 2: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 00:56:08 executing program 1: write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x0) 00:56:08 executing program 5: creat(&(0x7f0000000040)='./file0\x00', 0x0) setxattr(&(0x7f0000000000)='./file0/file1\x00', 0x0, 0x0, 0x0, 0x0) 00:56:08 executing program 4: creat(&(0x7f0000000200)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1) 00:56:08 executing program 0: symlink(&(0x7f0000001080)='./file0\x00', &(0x7f00000010c0)='./file0\x00') setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) 00:56:08 executing program 3: open$dir(&(0x7f0000000080)='./file0\x00', 0x4002c3, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) 00:56:08 executing program 1: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x2, 0x0) 00:56:08 executing program 2: sync() mkdir(&(0x7f0000000000)='./file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000001c0)='./file0/file1\x00') setxattr$security_capability(&(0x7f00000002c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) 00:56:08 executing program 5: sync() openat$urandom(0xffffffffffffff9c, &(0x7f0000000740)='/dev/urandom\x00', 0x513601, 0x0) 00:56:08 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) setxattr$security_ima(&(0x7f0000000100)='./file0/file1\x00', 0x0, 0x0, 0x0, 0x0) 00:56:08 executing program 0: setxattr(&(0x7f0000000000)='./file0/file1\x00', 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000080)=0x80) dup3(r0, r1, 0x0) 00:56:08 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0x0) lgetxattr(&(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, 0x0) 00:56:08 executing program 4: creat(&(0x7f0000000200)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000002d40)='./file0\x00', &(0x7f0000002d80)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 00:56:09 executing program 1: symlink(&(0x7f0000001080)='./file0\x00', &(0x7f00000010c0)='./file0\x00') lsetxattr$security_selinux(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) 00:56:09 executing program 0: symlink(&(0x7f0000001080)='./file0\x00', &(0x7f00000010c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000003c00)='./file0\x00', 0x0, 0x0) 00:56:09 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) dup2(r1, r0) sendto$unix(r0, &(0x7f0000000080)='g', 0x1, 0x0, 0x0, 0x0) 00:56:09 executing program 5: sync() openat$urandom(0xffffffffffffff9c, &(0x7f0000000740)='/dev/urandom\x00', 0x513601, 0x0) 00:56:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) 00:56:09 executing program 3: symlink(&(0x7f0000001080)='./file0\x00', &(0x7f00000010c0)='./file0\x00') lgetxattr(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0, 0x0) 00:56:09 executing program 0: creat(&(0x7f0000003100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f00000043c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4) 00:56:09 executing program 1: symlink(&(0x7f0000001080)='./file0\x00', &(0x7f00000010c0)='./file0\x00') removexattr(&(0x7f0000000000)='./file0\x00', 0x0) 00:56:09 executing program 2: mknod(&(0x7f0000000080)='./file0\x00', 0xc000, 0x0) 00:56:09 executing program 5: symlink(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) 00:56:09 executing program 0: sync() mknod$loop(0x0, 0x0, 0x1) rename(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./file1\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000280), 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@multicast1, @in6=@ipv4={[], [], @empty}, 0x4e21, 0x94bd, 0x0, 0x8, 0x2, 0x0, 0x0, 0x3b}, {0x0, 0x0, 0x0, 0x0, 0xd7f2}, {0xed, 0x9, 0x3}, 0x9, 0x6e6bc0, 0x0, 0x0, 0x0, 0x2}, {{@in6=@dev}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 00:56:09 executing program 4: symlink(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) 00:56:09 executing program 3: symlink(&(0x7f0000001080)='./file0\x00', &(0x7f00000010c0)='./file0\x00') setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) 00:56:09 executing program 1: symlink(&(0x7f0000001080)='./file0\x00', &(0x7f00000010c0)='./file0\x00') link(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') 00:56:09 executing program 2: symlink(&(0x7f0000001080)='./file0\x00', &(0x7f00000010c0)='./file0\x00') statx(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, 0x0) 00:56:09 executing program 5: creat(&(0x7f0000000580)='./file0\x00', 0x0) chmod(&(0x7f0000000000)='./file0/file0\x00', 0x0) 00:56:09 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/221) 00:56:09 executing program 3: mkdir(&(0x7f0000000040)='\x00', 0x0) 00:56:09 