[ OK ] Started Getty on tty2. [ OK ] Started Serial Getty on ttyS0. [ OK ] Started Getty on tty1. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.10.25' (ECDSA) to the list of known hosts. 2020/07/08 15:14:41 fuzzer started 2020/07/08 15:14:41 dialing manager at 10.128.0.105:33525 2020/07/08 15:14:42 syscalls: 2997 2020/07/08 15:14:42 code coverage: enabled 2020/07/08 15:14:42 comparison tracing: enabled 2020/07/08 15:14:42 extra coverage: extra coverage is not supported by the kernel 2020/07/08 15:14:42 setuid sandbox: enabled 2020/07/08 15:14:42 namespace sandbox: enabled 2020/07/08 15:14:42 Android sandbox: enabled 2020/07/08 15:14:42 fault injection: enabled 2020/07/08 15:14:42 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/07/08 15:14:42 net packet injection: enabled 2020/07/08 15:14:42 net device setup: enabled 2020/07/08 15:14:42 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/07/08 15:14:42 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/07/08 15:14:42 USB emulation: /dev/raw-gadget does not exist 15:17:30 executing program 0: syzkaller login: [ 205.857948] audit: type=1400 audit(1594221450.119:8): avc: denied { execmem } for pid=6455 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 205.989753] IPVS: ftp: loaded support on port[0] = 21 15:17:30 executing program 1: [ 206.157610] chnl_net:caif_netlink_parms(): no params data found [ 206.228498] IPVS: ftp: loaded support on port[0] = 21 15:17:30 executing program 2: [ 206.429353] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.437005] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.454672] device bridge_slave_0 entered promiscuous mode [ 206.479994] chnl_net:caif_netlink_parms(): no params data found [ 206.497422] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.504400] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.511984] device bridge_slave_1 entered promiscuous mode 15:17:30 executing program 3: [ 206.580537] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 206.608013] IPVS: ftp: loaded support on port[0] = 21 [ 206.613904] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 206.668734] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 206.687119] team0: Port device team_slave_0 added [ 206.721035] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 206.731955] team0: Port device team_slave_1 added [ 206.747218] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.757207] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.770826] device bridge_slave_0 entered promiscuous mode [ 206.799752] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 206.806272] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 206.834913] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 15:17:31 executing program 4: [ 206.849867] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.859742] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.868434] device bridge_slave_1 entered promiscuous mode [ 206.889974] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 206.899867] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 206.964245] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 206.985548] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 207.020148] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 207.023281] IPVS: ftp: loaded support on port[0] = 21 [ 207.046200] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 207.066281] bond0: Enslaving bond_slave_1 as an active interface with an up link 15:17:31 executing program 5: [ 207.196946] device hsr_slave_0 entered promiscuous mode [ 207.233311] device hsr_slave_1 entered promiscuous mode [ 207.305296] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 207.315366] team0: Port device team_slave_0 added [ 207.323265] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 207.340560] IPVS: ftp: loaded support on port[0] = 21 [ 207.349017] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 207.357522] IPVS: ftp: loaded support on port[0] = 21 [ 207.364555] team0: Port device team_slave_1 added [ 207.371987] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 207.405138] chnl_net:caif_netlink_parms(): no params data found [ 207.485552] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 207.491788] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 207.520556] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 207.578899] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 207.585411] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 207.612369] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 207.660486] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 207.671336] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 207.682308] chnl_net:caif_netlink_parms(): no params data found [ 207.806113] device hsr_slave_0 entered promiscuous mode [ 207.825000] device hsr_slave_1 entered promiscuous mode [ 207.867645] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 207.921060] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 207.975174] chnl_net:caif_netlink_parms(): no params data found [ 207.987188] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.995095] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.002184] device bridge_slave_0 entered promiscuous mode [ 208.011316] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.018197] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.025756] device bridge_slave_1 entered promiscuous mode [ 208.050509] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 208.155900] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 208.165836] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 208.181185] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.189883] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.198353] device bridge_slave_0 entered promiscuous mode [ 208.210650] chnl_net:caif_netlink_parms(): no params data found [ 208.227948] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.235778] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.243332] device bridge_slave_1 entered promiscuous mode [ 208.282250] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 208.290526] team0: Port device team_slave_0 added [ 208.309445] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 208.323609] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 208.351530] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 208.358815] team0: Port device team_slave_1 added [ 208.385650] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.392049] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.400237] device bridge_slave_0 entered promiscuous mode [ 208.407530] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.416317] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.423890] device bridge_slave_1 entered promiscuous mode [ 208.461441] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 208.470351] team0: Port device team_slave_0 added [ 208.489404] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 208.497856] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 208.523932] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 208.544911] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 208.560155] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 208.567601] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 208.575046] team0: Port device team_slave_1 added [ 208.587399] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 208.593966] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 208.619270] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 208.631288] 8021q: adding VLAN 0 to HW filter on device bond0 [ 208.646548] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 208.675432] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 208.682969] team0: Port device team_slave_0 added [ 208.688483] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 208.702219] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.709051] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.717284] device bridge_slave_0 entered promiscuous mode [ 208.724717] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.731057] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.738687] device bridge_slave_1 entered promiscuous mode [ 208.746295] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 