[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 76.278866][ T27] audit: type=1800 audit(1580939813.152:25): pid=9475 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 76.310594][ T27] audit: type=1800 audit(1580939813.152:26): pid=9475 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 76.337767][ T27] audit: type=1800 audit(1580939813.152:27): pid=9475 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.16' (ECDSA) to the list of known hosts. 2020/02/05 21:57:05 fuzzer started 2020/02/05 21:57:07 dialing manager at 10.128.0.26:35493 2020/02/05 21:57:07 syscalls: 2939 2020/02/05 21:57:07 code coverage: enabled 2020/02/05 21:57:07 comparison tracing: enabled 2020/02/05 21:57:07 extra coverage: enabled 2020/02/05 21:57:07 setuid sandbox: enabled 2020/02/05 21:57:07 namespace sandbox: enabled 2020/02/05 21:57:07 Android sandbox: /sys/fs/selinux/policy does not exist 2020/02/05 21:57:07 fault injection: enabled 2020/02/05 21:57:07 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/02/05 21:57:07 net packet injection: enabled 2020/02/05 21:57:07 net device setup: enabled 2020/02/05 21:57:07 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/02/05 21:57:07 devlink PCI setup: PCI device 0000:00:10.0 is not available 22:00:19 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x22) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x200, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ftruncate(r0, 0x48280) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_ima(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) write$P9_RATTACH(r3, &(0x7f0000000000)={0x14}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x20000000000001cb, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, 0x4, 0x1, 0x201, 0x0, 0x0, {0x1, 0x0, 0x2}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8040}, 0x0) write$P9_RREMOVE(r4, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000002c0)={{0xa, 0x4e20, 0x0, @loopback, 0x4}, {0xa, 0x4e21, 0x5, @dev={0xfe, 0x80, [], 0xc}, 0x9}, 0x9, [0xcc23, 0x5, 0x1, 0x5, 0xff, 0x0, 0xff, 0x200]}, 0x5c) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f0000000500)={0x9}) dup(0xffffffffffffffff) fdatasync(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x12, &(0x7f0000000140)={0x10, 0x0}, 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x9}) ioctl$SG_GET_REQUEST_TABLE(r5, 0x2286, &(0x7f0000000580)) 22:00:20 executing program 1: r0 = socket$inet6(0xa, 0x200000000003, 0xb) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x1}, 0x1c) syzkaller login: [ 283.243053][ T9642] IPVS: ftp: loaded support on port[0] = 21 [ 283.427142][ T9642] chnl_net:caif_netlink_parms(): no params data found 22:00:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000180)) [ 283.518112][ T9645] IPVS: ftp: loaded support on port[0] = 21 [ 283.532747][ T9642] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.545661][ T9642] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.556284][ T9642] device bridge_slave_0 entered promiscuous mode [ 283.569270][ T9642] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.577982][ T9642] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.586459][ T9642] device bridge_slave_1 entered promiscuous mode [ 283.617612][ T9642] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 283.643419][ T9642] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 283.678728][ T9642] team0: Port device team_slave_0 added [ 283.688472][ T9642] team0: Port device team_slave_1 added [ 283.715325][ T9642] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 283.722422][ T9642] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 283.780211][ T9642] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 283.814150][ T9642] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 283.821412][ T9642] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 283.848128][ T9642] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 22:00:20 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') getdents64(r1, &(0x7f0000000380)=""/87, 0x192) syz_open_dev$vcsu(&(0x7f0000000140)='/dev/vcsu#\x00', 0x2, 0x8e301) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'batadv0\x00'}) r3 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x202, 0x0) write$P9_RSTATFS(r3, &(0x7f00000000c0)={0x43}, 0x43) flock(0xffffffffffffffff, 0x5) flock(0xffffffffffffffff, 0x2) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaa810000000000000060876f2f00081100fe8000000000000000000000000000aafe8800000000000000bb0000000000010000000000089078"], &(0x7f0000000000)={0x0, 0x2, [0x1, 0xf46]}) r4 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r4, &(0x7f0000000600)="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", 0x200) sendfile(r4, r5, 0x0, 0x7fffffa7) write$tun(r4, 0x0, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x202, 0x0) write$P9_RSTATFS(r6, &(0x7f00000000c0)={0x43}, 0x43) getsockname$packet(r6, 0x0, 0x0) [ 283.946039][ T9642] device hsr_slave_0 entered promiscuous mode [ 284.000620][ T9642] device hsr_slave_1 entered promiscuous mode [ 284.096760][ T9649] IPVS: ftp: loaded support on port[0] = 21 [ 284.103012][ T9645] chnl_net:caif_netlink_parms(): no params data found [ 284.113797][ T9651] IPVS: ftp: loaded support on port[0] = 21 22:00:21 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x22) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x200, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ftruncate(r0, 0x48280) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_ima(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) write$P9_RATTACH(r3, &(0x7f0000000000)={0x14}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x20000000000001cb, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, 0x4, 0x1, 0x201, 0x0, 0x0, {0x1, 0x0, 0x2}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8040}, 0x0) write$P9_RREMOVE(r4, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f0000000500)={0x9}) dup(0xffffffffffffffff) fdatasync(r4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x12, &(0x7f0000000140)={0x10, 0x0}, 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x9}) ioctl$SG_GET_REQUEST_TABLE(r5, 0x2286, &(0x7f0000000580)) [ 284.306614][ T9645] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.320263][ T9645] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.328269][ T9645] device bridge_slave_0 entered promiscuous mode [ 284.374556][ T9645] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.390292][ T9645] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.398329][ T9645] device bridge_slave_1 entered promiscuous mode [ 284.584484][ T9649] chnl_net:caif_netlink_parms(): no params data found [ 284.613417][ T9657] IPVS: ftp: loaded support on port[0] = 21 [ 284.623848][ T9645] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 22:00:21 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x0, 0x0) bind(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc004240a, 0x0) openat$pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) ioctl$VFIO_SET_IOMMU(r1, 0x3b66, 0x7) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x5, &(0x7f0000000400)={&(0x7f00000004c0)=ANY=[@ANYBLOB="480000001000050700000000000000800000af00", @ANYRES32=0x0, @ANYBLOB="7fff000000000000140012000c0001006d6163766c616e00a6ff02000a000500040000000000000008000a00", @ANYRES32, @ANYBLOB="51e5ec736bf613910d50c86c1ec597ba6b1c3c5743b46c00a9c63a4b89e7a4e25df465cea3acfa42e3719665ce28707f2e62e5685fa45f8d258d358b512c74add39bd41100a55ae54417942c7019e63cbea8e0eb07fe76e9652675ab74703d337e"], 0x48}}, 0x0) r3 = getpid() tkill(r3, 0x9) openat$hwrng(0xffffffffffffff9c, 0x0, 0x10000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) socket$inet6(0xa, 0x800000000000002, 0x0) [ 284.675010][ T9645] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 284.711943][ T9642] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 284.767971][ T9651] chnl_net:caif_netlink_parms(): no params data found [ 284.789447][ T9642] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 284.834022][ T9642] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 284.889613][ T9645] team0: Port device team_slave_0 added [ 284.910574][ T9642] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 284.923589][ T9661] IPVS: ftp: loaded support on port[0] = 21 [ 284.967063][ T9645] team0: Port device team_slave_1 added [ 284.995153][ T9649] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.002864][ T9649] bridge0: port 1(bridge_slave_0) entered disabled state [ 285.011907][ T9649] device bridge_slave_0 entered promiscuous mode [ 285.036722][ T9649] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.044069][ T9649] bridge0: port 2(bridge_slave_1) entered disabled state [ 285.052245][ T9649] device bridge_slave_1 entered promiscuous mode [ 285.076877][ T9649] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 285.086849][ T9645] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 285.094823][ T9645] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 285.121310][ T9645] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 285.134297][ T9645] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 285.141833][ T9645] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 285.168408][ T9645] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 285.203984][ T9649] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 285.287919][ T9651] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.295174][ T9651] bridge0: port 1(bridge_slave_0) entered disabled state [ 285.303894][ T9651] device bridge_slave_0 entered promiscuous mode [ 285.315143][ T9651] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.323415][ T9651] bridge0: port 2(bridge_slave_1) entered disabled state [ 285.331348][ T9651] device bridge_slave_1 entered promiscuous mode [ 285.340839][ T9649] team0: Port device team_slave_0 added [ 285.356345][ T9649] team0: Port device team_slave_1 added [ 285.402383][ T9645] device hsr_slave_0 entered promiscuous mode [ 285.440539][ T9645] device hsr_slave_1 entered promiscuous mode [ 285.480363][ T9645] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 285.488204][ T9645] Cannot create hsr debugfs directory [ 285.494090][ T9657] chnl_net:caif_netlink_parms(): no params data found [ 285.516977][ T9651] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 285.528491][ T9651] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 285.565166][ T9649] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 285.572255][ T9649] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 285.598443][ T9649] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 285.638232][ T9649] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 285.647339][ T9649] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 285.673399][ T9649] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 285.686906][ T9651] team0: Port device team_slave_0 added [ 285.697794][ T9651] team0: Port device team_slave_1 added [ 285.716211][ T9651] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 285.723262][ T9651] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 285.750237][ T9651] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 285.763356][ T9651] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 285.771466][ T9651] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 285.797587][ T9651] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 285.902432][ T9649] device hsr_slave_0 entered promiscuous mode [ 285.940671][ T9649] device hsr_slave_1 entered promiscuous mode [ 285.980281][ T9649] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 285.987913][ T9649] Cannot create hsr debugfs directory [ 286.078647][ T9657] bridge0: port 1(bridge_slave_0) entered blocking state [ 286.085940][ T9657] bridge0: port 1(bridge_slave_0) entered disabled state [ 286.094390][ T9657] device bridge_slave_0 entered promiscuous mode [ 286.163823][ T9651] device hsr_slave_0 entered promiscuous mode [ 286.200580][ T9651] device hsr_slave_1 entered promiscuous mode [ 286.240370][ T9651] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 286.247960][ T9651] Cannot create hsr debugfs directory [ 286.273102][ T9657] bridge0: port 2(bridge_slave_1) entered blocking state [ 286.280827][ T9657] bridge0: port 2(bridge_slave_1) entered disabled state [ 286.288763][ T9657] device bridge_slave_1 entered promiscuous mode [ 286.316984][ T9661] chnl_net:caif_netlink_parms(): no params data found [ 286.350964][ T9657] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 286.405736][ T9657] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 286.464939][ T9657] team0: Port device team_slave_0 added [ 286.475195][ T9657] team0: Port device team_slave_1 added [ 286.517210][ T9657] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 286.524417][ T9657] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 286.550986][ T9657] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 286.587568][ T9649] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 286.654958][ T9649] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 286.713720][ T9657] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 286.720765][ T9657] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 286.747019][ T9657] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 286.801476][ T9649] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 286.876877][ T9642] 8021q: adding VLAN 0 to HW filter on device bond0 [ 286.891593][ T9645] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 286.988037][ T9645] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 287.036868][ T9645] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 287.103879][ T9649] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 287.212380][ T9657] device hsr_slave_0 entered promiscuous mode [ 287.250647][ T9657] device hsr_slave_1 entered promiscuous mode [ 287.300389][ T9657] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 287.308020][ T9657] Cannot create hsr debugfs directory [ 287.325039][ T9661] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.332451][ T9661] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.340657][ T9661] device bridge_slave_0 entered promiscuous mode [ 287.352330][ T9645] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 287.415015][ T9661] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.423424][ T9661] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.432226][ T9661] device bridge_slave_1 entered promiscuous mode [ 287.466721][ T2749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 287.476008][ T2749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 287.488560][ T9642] 8021q: adding VLAN 0 to HW filter on device team0 [ 287.514820][ T9661] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 287.554231][ T9661] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 287.570704][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 287.579332][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 287.588500][ T2748] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.595857][ T2748] bridge0: port 1(bridge_slave_0) entered forwarding state [ 287.608275][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 287.657594][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 287.676273][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 287.685408][ T2855] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.692552][ T2855] bridge0: port 2(bridge_slave_1) entered forwarding state [ 287.707393][ T9661] team0: Port device team_slave_0 added [ 287.719783][ T9661] team0: Port device team_slave_1 added [ 287.728055][ T9651] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 287.834516][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 287.843808][ T9651] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 287.873967][ T9651] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 287.962772][ T9651] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 288.034347][ T9661] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 288.042065][ T9661] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 288.068839][ T9661] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 288.080722][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 288.089458][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 288.098485][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 288.147251][ T9661] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 288.154921][ T9661] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 288.181800][ T9661] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 288.193319][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 288.202160][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 288.211065][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 288.234958][ T2749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 288.243446][ T2749] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 288.252665][ T2749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 288.261564][ T2749] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 288.273975][ T9649] 8021q: adding VLAN 0 to HW filter on device bond0 [ 288.291480][ T9657] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 288.334281][ T9657] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 288.411804][ T9642] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 288.420452][ T9657] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 288.464208][ T9657] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 288.566267][ T9661] device hsr_slave_0 entered promiscuous mode [ 288.620784][ T9661] device hsr_slave_1 entered promiscuous mode [ 288.670305][ T9661] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 288.678057][ T9661] Cannot create hsr debugfs directory [ 288.707977][ T9649] 8021q: adding VLAN 0 to HW filter on device team0 [ 288.738108][ T9645] 8021q: adding VLAN 0 to HW filter on device bond0 [ 288.747866][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 288.757867][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 288.804687][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 288.813745][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 288.824227][ T2748] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.831545][ T2748] bridge0: port 1(bridge_slave_0) entered forwarding state [ 288.839673][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 288.848510][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 288.856935][ T2748] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.864071][ T2748] bridge0: port 2(bridge_slave_1) entered forwarding state [ 288.871869][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 288.880773][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 288.888249][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 288.896798][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 288.927639][ T9642] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 288.946457][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 288.958579][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 288.967618][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 288.976662][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 288.985379][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 288.994105][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 289.002685][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 289.011828][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 289.029955][ T9649] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 289.042501][ T9649] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 289.064978][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 289.074427][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 289.083125][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 289.093710][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 289.114458][ T9645] 8021q: adding VLAN 0 to HW filter on device team0 [ 289.180599][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 289.188400][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 289.199236][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 289.208225][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 289.216821][ T2748] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.223927][ T2748] bridge0: port 1(bridge_slave_0) entered forwarding state [ 289.234840][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 289.243054][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 289.252687][ T2748] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 289.273531][ T9651] 8021q: adding VLAN 0 to HW filter on device bond0 [ 289.286251][ T9649] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 289.302057][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 289.315566][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 289.324304][ T2737] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.331909][ T2737] bridge0: port 2(bridge_slave_1) entered forwarding state [ 289.342914][ T9657] 8021q: adding VLAN 0 to HW filter on device bond0 [ 289.370503][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 289.378867][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 289.398915][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 289.408732][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 289.417659][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 289.427069][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 289.436196][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 289.445618][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 289.454974][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 289.503696][ T9642] device veth0_vlan entered promiscuous mode [ 289.530835][ T9651] 8021q: adding VLAN 0 to HW filter on device team0 [ 289.538121][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 289.550050][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 289.558123][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 289.566858][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 289.575863][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 289.584834][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 289.593268][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 289.602285][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 289.611122][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 289.618878][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 289.644020][ T9657] 8021q: adding VLAN 0 to HW filter on device team0 [ 289.658183][ T9642] device veth1_vlan entered promiscuous mode [ 289.697252][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 289.706107][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 289.715453][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 289.724245][ T2855] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.731438][ T2855] bridge0: port 1(bridge_slave_0) entered forwarding state [ 289.740885][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 289.749260][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 289.757769][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 289.766612][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 289.775128][ T2855] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.782358][ T2855] bridge0: port 2(bridge_slave_1) entered forwarding state [ 289.791072][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 289.799729][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 289.808393][ T2855] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.815489][ T2855] bridge0: port 1(bridge_slave_0) entered forwarding state [ 289.829550][ T9645] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 289.844965][ T9645] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 289.855752][ T9649] device veth0_vlan entered promiscuous mode [ 289.882879][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 289.891927][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 289.900966][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 289.908714][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 289.918333][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 289.926973][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 289.935823][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 289.944718][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 289.957316][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 289.966269][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 289.975172][ T2885] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.982395][ T2885] bridge0: port 2(bridge_slave_1) entered forwarding state [ 290.016060][ T9649] device veth1_vlan entered promiscuous mode [ 290.032033][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 290.040105][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 290.055759][ T9661] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 290.093168][ T9661] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 290.151798][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 290.164275][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 290.173773][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 290.183813][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 290.193333][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 290.203313][ T9661] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 290.259281][ T9661] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 290.306723][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 290.314607][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 290.322450][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 290.332870][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 290.341961][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 290.351115][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 290.361726][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 290.387549][ T9642] device veth0_macvtap entered promiscuous mode [ 290.404533][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 290.413158][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 290.425836][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 290.435701][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 290.445371][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 290.458836][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 290.468499][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 290.477886][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 290.487203][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 290.501920][ T9645] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 290.516855][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 290.529502][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 290.541686][ T9649] device veth0_macvtap entered promiscuous mode [ 290.568805][ T9651] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 290.577660][ T9642] device veth1_macvtap entered promiscuous mode [ 290.593339][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 290.601765][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 290.609787][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 290.620716][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 290.630023][ T9649] device veth1_macvtap entered promiscuous mode [ 290.649665][ T9657] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 290.666976][ T9657] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 290.704824][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 290.713209][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 290.723109][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 290.731727][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 290.741199][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 290.768644][ T9642] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 290.782904][ T9649] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 290.796237][ T9649] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 290.807743][ T9649] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 290.826019][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 290.840994][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 290.851549][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 290.860397][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 290.885440][ T9649] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 290.909762][ T9651] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 290.923026][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 290.935107][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 290.944311][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 290.953277][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 290.966621][ T9645] device veth0_vlan entered promiscuous mode [ 291.035203][ T9642] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 291.045740][ T9642] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 291.057814][ T9642] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 291.066730][ T2749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 291.075627][ T2749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 291.084854][ T2749] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 291.094010][ T2749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 291.125547][ T2749] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 291.134524][ T2749] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 291.146897][ T2749] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 291.155298][ T2749] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 291.176101][ T9645] device veth1_vlan entered promiscuous mode [ 291.197632][ T9657] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 291.274056][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 291.292274][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 22:00:28 executing program 2: [ 291.510499][ T2749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 291.519527][ T2749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 291.578027][ T9651] device veth0_vlan entered promiscuous mode [ 291.603786][ T9661] 8021q: adding VLAN 0 to HW filter on device bond0 [ 291.625775][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 291.648086][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 291.668795][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready 22:00:28 executing program 2: [ 291.686430][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 291.692958][ T27] kauditd_printk_skb: 3 callbacks suppressed [ 291.692973][ T27] audit: type=1804 audit(1580940028.562:31): pid=9682 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir752524036/syzkaller.YKRb8R/0/bus" dev="sda1" ino=16520 res=1 [ 291.703101][ T9645] device veth0_macvtap entered promiscuous mode [ 291.745988][ T9651] device veth1_vlan entered promiscuous mode [ 291.755600][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 291.765196][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 291.773627][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 291.786954][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 291.797780][ T27] audit: type=1804 audit(1580940028.632:32): pid=9682 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir752524036/syzkaller.YKRb8R/0/bus" dev="sda1" ino=16520 res=1 22:00:28 executing program 2: [ 291.845502][ T9645] device veth1_macvtap entered promiscuous mode [ 291.856115][ C0] hrtimer: interrupt took 30856 ns [ 291.878802][ T9661] 8021q: adding VLAN 0 to HW filter on device team0 [ 291.901739][ T27] audit: type=1804 audit(1580940028.782:33): pid=9682 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir752524036/syzkaller.YKRb8R/0/bus" dev="sda1" ino=16520 res=1 [ 291.924899][ T9657] device veth0_vlan entered promiscuous mode [ 291.943771][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 22:00:28 executing program 2: [ 291.956638][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 291.983437][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 291.999408][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 22:00:28 executing program 2: [ 292.008026][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 292.039529][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 292.083373][ T9645] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 292.096319][ T27] audit: type=1804 audit(1580940028.972:34): pid=9687 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir752524036/syzkaller.YKRb8R/0/bus" dev="sda1" ino=16520 res=1 [ 292.107715][ T9645] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 22:00:29 executing program 2: [ 292.142528][ T9645] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 292.173394][ T9645] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 292.186094][ T27] audit: type=1804 audit(1580940029.032:35): pid=9692 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir752524036/syzkaller.YKRb8R/0/bus" dev="sda1" ino=16520 res=1 [ 292.214555][ T9645] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 292.222672][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 292.232610][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 292.242657][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 292.252359][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 292.262434][ T2841] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.269533][ T2841] bridge0: port 1(bridge_slave_0) entered forwarding state 22:00:29 executing program 0: [ 292.287944][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 292.297895][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 292.307281][ T2841] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.314430][ T2841] bridge0: port 2(bridge_slave_1) entered forwarding state [ 292.324538][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 292.333635][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 292.349383][ T9657] device veth1_vlan entered promiscuous mode [ 292.386317][ T9645] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 292.407786][ T9645] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 292.418588][ T9645] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 292.430722][ T9645] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 292.447114][ T9645] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 292.455294][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 292.466631][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 292.475471][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 292.487740][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 292.538045][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 292.552153][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 292.561248][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 292.569794][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 292.579036][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 292.587851][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 292.596591][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 292.604959][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 292.613909][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 292.631628][ T9651] device veth0_macvtap entered promiscuous mode [ 292.742757][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 292.751630][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 292.759731][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 292.768659][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 292.779575][ T9661] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 292.816767][ T9651] device veth1_macvtap entered promiscuous mode [ 292.858288][ T9657] device veth0_macvtap entered promiscuous mode [ 292.888777][ T9657] device veth1_macvtap entered promiscuous mode 22:00:29 executing program 1: 22:00:29 executing program 2: [ 292.911023][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 292.924108][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 292.933329][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 292.959676][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 292.969552][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 292.998793][ T9657] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 293.027055][ T9657] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 293.047539][ T9657] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 293.058464][ T9657] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 293.069660][ T9657] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 293.080908][ T9657] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 293.093490][ T9657] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 293.108091][ T9657] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 293.120104][ T9657] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 293.130545][ T9657] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 293.143129][ T9657] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 293.153990][ T9657] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 293.165192][ T9657] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 293.176972][ T9657] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 293.190231][ T9661] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 293.201326][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 293.208857][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 293.216829][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 293.226534][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 293.235736][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 293.244537][ T2885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 293.281462][ T9651] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 293.292524][ T9651] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 293.305205][ T9651] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 293.316411][ T9651] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 293.326507][ T9651] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 293.337069][ T9651] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 293.347298][ T9651] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 293.358165][ T9651] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 293.370072][ T9651] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 293.387052][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 293.395919][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 293.407800][ T9651] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 293.422130][ T9651] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 293.434111][ T9651] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 293.444925][ T9651] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 293.454880][ T9651] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 293.465628][ T9651] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 293.475557][ T9651] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 293.486884][ T9651] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 293.498477][ T9651] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 293.546346][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 293.555324][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 293.719279][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 293.729065][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 293.779310][ T27] audit: type=1804 audit(1580940030.652:36): pid=9715 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir814172960/syzkaller.yXhwY4/0/bus" dev="sda1" ino=16532 res=1 [ 293.805189][ T27] audit: type=1804 audit(1580940030.662:37): pid=9715 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir814172960/syzkaller.yXhwY4/0/bus" dev="sda1" ino=16532 res=1 [ 293.834189][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 293.844361][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 293.879697][ T9661] device veth0_vlan entered promiscuous mode [ 293.910398][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 293.918319][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 293.936071][ T9661] device veth1_vlan entered promiscuous mode [ 293.949008][ T27] audit: type=1804 audit(1580940030.822:38): pid=9716 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir814172960/syzkaller.yXhwY4/0/bus" dev="sda1" ino=16532 res=1 [ 294.035600][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 294.052476][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 294.076288][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 294.100013][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 294.135531][ T9661] device veth0_macvtap entered promiscuous mode [ 294.185477][ T9661] device veth1_macvtap entered promiscuous mode [ 294.256526][ T27] audit: type=1804 audit(1580940031.132:39): pid=9716 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir814172960/syzkaller.yXhwY4/0/bus" dev="sda1" ino=16532 res=1 [ 294.286541][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 294.297274][ T2841] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 294.315288][ T9661] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 294.333673][ T9661] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 294.350745][ T27] audit: type=1804 audit(1580940031.182:40): pid=9716 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir814172960/syzkaller.yXhwY4/0/bus" dev="sda1" ino=16532 res=1 [ 294.376329][ T9661] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 294.394392][ T9661] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 294.407261][ T9661] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 294.427763][ T9661] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 294.445342][ T9661] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 294.458827][ T9661] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 294.476539][ T9661] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 294.487580][ T9661] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 294.509421][ T9661] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 294.527976][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 294.545486][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 294.561673][ T9661] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 294.588419][ T9661] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 294.610718][ T9661] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 294.621249][ T9661] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 294.627287][ T9715] syz-executor.4 (9715) used greatest stack depth: 22472 bytes left [ 294.631112][ T9661] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 294.631119][ T9661] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 294.631132][ T9661] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 294.631138][ T9661] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 22:00:31 executing program 3: 22:00:31 executing program 0: [ 294.631158][ T9661] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 294.631165][ T9661] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 294.633236][ T9661] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 294.712453][ T2749] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 294.722696][ T2749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 295.007181][ T9731] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 295.015833][ T9731] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 295.071310][ T9731] device gretap0 entered promiscuous mode [ 295.077478][ T9731] device macvlan2 entered promiscuous mode [ 295.089943][ T9731] device gretap0 left promiscuous mode 22:00:32 executing program 5: 22:00:32 executing program 1: 22:00:32 executing program 2: 22:00:32 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x22) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x200, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ftruncate(r0, 0x48280) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_ima(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) write$P9_RATTACH(r3, &(0x7f0000000000)={0x14}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x20000000000001cb, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, 0x4, 0x1, 0x201, 0x0, 0x0, {0x1, 0x0, 0x2}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8040}, 0x0) write$P9_RREMOVE(r4, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f0000000500)={0x9}) dup(0xffffffffffffffff) fdatasync(r4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x12, &(0x7f0000000140)={0x10, 0x0}, 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x9}) ioctl$SG_GET_REQUEST_TABLE(r5, 0x2286, &(0x7f0000000580)) 22:00:32 executing program 0: 22:00:32 executing program 3: 22:00:32 executing program 2: 22:00:32 executing program 1: 22:00:32 executing program 0: 22:00:32 executing program 3: 22:00:32 executing program 5: 22:00:32 executing program 1: 22:00:32 executing program 2: 22:00:32 executing program 3: 22:00:33 executing program 0: 22:00:33 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x22) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x200, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ftruncate(r0, 0x48280) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_ima(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) write$P9_RATTACH(r3, &(0x7f0000000000)={0x14}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x20000000000001cb, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, 