executing program 4: setreuid(0xee00, 0x0) r0 = getuid() setreuid(0xee00, r0) symlink(&(0x7f0000001080)='./file0\x00', &(0x7f00000010c0)='./file0\x00') 00:56:09 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) symlink(&(0x7f0000000200)='./file0/file1\x00', &(0x7f0000000240)='./file0/file1\x00') 00:56:09 executing program 2: symlink(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00') 00:56:09 executing program 5: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 00:56:09 executing program 3: sync() mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) 00:56:09 executing program 1: symlink(&(0x7f0000001080)='./file0\x00', &(0x7f00000010c0)='./file0\x00') setxattr$trusted_overlay_redirect(&(0x7f00000006c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) 00:56:09 executing program 4: creat(&(0x7f0000000040)='./file0\x00', 0x0) unlink(&(0x7f0000000180)='./file0/file0\x00') 00:56:09 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='ns\x00') openat$cgroup_ro(r0, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) 00:56:09 executing program 2: creat(&(0x7f0000000580)='./file0\x00', 0x0) setxattr$security_ima(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) 00:56:09 executing program 5: lsetxattr$trusted_overlay_opaque(&(0x7f0000000440)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) [ 264.482072] audit: type=1400 audit(1581555369.903:43): avc: denied { write } for pid=8839 comm="syz-executor.0" name="ns" dev="proc" ino=33872 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 00:56:09 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='security.ima\x00', 0x0, 0x0, 0x0) 00:56:10 executing program 4: sync() mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000001c0)='./file0/file1\x00') lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) 00:56:10 executing program 1: symlink(&(0x7f0000000600)='./file0\x00', &(0x7f00000010c0)='./file0\x00') lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='trusted.overlay.impure\x00') 00:56:10 executing program 3: rmdir(&(0x7f00000000c0)='./file0/file1\x00') 00:56:10 executing program 2: ioctl$TIOCSERGETLSR(0xffffffffffffffff, 0x5459, 0x0) r0 = userfaultfd(0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet6_sctp(0xa, 0x0, 0x84) socket$inet(0x2, 0x0, 0x0) r3 = socket(0x6000000000010, 0x3, 0x0) sendmmsg$alg(r3, &(0x7f0000000140), 0x492492492492778, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000380)={0xaa, 0x74}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) read(r0, &(0x7f0000009f9c)=""/100, 0x64) 00:56:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b200080000001028e6c467144d2fa833"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x9}, {}, {0x3}}, [@filter_kind_options=@f_fw={{0x7, 0x1, 'fw\x00'}, {0xc, 0x2, [@TCA_FW_CLASSID={0x8, 0x1, {0x0, 0xe}}]}}]}, 0x38}}, 0x0) [ 264.675946] audit: type=1400 audit(1581555369.903:44): avc: denied { add_name } for pid=8839 comm="syz-executor.0" name="memory.events" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 00:56:10 executing program 5: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000740)='/proc/self\x00', 0x0, 0x0) 00:56:10 executing program 3: semget(0x2, 0x0, 0x6a1) 00:56:10 executing program 4: semget(0x0, 0x0, 0x270) 00:56:10 executing program 1: pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fstat(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) openat$random(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/urandom\x00', 0x0, 0x0) [ 264.846906] audit: type=1400 audit(1581555369.913:45): avc: denied { create } for pid=8839 comm="syz-executor.0" name="memory.events" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:insmod_t:s0 tclass=file permissive=1 00:56:10 executing program 5: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x14]}]}, 0x40}}, 0x0) 00:56:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000540)=""/56, 0x38}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) 00:56:10 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8ce7, 0x10000006}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_type(r2, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 00:56:10 executing program 2: ioctl$TIOCSERGETLSR(0xffffffffffffffff, 0x5459, 0x0) r0 = userfaultfd(0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet6_sctp(0xa, 0x0, 0x84) socket$inet(0x2, 0x0, 0x0) r3 = socket(0x6000000000010, 0x3, 0x0) sendmmsg$alg(r3, &(0x7f0000000140), 0x492492492492778, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000380)={0xaa, 