208.752876] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 208.778253] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 208.788849] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 208.797283] team0: Port device team_slave_1 added [ 208.802465] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 208.810427] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 208.830616] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 208.837021] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 208.862894] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 208.878357] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 208.935303] device hsr_slave_0 entered promiscuous mode [ 208.972953] device hsr_slave_1 entered promiscuous mode [ 209.014021] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 209.021860] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 209.034778] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 209.042422] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 209.050828] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 209.076320] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 209.087932] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 209.094362] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 209.119737] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 209.130869] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 209.140066] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 209.155653] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 209.174777] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 209.186966] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 209.217770] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 209.224445] 8021q: adding VLAN 0 to HW filter on device team0 [ 209.234282] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 209.241603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 209.249437] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 209.257716] team0: Port device team_slave_0 added [ 209.304836] device hsr_slave_0 entered promiscuous mode [ 209.362908] device hsr_slave_1 entered promiscuous mode [ 209.409439] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 209.466832] device hsr_slave_0 entered promiscuous mode [ 209.502951] device hsr_slave_1 entered promiscuous mode [ 209.536096] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 209.543575] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 209.550892] team0: Port device team_slave_1 added [ 209.557614] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 209.568779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 209.577621] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 209.585805] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.592236] bridge0: port 1(bridge_slave_0) entered forwarding state [ 209.599574] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 209.607532] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 209.615795] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 209.631406] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 209.662135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 209.675298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 209.683363] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.689698] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.700374] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 209.719476] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 209.726011] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 209.751816] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 209.770121] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 209.777154] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 209.802440] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 209.813682] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 209.821849] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 209.829690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 209.838975] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 209.870482] 8021q: adding VLAN 0 to HW filter on device bond0 [ 209.877044] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 209.887515] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 209.928257] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 209.935505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 209.944236] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 209.951782] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 209.961266] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 210.026231] device hsr_slave_0 entered promiscuous mode [ 210.073265] device hsr_slave_1 entered promiscuous mode [ 210.136059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 210.147034] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 210.155913] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 210.183723] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 210.198767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 210.207013] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 210.229702] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 210.236326] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 210.255199] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 210.285949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 210.296575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 210.304160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 210.311563] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 210.322215] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 210.328614] 8021q: adding VLAN 0 to HW filter on device team0 [ 210.344848] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 210.350844] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 210.366701] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 210.396782] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 210.405564] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 210.417093] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.423482] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.430806] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 210.466404] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 210.478496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 210.486545] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 210.497640] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.504022] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.518628] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 210.527260] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 210.543616] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 210.552165] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 210.567410] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 210.585493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 210.593629] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 210.600260] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 210.609913] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 210.624461] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 210.631727] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 210.644762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 210.653639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 210.661262] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 210.670140] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 210.680950] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 210.691694] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 210.709548] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 210.716631] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 210.726998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 210.747866] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 210.758244] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 210.776117] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 210.783994] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 210.791328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 210.799811] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 210.810824] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 