0x4, 0x1, 0x201, 0x0, 0x0, {0x1, 0x0, 0x2}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8040}, 0x0) write$P9_RREMOVE(r4, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f0000000500)={0x9}) dup(0xffffffffffffffff) fdatasync(r4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x12, &(0x7f0000000140)={0x10, 0x0}, 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x9}) ioctl$SG_GET_REQUEST_TABLE(r5, 0x2286, &(0x7f0000000580)) 22:00:33 executing program 5: 22:00:33 executing program 1: 22:00:33 executing program 2: 22:00:33 executing program 3: 22:00:33 executing program 0: 22:00:33 executing program 0: 22:00:33 executing program 1: 22:00:33 executing program 3: 22:00:33 executing program 5: 22:00:33 executing program 2: 22:00:33 executing program 3: [ 297.066995][ T27] kauditd_printk_skb: 4 callbacks suppressed [ 297.067010][ T27] audit: type=1804 audit(1580940033.942:45): pid=9787 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir814172960/syzkaller.yXhwY4/2/bus" dev="sda1" ino=16530 res=1 [ 297.264920][ T27] audit: type=1804 audit(1580940034.142:46): pid=9776 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir814172960/syzkaller.yXhwY4/2/bus" dev="sda1" ino=16530 res=1 [ 297.364694][ T27] audit: type=1804 audit(1580940034.242:47): pid=9776 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir814172960/syzkaller.yXhwY4/2/bus" dev="sda1" ino=16530 res=1 22:00:34 executing program 4: 22:00:34 executing program 2: 22:00:34 executing program 0: 22:00:34 executing program 5: 22:00:34 executing program 1: 22:00:34 executing program 3: 22:00:34 executing program 3: 22:00:34 executing program 5: 22:00:34 executing program 2: 22:00:34 executing program 1: 22:00:34 executing program 0: 22:00:34 executing program 4: 22:00:34 executing program 2: 22:00:34 executing program 3: 22:00:34 executing program 5: 22:00:34 executing program 0: 22:00:34 executing program 1: 22:00:34 executing program 4: 22:00:34 executing program 2: 22:00:35 executing program 0: 22:00:35 executing program 3: 22:00:35 executing program 1: 22:00:35 executing program 5: 22:00:35 executing program 4: 22:00:35 executing program 2: 22:00:35 executing program 0: 22:00:35 executing program 3: 22:00:35 executing program 5: 22:00:35 executing program 1: 22:00:35 executing program 4: 22:00:35 executing program 0: 22:00:35 executing program 3: 22:00:35 executing program 1: 22:00:35 executing program 2: 22:00:35 executing program 5: 22:00:35 executing program 4: 22:00:35 executing program 1: 22:00:35 executing program 0: 22:00:35 executing program 3: 22:00:35 executing program 5: 22:00:35 executing program 4: 22:00:35 executing program 2: 22:00:35 executing program 1: 22:00:36 executing program 0: 22:00:36 executing program 5: 22:00:36 executing program 3: 22:00:36 executing program 4: 22:00:36 executing program 1: 22:00:36 executing program 2: 22:00:36 executing program 3: 22:00:36 executing program 0: 22:00:36 executing program 5: 22:00:36 executing program 3: 22:00:36 executing program 5: 22:00:36 executing program 1: 22:00:36 executing program 4: 22:00:36 executing program 2: 22:00:36 executing program 0: 22:00:36 executing program 3: 22:00:36 executing program 4: 22:00:36 executing program 5: 22:00:36 executing program 0: 22:00:36 executing program 1: 22:00:36 executing program 3: 22:00:36 executing program 2: 22:00:36 executing program 5: 22:00:36 executing program 4: 22:00:36 executing program 1: 22:00:36 executing program 3: 22:00:37 executing program 0: 22:00:37 executing program 2: 22:00:37 executing program 1: 22:00:37 executing program 0: 22:00:37 executing program 5: 22:00:37 executing program 4: 22:00:37 executing program 3: 22:00:37 executing program 2: 22:00:37 executing program 5: 22:00:37 executing program 1: 22:00:37 executing program 0: 22:00:37 executing program 3: 22:00:37 executing program 4: 22:00:37 executing program 2: 22:00:37 executing program 5: 22:00:37 executing program 3: 22:00:37 executing program 1: 22:00:37 executing program 4: 22:00:37 executing program 0: 22:00:37 executing program 2: 22:00:37 executing program 5: 22:00:37 executing program 3: 22:00:37 executing program 1: 22:00:37 executing program 2: 22:00:38 executing program 0: 22:00:38 executing program 4: 22:00:38 executing program 5: 22:00:38 executing program 2: 22:00:38 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000280)=@security={'security\x00', 0xe, 0x4, 0x370, 0x1d0, 0x0, 0x0, 0x0, 0x1d0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00'}}, {{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) 22:00:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="72617700000700000000000000000000000000000000000000000000000000000900000003000000f8020000d0010000d0010000d001000000000000000000006002000060020000600200006002000060020000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006801d001000000000000000000000000004e100000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010873797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000068004354000000000000000000000000000000000000000000000000000000020300000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e4ff00000000000070009000000001000000000000000000000000000000000020004e4f545241434b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280000000079c900000000000000000000000000000000000000000000000000feffffff"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x800001d, 0x0) 22:00:38 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup2(r1, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 22:00:38 executing program 0: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000258f88)) msgsnd(0x0, &(0x7f0000000340)={0x3}, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000600)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) 22:00:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468000000e1801fed9e7ff2420048ea908e", @ANYRES32=0x0, @ANYBLOB="fa66eb3ed7c55caf"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r6}, [@IFA_LOCAL={0x8, 0x2, @multicast1}, @IFA_BROADCAST={0x8}]}, 0x28}}, 0x0) [ 301.490702][ T9988] x_tables: duplicate underflow at hook 3 [ 301.493592][ T9989] x_tables: duplicate underflow at hook 2 22:00:38 executing program 2: 22:00:38 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="240000002e0009a600010015f7ea123440000000", @ANYRES32], 0x2}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 301.613750][T10002] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 22:00:38 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x800000003, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) 22:00:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000000e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c0002800800014000008a000c00018008000140000000000800064000000000050005000200000005000100060000007d171882435c5e840c4f44bc332173c5ea9039d5809e04bdeff854"], 0x6c}}, 0x0) 22:00:38 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="b40000000000000061000000000000004d1b0000000000009500000000000000d10e12cff6e5b462c0fcf0fdef01dc8a1498f0a8a6c859cbe815ef21a5301d6a5d145f534a80486d732572aa8fb8120ad21d54fa6a932d68325269fe1952117321cf3f317004c18bd9fc926a5f96f0693ce080ce58d17f66"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x149}, 0x48) 22:00:38 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0xfa66c434f3c598a3}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) 22:00:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x30, 0x3, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}, @CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @udp=[@CTA_TIMEOUT_UDP_REPLIED={0x8}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x2}]}, 0x30}}, 0x0) 22:00:38 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000540)={@broadcast, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0x10, 0x3a, 0x0, @rand_addr="30c51055b0a3f7179f080a4999ef037d", @mcast2, {[], @ndisc_ra}}}}}, 0x0) [ 302.246801][ T9988] x_tables: duplicate underflow at hook 3 22:00:39 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() tkill(0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) write$P9_RXATTRWALK(r1, &(0x7f0000000000)={0xffffffffffffffdb}, 0xffffffa9) 22:00:39 executing program 2: r0 = gettid() rt_sigqueueinfo(r0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x3}) 22:00:39 executing program 4: msgsnd(0x0, &(0x7f0000000340)={0x3}, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000600)) 22:00:39 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x69, 0x11, 0x1a001000000}, [@ldst={0x5, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe98}, 0x48) 22:00:39 executing program 5: timer_create(0x0, 0x0, &(0x7f0000044000)) gettid() mknod(&(0x7f0000000180)='./file0\x00', 0x8001420, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x15f, &(0x7f0000000180)={0x0, 0x40}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 22:00:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0020000000000000751dc23d8e008672391e51823799a0837eb904c9cedb383db4eff9d3f961ea48af33fb086dd809e74b05008b925b759fb97b84434f357bf55290ae2254db822b9f4b0a0256facb44521fa875669dd65b11c470252c5c3d9f4636bd897ff950e796e68a63ff88ba4600f241c913de3520493f7aa263989ac3f7d250dba5e5bc918809c9ee4a16e2703708f0dd2edb378300000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) r7 = dup3(r2, r5, 0x0) sendmsg$nl_route_sched(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x4}}]}, 0x34}}, 0x0) 22:00:39 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000100)=r2) 22:00:39 executing program 2: clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) poll(0x0, 0x0, 0x8000000000000200) r0 = memfd_create(&(0x7f0000000300)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r0, 0x400, 0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000200)=""/231, 0x1000006ce) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 22:00:39 executing program 3: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB='m'], 0x1) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) mprotect(&(0x7f0000608000/0xe000)=nil, 0xe000, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) 22:00:39 executing program 5: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000001c0)="a2e6999b", 0x4) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000640)={{0x108, 0x0, 0x0, 0x1c4, 0x0, 0x0, 0x0, 0x0, 0x8}, "", [[]]}, 0x120) 22:00:39 executing program 4: r0 = socket$inet(0x10, 0x3, 0x20000000006) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @empty}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in=@empty}}, 0xe8) r2 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @empty}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in=@empty}}, 0xe8) r3 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @empty}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in=@empty}}, 0xe8) r4 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @empty}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in=@empty}}, 0xe8) r5 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @empty}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in=@empty}}, 0xe8) r6 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @empty}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in=@empty}}, 0xe8) r7 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @empty}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in=@empty}}, 0xe8) r8 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @empty}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in=@empty}}, 0xe8) r9 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r9, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @empty}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in=@empty}}, 0xe8) r10 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r10, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @empty}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in=@empty}}, 0xe8) r11 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r11, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @empty}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in=@empty}}, 0xe8) r12 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r12, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @empty}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in=@empty}}, 0xe8) r13 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @empty}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in=@empty}}, 0xe8) r14 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r14, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @empty}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in=@empty}}, 0xe8) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000000)="24000000150007031dfffd946fa2830002200a0009000000741d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 22:00:39 executing program 0: [ 302.842698][T10078] ERROR: Domain ' /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.2 proc:/self/fd/3' not defined. [ 302.903715][ C0] ================================================================== [ 302.912127][ C0] BUG: KASAN: slab-out-of-bounds in bitmap_ip_gc+0x100/0x4f0 [ 302.919517][ C0] Read of size 8 at addr ffff888052309140 by task syz-executor.0/9642 [ 302.927668][ C0] [ 302.930015][ C0] CPU: 0 PID: 9642 Comm: syz-executor.0 Not tainted 5.5.0-rc6-next-20200116-syzkaller #0 [ 302.939954][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.950018][ C0] Call Trace: [ 302.953312][ C0] [ 302.956299][ C0] dump_stack+0x197/0x210 [ 302.960646][ C0] ? bitmap_ip_gc+0x100/0x4f0 [ 302.965402][ C0] print_address_description.constprop.0.cold+0xd4/0x30b [ 302.972442][ C0] ? bitmap_ip_gc+0x100/0x4f0 [ 302.977136][ C0] ? bitmap_ip_gc+0x100/0x4f0 [ 302.981831][ C0] __kasan_report.cold+0x1b/0x32 [ 302.986786][ C0] ? bitmap_ip_gc+0x100/0x4f0 [ 302.991484][ C0] kasan_report+0x12/0x20 [ 302.995883][ C0] check_memory_region+0x134/0x1a0 [ 303.001017][ C0] __kasan_check_read+0x11/0x20 [ 303.005920][ C0] bitmap_ip_gc+0x100/0x4f0 [ 303.010519][ C0] call_timer_fn+0x1ac/0x780 [ 303.015127][ C0] ? bitmap_ip_test+0x170/0x170 [ 303.020190][ C0] ? msleep_interruptible+0x150/0x150 [ 303.025583][ C0] ? run_timer_softirq+0x6b1/0x1790 [ 303.030868][ C0] ? trace_hardirqs_on+0x67/0x240 [ 303.035923][ C0] ? bitmap_ip_test+0x170/0x170 [ 303.040792][ C0] ? bitmap_ip_test+0x170/0x170 [ 303.047666][ C0] run_timer_softirq+0x6c3/0x1790 [ 303.052716][ C0] ? add_timer+0x930/0x930 [ 303.057229][ C0] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 303.063414][ C0] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 303.068994][ C0] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 303.075001][ C0] ? trace_hardirqs_on+0x67/0x240 [ 303.080118][ C0] __do_softirq+0x262/0x98c [ 303.084687][ C0] ? sched_clock_cpu+0x1b/0x1b0 [ 303.089626][ C0] irq_exit+0x19b/0x1e0 [ 303.093798][ C0] smp_apic_timer_interrupt+0x1a3/0x610 [ 303.099401][ C0] apic_timer_interrupt+0xf/0x20 [ 303.104362][ C0] [ 303.107376][ C0] RIP: 0010:write_comp_data+0x68/0x70 [ 303.112759][ C0] Code: 00 00 4e 8d 14 dd 28 00 00 00 4d 39 d0 72 1b 49 83 c1 01 4a 89 7c 10 e0 4a 89 74 10 e8 4a 89 54 10 f0 4a 89 4c d8 20 4c 89 08 0f 1f 80 00 00 00 00 55 40 0f b6 d6 40 0f b6 f7 31 ff 48 89 e5 [ 303.132456][ C0] RSP: 0018:ffffc90002007850 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 [ 303.140871][ C0] RAX: 0000000000000000 RBX: 0000000000000012 RCX: ffffffff86e59d4d [ 303.148839][ C0] RDX: 0000000000000040 RSI: 0000000000000019 RDI: 0000000000000005 [ 303.156814][ C0] RBP: ffffc90002007870 R08: ffff88809557c280 R09: fffffbfff16a51ba [ 303.164779][ C0] R10: fffffbfff16a51b9 R11: ffffffff8b528dcf R12: ffffffff8905bc60 [ 303.172752][ C0] R13: 0000000000000038 R14: 00000000000002e8 R15: 0000000000776172 [ 303.180836][ C0] ? do_ipv6_setsockopt.isra.0+0x28d/0x4290 [ 303.186729][ C0] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 303.192627][ C0] do_ipv6_setsockopt.isra.0+0x28d/0x4290 [ 303.198380][ C0] ? ipv6_update_options+0x3b0/0x3b0 [ 303.203734][ C0] ? xt_table_unlock+0x48/0x60 [ 303.208535][ C0] ? find_held_lock+0x35/0x130 [ 303.213297][ C0] ? xt_table_unlock+0x48/0x60 [ 303.218070][ C0] ? lock_downgrade+0x920/0x920 [ 303.222942][ C0] ? kfree+0x226/0x2c0 [ 303.227000][ C0] ? kfree+0x226/0x2c0 [ 303.231060][ C0] ? lockdep_hardirqs_on+0x421/0x5e0 [ 303.236354][ C0] ? trace_hardirqs_on+0x67/0x240 [ 303.241382][ C0] ? __kasan_check_write+0x14/0x20 [ 303.246499][ C0] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 303.252047][ C0] ? __kasan_check_read+0x11/0x20 [ 303.257075][ C0] ? mark_lock+0xc2/0x1220 [ 303.261601][ C0] ? __kasan_check_read+0x11/0x20 [ 303.266625][ C0] ? __lock_acquire+0x16f2/0x4a00 [ 303.271645][ C0] ? xt_table_unlock+0x48/0x60 [ 303.276466][ C0] ? do_ip6t_get_ctl+0x18c/0x960 [ 303.281467][ C0] ? __might_fault+0x12b/0x1e0 [ 303.286279][ C0] ? ___might_sleep+0x163/0x2c0 [ 303.291149][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 303.297465][ C0] ? aa_label_sk_perm+0x91/0xf0 [ 303.302327][ C0] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 303.307964][ C0] ? aa_sk_perm+0x346/0xb00 [ 303.312462][ C0] ? aa_af_perm+0x2a0/0x2a0 [ 303.316986][ C0] ? __might_fault+0x1a1/0x1e0 [ 303.321767][ C0] ipv6_setsockopt+0xff/0x180 [ 303.326455][ C0] ? ipv6_setsockopt+0xff/0x180 [ 303.331365][ C0] tcp_setsockopt+0x8f/0xe0 [ 303.335966][ C0] sock_common_setsockopt+0x94/0xd0 [ 303.341203][ C0] __sys_setsockopt+0x261/0x4c0 [ 303.346082][ C0] ? sock_create_kern+0x50/0x50 [ 303.350942][ C0] ? __sys_getsockopt+0x1b2/0x310 [ 303.357425][ C0] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 303.362874][ C0] ? do_syscall_64+0x26/0x790 [ 303.367545][ C0] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.373614][ C0] ? do_syscall_64+0x26/0x790 [ 303.378296][ C0] __x64_sys_setsockopt+0xbe/0x150 [ 303.383400][ C0] do_syscall_64+0xfa/0x790 [ 303.387913][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.393799][ C0] RIP: 0033:0x45deca [ 303.397928][ C0] Code: 49 89 ca b8 37 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 6a 8b fb ff c3 66 0f 1f 84 00 00 00 00 00 49 89 ca b8 36 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 4a 8b fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 303.417541][ C0] RSP: 002b:00007fffd1c5cbe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000036 [ 303.426068][ C0] RAX: ffffffffffffffda RBX: 00007fffd1c5cc10 RCX: 000000000045deca [ 303.434222][ C0] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 303.442194][ C0] RBP: 000000000071bcc0 R08: 00000000000002e8 R09: 0000000000004000 [ 303.450166][ C0] R10: 000000000071afa0 R11: 0000000000000206 R12: 0000000000000003 [ 303.458154][ C0] R13: 0000000000000000 R14: 0000000000000029 R15: 000000000071af40 [ 303.466127][ C0] [ 303.468594][ C0] Allocated by task 10015: [ 303.473011][ C0] save_stack+0x23/0x90 [ 303.477170][ C0] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 303.482882][ C0] kasan_kmalloc+0x9/0x10 [ 303.487200][ C0] __kmalloc+0x163/0x770 [ 303.491450][ C0] ip_set_alloc+0x38/0x5e [ 303.495861][ C0] bitmap_ip_create+0x6ec/0xc20 [ 303.500744][ C0] ip_set_create+0x6f1/0x1500 [ 303.505542][ C0] nfnetlink_rcv_msg+0xcf2/0xfb0 [ 303.510484][ C0] netlink_rcv_skb+0x177/0x450 [ 303.515239][ C0] nfnetlink_rcv+0x1ba/0x460 [ 303.519816][ C0] netlink_unicast+0x59e/0x7e0 [ 303.524568][ C0] netlink_sendmsg+0x91c/0xea0 [ 303.529348][ C0] sock_sendmsg+0xd7/0x130 [ 303.533950][ C0] ____sys_sendmsg+0x753/0x880 [ 303.538706][ C0] ___sys_sendmsg+0x100/0x170 [ 303.543381][ C0] __sys_sendmsg+0x105/0x1d0 [ 303.547983][ C0] __x64_sys_sendmsg+0x78/0xb0 [ 303.552751][ C0] do_syscall_64+0xfa/0x790 [ 303.557258][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.563135][ C0] [ 303.565451][ C0] Freed by task 2855: [ 303.569436][ C0] save_stack+0x23/0x90 [ 303.573580][ C0] __kasan_slab_free+0x102/0x150 [ 303.578512][ C0] kasan_slab_free+0xe/0x10 [ 303.583013][ C0] kfree+0x10a/0x2c0 [ 303.586954][ C0] aio_free_ring+0x356/0x460 [ 303.591538][ C0] free_ioctx+0x1e/0x70 [ 303.595807][ C0] process_one_work+0xa05/0x17a0 [ 303.600738][ C0] worker_thread+0x98/0xe40 [ 303.605485][ C0] kthread+0x361/0x430 [ 303.609562][ C0] ret_from_fork+0x24/0x30 [ 303.613984][ C0] [ 303.616302][ C0] The buggy address belongs to the object at ffff888052308000 [ 303.616302][ C0] which belongs to the cache kmalloc-8k of size 8192 [ 303.630355][ C0] The buggy address is located 4416 bytes inside of [ 303.630355][ C0] 8192-byte region [ffff888052308000, ffff88805230a000) [ 303.643785][ C0] The buggy address belongs to the page: [ 303.649479][ C0] page:ffffea000148c200 refcount:1 mapcount:0 mapping:ffff8880aa4021c0 index:0x0 compound_mapcount: 0 [ 303.660402][ C0] flags: 0xfffe0000010200(slab|head) [ 303.665682][ C0] raw: 00fffe0000010200 ffffea000149c708 ffffea0001437008 ffff8880aa4021c0 [ 303.674271][ C0] raw: 0000000000000000 ffff888052308000 0000000100000001 0000000000000000 [ 303.682853][ C0] page dumped because: kasan: bad access detected [ 303.689613][ C0] [ 303.691934][ C0] Memory state around the buggy address: [ 303.697553][ C0] ffff888052309000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 303.705616][ C0] ffff888052309080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 303.713682][ C0] >ffff888052309100: 00 00 00 00 00 00 00 00 04 fc fc fc fc fc fc fc [ 303.721754][ C0] ^ [ 303.727910][ C0] ffff888052309180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 303.736073][ C0] ffff888052309200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 303.744138][ C0] ================================================================== [ 303.752185][ C0] Disabling lock debugging due to kernel taint [ 303.758405][ C0] Kernel panic - not syncing: panic_on_warn set ... [ 303.765013][ C0] CPU: 0 PID: 9642 Comm: syz-executor.0 Tainted: G B 5.5.0-rc6-next-20200116-syzkaller #0 [ 303.776194][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.786267][ C0] Call Trace: [ 303.789552][ C0] [ 303.792414][ C0] dump_stack+0x197/0x210 [ 303.796750][ C0] panic+0x2e3/0x75c [ 303.800678][ C0] ? add_taint.cold+0x16/0x16 [ 303.805366][ C0] ? retint_kernel+0x2b/0x2b [ 303.809979][ C0] ? trace_hardirqs_on+0x5e/0x240 [ 303.815192][ C0] ? bitmap_ip_gc+0x100/0x4f0 [ 303.819885][ C0] end_report+0x47/0x4f [ 303.824059][ C0] ? bitmap_ip_gc+0x100/0x4f0 [ 303.828750][ C0] __kasan_report.cold+0xe/0x32 [ 303.833613][ C0] ? bitmap_ip_gc+0x100/0x4f0 [ 303.838302][ C0] kasan_report+0x12/0x20 [ 303.842642][ C0] check_memory_region+0x134/0x1a0 [ 303.847760][ C0] __kasan_check_read+0x11/0x20 [ 303.852616][ C0] bitmap_ip_gc+0x100/0x4f0 [ 303.857124][ C0] call_timer_fn+0x1ac/0x780 [ 303.861705][ C0] ? bitmap_ip_test+0x170/0x170 [ 303.866552][ C0] ? msleep_interruptible+0x150/0x150 [ 303.871918][ C0] ? run_timer_softirq+0x6b1/0x1790 [ 303.877128][ C0] ? trace_hardirqs_on+0x67/0x240 [ 303.882207][ C0] ? bitmap_ip_test+0x170/0x170 [ 303.887043][ C0] ? bitmap_ip_test+0x170/0x170 [ 303.892320][ C0] run_timer_softirq+0x6c3/0x1790 [ 303.897341][ C0] ? add_timer+0x930/0x930 [ 303.901753][ C0] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 303.907903][ C0] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 303.913456][ C0] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 303.919439][ C0] ? trace_hardirqs_on+0x67/0x240 [ 303.924476][ C0] __do_softirq+0x262/0x98c [ 303.928973][ C0] ? sched_clock_cpu+0x1b/0x1b0 [ 303.933818][ C0] irq_exit+0x19b/0x1e0 [ 303.937960][ C0] smp_apic_timer_interrupt+0x1a3/0x610 [ 303.943526][ C0] apic_timer_interrupt+0xf/0x20 [ 303.948456][ C0] [ 303.951406][ C0] RIP: 0010:write_comp_data+0x68/0x70 [ 303.956794][ C0] Code: 00 00 4e 8d 14 dd 28 00 00 00 4d 39 d0 72 1b 49 83 c1 01 4a 89 7c 10 e0 4a 89 74 10 e8 4a 89 54 10 f0 4a 89 4c d8 20 4c 89 08 0f 1f 80 00 00 00 00 55 40 0f b6 d6 40 0f b6 f7 31 ff 48 89 e5 [ 303.976407][ C0] RSP: 0018:ffffc90002007850 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 [ 303.984847][ C0] RAX: 0000000000000000 RBX: 0000000000000012 RCX: ffffffff86e59d4d [ 303.992826][ C0] RDX: 0000000000000040 RSI: 0000000000000019 RDI: 0000000000000005 [ 304.001144][ C0] RBP: ffffc90002007870 R08: ffff88809557c280 R09: fffffbfff16a51ba [ 304.009128][ C0] R10: fffffbfff16a51b9 R11: ffffffff8b528dcf R12: ffffffff8905bc60 [ 304.017231][ C0] R13: 0000000000000038 R14: 00000000000002e8 R15: 0000000000776172 [ 304.025225][ C0] ? do_ipv6_setsockopt.isra.0+0x28d/0x4290 [ 304.031135][ C0] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 304.037055][ C0] do_ipv6_setsockopt.isra.0+0x28d/0x4290 [ 304.044594][ C0] ? ipv6_update_options+0x3b0/0x3b0 [ 304.049884][ C0] ? xt_table_unlock+0x48/0x60 [ 304.054644][ C0] ? find_held_lock+0x35/0x130 [ 304.059402][ C0] ? xt_table_unlock+0x48/0x60 [ 304.064292][ C0] ? lock_downgrade+0x920/0x920 [ 304.069323][ C0] ? kfree+0x226/0x2c0 [ 304.073376][ C0] ? kfree+0x226/0x2c0 [ 304.077458][ C0] ? lockdep_hardirqs_on+0x421/0x5e0 [ 304.083023][ C0] ? trace_hardirqs_on+0x67/0x240 [ 304.088044][ C0] ? __kasan_check_write+0x14/0x20 [ 304.093329][ C0] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 304.098891][ C0] ? __kasan_check_read+0x11/0x20 [ 304.103937][ C0] ? mark_lock+0xc2/0x1220 [ 304.108365][ C0] ? __kasan_check_read+0x11/0x20 [ 304.113410][ C0] ? __lock_acquire+0x16f2/0x4a00 [ 304.118441][ C0] ? xt_table_unlock+0x48/0x60 [ 304.123200][ C0] ? do_ip6t_get_ctl+0x18c/0x960 [ 304.128133][ C0] ? __might_fault+0x12b/0x1e0 [ 304.132923][ C0] ? ___might_sleep+0x163/0x2c0 [ 304.137776][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 304.144014][ C0] ? aa_label_sk_perm+0x91/0xf0 [ 304.148854][ C0] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 304.154626][ C0] ? aa_sk_perm+0x346/0xb00 [ 304.159134][ C0] ? aa_af_perm+0x2a0/0x2a0 [ 304.163627][ C0] ? __might_fault+0x1a1/0x1e0 [ 304.168390][ C0] ipv6_setsockopt+0xff/0x180 [ 304.173075][ C0] ? ipv6_setsockopt+0xff/0x180 [ 304.178014][ C0] tcp_setsockopt+0x8f/0xe0 [ 304.182522][ C0] sock_common_setsockopt+0x94/0xd0 [ 304.187724][ C0] __sys_setsockopt+0x261/0x4c0 [ 304.192574][ C0] ? sock_create_kern+0x50/0x50 [ 304.197421][ C0] ? __sys_getsockopt+0x1b2/0x310 [ 304.202453][ C0] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 304.207898][ C0] ? do_syscall_64+0x26/0x790 [ 304.212575][ C0] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.218640][ C0] ? do_syscall_64+0x26/0x790 [ 304.223316][ C0] __x64_sys_setsockopt+0xbe/0x150 [ 304.228441][ C0] do_syscall_64+0xfa/0x790 [ 304.233650][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.239556][ C0] RIP: 0033:0x45deca [ 304.243454][ C0] Code: 49 89 ca b8 37 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 6a 8b fb ff c3 66 0f 1f 84 00 00 00 00 00 49 89 ca b8 36 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 4a 8b fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 304.264281][ C0] RSP: 002b:00007fffd1c5cbe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000036 [ 304.272696][ C0] RAX: ffffffffffffffda RBX: 00007fffd1c5cc10 RCX: 000000000045deca [ 304.280720][ C0] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 304.288720][ C0] RBP: 000000000071bcc0 R08: 00000000000002e8 R09: 0000000000004000 [ 304.296687][ C0] R10: 000000000071afa0 R11: 0000000000000206 R12: 0000000000000003 [ 304.304701][ C0] R13: 0000000000000000 R14: 0000000000000029 R15: 000000000071af40 [ 304.314034][ C0] Kernel Offset: disabled [ 304.318473][ C0] Rebooting in 86400 seconds..