0x74}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) read(r0, &(0x7f0000009f9c)=""/100, 0x64) 00:56:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fd1000/0x18000)=nil, 0x0, 0x28, 0x0, 0x0, 0xfffffffffffffee1) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000400)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e38e06c5fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b53606000000000000007c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df1001000000000694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde317fad4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b22645cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f580968af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28a774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a80047fe17dee6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb010100000000000001a047526865c888c9ff36056cc4ad258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d819164300"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 265.049154] kasan: CONFIG_KASAN_INLINE enabled [ 265.055154] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 265.062580] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 265.068823] CPU: 0 PID: 8141 Comm: kworker/0:3 Not tainted 4.19.103-syzkaller #0 [ 265.076364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.086635] Workqueue: pencrypt padata_parallel_worker [ 265.091943] RIP: 0010:padata_reorder+0x303/0x740 [ 265.096715] Code: 00 0f 85 7f 03 00 00 4c 89 21 e8 88 21 e7 ff 4c 89 f7 e8 30 23 d1 05 48 8b 45 c0 48 8d 53 48 48 8d 78 10 48 89 f8 48 c1 e8 03 <42> 80 3c 28 00 0f 85 cd 02 00 00 48 8b 45 c0 8b 7d d0 48 8b 70 10 [ 265.103174] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 265.115720] RSP: 0018:ffff8880531cfb58 EFLAGS: 00010202 [ 265.115732] RAX: 0000000000000002 RBX: ffffe8ffffd26150 RCX: 0000000000000000 [ 265.115738] RDX: ffffe8ffffd26198 RSI: 0000000000000004 RDI: 0000000000000010 [ 265.115745] RBP: ffff8880531cfbe0 R08: 1ffffd1ffffa4c2c R09: fffff91ffffa4c2d [ 265.115751] R10: fffff91ffffa4c2c R11: ffffe8ffffd26163 R12: ffff8880a9379150 [ 265.115759] R13: dffffc0000000000 R14: ffffe8ffffd26160 R15: ffff8880a6222140 [ 265.115768] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 265.115781] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 265.115791] CR2: 0000000000413720 CR3: 00000000a4382000 CR4: 00000000001406f0 [ 265.115801] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 265.115808] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 265.115813] Call Trace: [ 265.115841] padata_do_serial+0x298/0x370 [ 265.115861] pcrypt_aead_enc+0x10a/0x190 [ 265.211539] padata_parallel_worker+0x292/0x470 [ 265.216201] ? padata_index_to_cpu+0x70/0x70 [ 265.220618] process_one_work+0x989/0x1750 [ 265.224854] ? pwq_dec_nr_in_flight+0x320/0x320 [ 265.229515] ? lock_acquire+0x16f/0x3f0 [ 265.233489] ? kasan_check_write+0x14/0x20 [ 265.237733] ? do_raw_spin_lock+0xd7/0x250 [ 265.241983] worker_thread+0x98/0xe40 [ 265.245779] ? trace_hardirqs_on+0x67/0x220 [ 265.250107] kthread+0x354/0x420 [ 265.253467] ? process_one_work+0x1750/0x1750 [ 265.257955] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 265.263569] ret_from_fork+0x24/0x30 [ 265.267288] Modules linked in: [ 265.270588] ---[ end trace 8e138eb1755353f1 ]--- [ 265.275383] RIP: 0010:padata_reorder+0x303/0x740 [ 265.280150] Code: 00 0f 85 7f 03 00 00 4c 89 21 e8 88 21 e7 ff 4c 89 f7 e8 30 23 d1 05 48 8b 45 c0 48 8d 53 48 48 8d 78 10 48 89 f8 48 c1 e8 03 <42> 80 3c 28 00 0f 85 cd 02 00 00 48 8b 45 c0 8b 7d d0 48 8b 70 10 [ 265.299084] RSP: 0018:ffff8880531cfb58 EFLAGS: 00010202 [ 265.304475] RAX: 0000000000000002 RBX: ffffe8ffffd26150 RCX: 0000000000000000 [ 265.311856] RDX: ffffe8ffffd26198 RSI: 0000000000000004 RDI: 0000000000000010 [ 265.319189] RBP: ffff8880531cfbe0 R08: 1ffffd1ffffa4c2c R09: fffff91ffffa4c2d [ 265.326937] R10: fffff91ffffa4c2c R11: ffffe8ffffd26163 R12: ffff8880a9379150 [ 265.334340] R13: dffffc0000000000 R14: ffffe8ffffd26160 R15: ffff8880a6222140 [ 265.341671] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 265.349941] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 265.355862] CR2: 0000000000413720 CR3: 00000000a4382000 CR4: 00000000001426f0 [ 265.363148] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 265.370469] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 265.377773] Kernel panic - not syncing: Fatal exception in interrupt [ 265.385471] Kernel Offset: disabled [ 265.391022] Rebooting in 86400 seconds..