210.817057] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 210.828891] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 210.860557] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 210.878922] 8021q: adding VLAN 0 to HW filter on device bond0 [ 210.891457] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 210.899865] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 210.910029] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 210.928018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 210.936492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 210.945028] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 210.951708] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 210.971339] 8021q: adding VLAN 0 to HW filter on device bond0 [ 210.989103] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 210.998954] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 211.014410] 8021q: adding VLAN 0 to HW filter on device bond0 [ 211.023988] 8021q: adding VLAN 0 to HW filter on device bond0 [ 211.030911] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 211.043647] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 211.050860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 211.060427] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 211.070561] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 211.079656] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 211.090013] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 211.098791] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 211.105425] 8021q: adding VLAN 0 to HW filter on device team0 [ 211.114514] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 211.121552] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 211.130159] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 211.137077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 211.146193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 211.155319] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 211.162590] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 211.169491] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 211.182879] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 211.189813] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 211.201579] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 211.210379] 8021q: adding VLAN 0 to HW filter on device team0 [ 211.218590] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 211.225604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 211.235887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 211.243074] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 211.250755] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 211.258875] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.265274] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.272213] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 211.280330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 211.287576] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 211.298133] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 211.304807] 8021q: adding VLAN 0 to HW filter on device team0 [ 211.311860] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 211.325503] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 211.335501] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 211.341572] 8021q: adding VLAN 0 to HW filter on device team0 [ 211.355736] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 211.362979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 211.370383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 211.378341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 211.386269] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 211.394192] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.400565] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.407664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 211.415797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 211.423696] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.430028] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.439374] device veth0_vlan entered promiscuous mode [ 211.447517] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 211.456596] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 211.464163] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 211.471168] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 211.479407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 211.486889] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 211.494399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 211.502076] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 211.509858] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.516262] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.523773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 211.531463] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 211.539221] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.545606] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.552965] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 211.567831] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 211.575146] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 211.581644] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 211.589703] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 211.601159] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 211.610516] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 211.622243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 211.633215] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 211.640739] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.647118] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.655186] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 211.663585] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 211.671102] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.677478] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.684529] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 211.692222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 211.699941] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.706324] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.718476] device veth1_vlan entered promiscuous mode [ 211.724901] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 211.732651] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 211.740474] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 211.750249] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 211.760149] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 211.769387] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 211.780899] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 211.788604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 211.796599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 211.804751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 211.812355] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 211.819867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 211.827323] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 211.837959] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 211.855253] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 211.863493] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 211.871036] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 211.880573] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 211.888068] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 211.895961] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 211.903510] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 211.911320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 211.920599] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 211.928251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 211.936554] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 211.945245] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 211.953973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 211.965064] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 211.974527] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 211.982996] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 211.996889] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 212.004594] device veth0_vlan entered promiscuous mode [ 212.012294] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 212.021257] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 212.029150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 212.037884] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 212.045642] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 212.053660] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 212.061263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 212.069163] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 212.077197] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 212.085170] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 212.095941] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 212.105707] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 212.115345] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 212.125901] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 212.136354] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 212.143670] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 212.150647] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 212.158558] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 212.166695] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 212.174618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 212.182044] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 212.189965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 212.197828] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 212.205759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 212.213747] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 212.221272] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 212.231492] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 212.241360] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 212.250187] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 212.263307] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 212.270059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 212.278206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 212.286137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 212.294040] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 212.301397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 212.309186] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 212.317174] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 212.324863] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 212.334587] device veth0_macvtap entered promiscuous mode [ 212.340822] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 212.348949] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 212.358137] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 212.368818] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 212.377458] device veth1_vlan entered promiscuous mode [ 212.388226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 212.398093] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 212.405743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 212.413426] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 212.424560] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 212.436911] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 212.443321] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 212.450716] device veth1_macvtap entered promiscuous mode [ 212.464038] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 212.471270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 212.480598] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 212.489143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 212.497206] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 212.507315] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 212.513465] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 212.527555] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 212.536439] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 212.545745] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 212.560496] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 212.571751] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 212.581177] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 212.588582] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 212.598833] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 212.613292] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 212.619962] device veth0_macvtap entered promiscuous mode [ 212.627091] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 212.634482] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 212.641506] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 212.650683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 212.658763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 212.666921] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 212.674322] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 212.680968] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 212.687936] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 212.695007] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 212.701631] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 212.710478] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 212.725364] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 212.738769] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 212.746010] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 212.759004] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 212.767119] device veth1_macvtap entered promiscuous mode [ 212.773917] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 212.786602] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 212.797293] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 212.805498] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 212.820127] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 212.833670] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 212.841355] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 212.849120] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 212.857024] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 212.865251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 212.873515] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 212.880205] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 212.891429] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 212.899482] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 212.913370] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 212.930082] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 212.939176] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 212.950178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 212.959872] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 212.968134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 212.977388] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 212.992186] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 213.036956] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 213.049265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 213.058842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 213.069470] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 213.078460] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 213.089820] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.105762] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 213.113090] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 213.123182] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 213.131862] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 213.143083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 213.164226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 213.173735] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 213.194092] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 213.205035] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.221372] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 213.228959] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 213.240164] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 213.248993] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 213.256986] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 213.264751] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 213.273985] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 213.303519] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 213.311881] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 213.324001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 213.331450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 213.343862] device veth0_vlan entered promiscuous mode [ 213.350937] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 213.365491] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 213.377725] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 213.387423] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 213.396723] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 213.405787] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 213.418158] device veth1_vlan entered promiscuous mode [ 213.427107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 213.437267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 213.449422] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 213.457009] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 213.464282] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 213.472932] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 213.481686] device veth0_vlan entered promiscuous mode [ 213.493092] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 213.500471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 213.534189] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 213.541533] device veth1_vlan entered promiscuous mode [ 213.553787] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 213.560273] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 213.567805] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 213.575666] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 213.587566] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 213.598193] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 213.614905] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 213.628986] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 213.639287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 213.647458] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 213.655603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 213.663725] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 213.671301] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 213.678653] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 213.691458] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 213.700139] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 213.707925] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 213.716767] device veth0_macvtap entered promiscuous mode [ 213.725270] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 213.737560] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 213.751628] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 213.763461] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 213.772192] device veth0_vlan entered promiscuous mode [ 213.788007] device veth1_macvtap entered promiscuous mode [ 213.795024] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 213.801349] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 213.813404] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 213.820397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 213.828524] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 213.836441] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 213.843861] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 213.851239] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 213.858279] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 213.867957] device veth0_vlan entered promiscuous mode [ 213.879649] device veth1_vlan entered promiscuous mode [ 213.890585] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 213.911215] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready 15:17:38 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)={0x1c, 0x1, 0x4, 0x101, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5}]}, 0x1c}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) [ 213.940723] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 213.970351] device veth0_macvtap entered promiscuous mode [ 213.980444] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 213.991212] device veth1_vlan entered promiscuous mode [ 214.006611] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 214.015448] hrtimer: interrupt took 43677 ns 15:17:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c03e0f013235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x53}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(0xffffffffffffffff, 0xae45, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x0, 0x59c0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 214.039322] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 214.049612] device veth1_macvtap entered promiscuous mode [ 214.067605] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 214.094307] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 214.108695] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 214.121791] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 214.142928] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 214.151477] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 214.165266] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 214.180801] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 214.206818] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 214.217055] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 214.227453] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 214.237521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 214.248782] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready 15:17:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000012000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, &(0x7f00000000c0)="ffb10c10ba4300b0c866b94d0900000f320f0133f30f01e80f69e8650f01c883dd000f0131ba400c3ef20f2c2b66efbafc0ced", 0x33}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000140)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x200000000000204, 0x0, 0x4ca], 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 214.276858] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 214.297048] device veth0_macvtap entered promiscuous mode [ 214.317807] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready 15:17:38 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000300)=ANY=[@ANYRES32], 0x116) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, 0x0, 0x116) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 214.384418] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 214.403154] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 214.428723] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 214.456289] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 214.466646] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 214.485982] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 214.493507] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 214.500276] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 214.518685] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 214.528878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 214.544399] device veth1_macvtap entered promiscuous mode [ 214.556234] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 214.578727] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 214.589850] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 214.601054] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 214.610889] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 214.620111] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 214.630002] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 214.643003] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 214.649992] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 214.659836] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 214.668567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 214.682384] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 214.700166] device veth0_macvtap entered promiscuous mode 15:17:38 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000001380)=ANY=[]) [ 214.707609] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 214.723230] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 214.730428] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 214.738721] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 214.747789] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 214.760575] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 214.774549] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 214.796445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 15:17:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x10020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x2, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="182b00003603009203001100000000008500000000e79900950000009d08000000000000000000001000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x10, 0x0, 0x180}, 0x70) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000b00)={0x18, 0x0, 0x1}, 0x18) r0 = open(&(0x7f0000000180)='./bus\x00', 0x1fb842, 0x0) open(0x0, 0x200040, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') dup(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@dev, @in=@loopback}}, {{@in=@empty}, 0x0, @in6=@private1}}, &(0x7f0000000140)=0xe8) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4000000000010046) [ 214.807482] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 214.819544] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 214.831929] device veth1_macvtap entered promiscuous mode [ 214.840181] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready 15:17:39 executing program 0: open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000200)={0x9, 0x20000000001, '['}, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000240), 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') getdents64(r0, &(0x7f0000000100)=""/236, 0x20000103) 15:17:39 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x18d042, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 214.848035] audit: type=1400 audit(1594221459.109:9): avc: denied { sys_admin } for pid=7746 comm="syz-executor.1" capability=21 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 214.854777] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 214.898749] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 214.909117] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 214.961861] audit: type=1804 audit(1594221459.219:10): pid=7752 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/" dev="sda1" ino=91 res=1 [ 214.981101] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 214.994848] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 215.008020] audit: type=1800 audit(1594221459.269:11): pid=7759 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15747 res=0 [ 215.015624] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 215.041201] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 215.059365] audit: type=1804 audit(1594221459.269:12): pid=7758 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/" dev="sda1" ino=91 res=1 [ 215.061389] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 215.086600] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 215.098321] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 215.107038] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 215.121405] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 215.129599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 215.138447] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 215.146789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 215.158336] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 215.179243] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 215.192839] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 215.201946] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 215.212880] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 215.222066] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 215.231761] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 215.240915] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 215.250710] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 215.261086] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 215.268493] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 215.281110] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 215.293946] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 215.301845] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 215.317084] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 215.328605] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 215.338674] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 215.349062] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 215.359412] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 215.369172] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 215.378312] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 215.388108] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 215.398435] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 215.405640] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 215.413874] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 215.424127] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 215.433416] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 215.443446] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 215.452609] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 215.462371] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 215.471458] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 215.481523] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 215.490691] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 215.500517] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 215.510781] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 215.518660] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 215.527109] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 215.535418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 215.543931] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 215.551709] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 215.572912] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 215.583270] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 215.595456] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 215.606396] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 215.615815] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 215.625575] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 215.634812] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 215.644568] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 215.653844] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 215.663630] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 215.674540] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 215.681401] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 215.689759] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 215.702947] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 215.819253] audit: type=1800 audit(1594221460.079:13): pid=7803 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15747 res=0 15:17:40 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x142}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:17:40 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$key(0xf, 0x3, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@remote, 0x0, 0x33}, 0x0, @in6=@empty, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) r2 = creat(&(0x7f0000000000)='\x00', 0x0) r3 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000680)=ANY=[@ANYBLOB="700c0000c66dbb83228ec39886cb60af12454278fba329f0968cf4115929d96fc530a093d6bc10e61df29f3c22c39d8c75c184da6566e02c6eb3a32143b952ea01a838f9f89ab53463424accbc32699521ed428f453141", @ANYRES16=r3, @ANYBLOB="00082dbd7000fbdbdf250400000008000400ac1414aa050001000000000008000400ffffffff14000200fc00000000000000000000000000000114000200fe80000000000000000000a30500003414000600776732000000000000000000"], 0x70}, 0x1, 0x0, 0x0, 0x10}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 15:17:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000380)="0f01d1660f685f40c4e20d2e4e0f0f30b8030000000f23d80f21f835800000200f23f8360fc779d6b9950900000f326767640f01cbc4e17f129b2da194bbc4c2818e3a", 0x43}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 15:17:40 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="0000000000000000000060bc7d9400743c10fe800000000000000000000000000000ff0200000000000000000000000000010004000000000000c9"], 0xa6) 15:17:40 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x88880, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @dev}, 0x1c) sendto$inet6(r0, &(0x7f00000009c0)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e", 0xffd6, 0xc001, 0x0, 0xffffffffffffff0c) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040)=0x3, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x4}}, 0x14) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000000), 0x4) 15:17:40 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000005c000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd65660f382201c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d6830f01caed", 0x14}], 0x1, 0x0, 0x0, 0x25a) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0xb20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000009000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 216.197428] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 216.317396] kvm [7855]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0xc1 data 0xfe [ 216.353028] kvm [7855]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0xc1 data 0x99 [ 216.389510] kvm [7855]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0xc1 data 0x32 [ 216.427614] kvm [7855]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0xc1 data 0x33 [ 216.455958] kvm [7855]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0xc1 data 0x2c [ 216.485026] kvm [7855]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0xc1 data 0x27 [ 216.518439] kvm [7855]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0xc1 data 0x26 [ 216.547039] kvm [7855]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0xc1 data 0x21 [ 216.577812] kvm [7855]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0xc1 data 0x20 [ 216.606406] kvm [7855]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0xc1 data 0x21 15:17:41 executing program 4: mknod(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:17:41 executing program 3: mknod(&(0x7f0000000200)='./file0\x00', 0x800, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000000), 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, 0x0) add_key$fscrypt_provisioning(0x0, &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)={0x0, 0x0, "80336702636ef1b2ad1f9629275771a240698175067ad570a9456d46a50eb10162ebd49d038e29c747a6d59699c5389a886baf4a6558d084f0d4075b11a8f9594983b19093db"}, 0x4e, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x80000001) 15:17:41 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000005c000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd65660f382201c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d6830f01caed", 0x14}], 0x1, 0x0, 0x0, 0x25a) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0xb20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000009000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:17:41 executing program 3: mknod(&(0x7f0000000200)='./file0\x00', 0x800, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000000), 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, 0x0) add_key$fscrypt_provisioning(0x0, &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)={0x0, 0x0, "80336702636ef1b2ad1f9629275771a240698175067ad570a9456d46a50eb10162ebd49d038e29c747a6d59699c5389a886baf4a6558d084f0d4075b11a8f9594983b19093db"}, 0x4e, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x80000001) 15:17:41 executing program 3: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3w\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) capget(&(0x7f0000000000), 0x0) 15:17:41 executing program 3: syz_emit_ethernet(0x4a, &(0x7f00000000c0)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\a~\x00', 0x14, 0x2c, 0x0, @remote, @local, {[], {{0x2c00, 0x0, 0x41424344, 0x41424344, 0x0, 0x5, 0x5}}}}}}}, 0x0) 15:17:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f00000029c0)=[{&(0x7f0000000480)=""/54, 0x36}], 0x1, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='io\x00') preadv(r2, &(0x7f00000017c0), 0x2bb, 0x0) 15:17:43 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:17:43 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x140042, 0x0) fallocate(r0, 0x0, 0x0, 0x4000004) lseek(r0, 0x0, 0x4) 15:17:43 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)={0x24, 0x1, 0x4, 0x101, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_NLBUFSIZ={0x8}]}, 0x24}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, 0x0, 0x0) 15:17:43 executing program 1: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x12, 0x0, &(0x7f0000000380)="263abd040e98ff4dc870bd6688a8640888a8", 0x0, 0x200}, 0x28) close(0xffffffffffffffff) 15:17:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$netlink(0x10, 0x3, 0x0) splice(r2, 0x0, r4, 0x0, 0xffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2f0000001c000507000000000d2300000200041f01000000fc0003c9130001", 0x1f}], 0x1}, 0x0) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0xfffffd88) 15:17:43 executing program 0: mknod(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f00000012c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000)='fscrypt-provisioning\x00', 0x0, &(0x7f0000000080)={0x7, 0x0, "80336702636ef1b2ad1f9629275771a240698175067ad570a9456d46a50eb10162ebd49d038e29c747a6d59699c5389a886baf4a6558d084f0d4075b11a8f9594983b19093db0a837456a393651eff3830ef31fa67eefd5001a4855949"}, 0x65, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x80000001) [ 219.289831] audit: type=1800 audit(1594221463.550:14): pid=7946 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=15789 res=0 15:17:43 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x7f, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x2812, r0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000001300)=ANY=[], 0xfd30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:17:43 executing program 1: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="85000000130000005d0000000000000095000000000000000a621cf434b9dbafdc0a00e9bfde03afe9c81a9cf05725caf1cae63587ff7f0000cde5c019080096e2c43f6b8fd41b7e7666ada01543b7185a4650732b48588a84f8347a1b5efd079137038277beb5e0615c40dbb7005fbd189981feb0a514c168646ea716bb5b94bd00009b4f22389c753acb8026fd808f25bfc91c15d7dc2adcdefba0868942577d8953191eeb79379829652b10737d4e25a22695df1cff25340af4fc990000099fff70b24f8228bd07741c710ebde4bf17dc8f3259ec78e5b39515991b1428fa5301000004398f6500000000a3124871b76f1b2c8fea54fb3726850310bd480355921c9c0c120d049000b3190974f06e53eb9e0000cc4bd12f5d44b172a4a2f72bb3fd2656551881b945861d8f3eb0a543de4c71e4f306767a7b542258becc9fa5987a7000009fdf95541c4148a3c0322a5d2c539b749491ce88e47b1478845f676eb8a8f4d844ff1e3c219666703f302c70d773a59b60cb9b0000000000a39bbd19344c7c498ce255f79fc8e77e3ba393f8401af9077cca6d65a63d47b53ad6f1be3a10c540cda8df0b4e07b1d53f32ff3e2ce03dd70707d2dd1db91f842e36a8a3f7f89258943e32023d6670910d1fdc9db9d03f849ceeafe8bf00677ad1dea3e2fec13ce0b92489cba78d5517600a9518b811a8bf9de074bf1bd738045b1620e83b908d1ece9177c4b9b6f1224a598004d1d9f09c317f7a0bed457e82b97d41ccae8c8c0ded87dfe708d56233a95f78e3aafa6551eb8eaf62ae8917a56fb6a82cadc189f5e98a5a30df3ec44e772a7b356c4ce3628ec559afc7b4a955fdc1503f890600f0ec0bd45b70933c32b6909644ad5b5f4c20206cc2c7b2f5e64270d30aaf2fe5dabdd463b705d87fe885a47d2e0696268ef0a939bcd4b4b48e80fbfea60ab1bc0d6c8833c5bbbcc1eb127fdd65836125238d39010c36b03ad6a77f30323d36178540434faf1e9044b7450eddd1db47c21b943438048383f929b8e453276e87df246552617b17ece3f480d371932b3749dfc12b60aee17d6b4342df2d9f8e625602ad8335ebcac3f93ee8abb8b056ff222d3cfa895f25b2697ff69b281e25ee3fc2c8261eee8dd500d5c22cbf56bb3c31806b0d35eb047377c930ebfccaec5bc15dc9dda80a525c8d7fe6845c796dc9951e5a6c3bb4d6e7d3c878db6e98042803e20d2c88d286b57a65a3a5a391"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x12, 0x0, &(0x7f0000000380)="263abd040e98ff4dc870bd6688a8640888a8", 0x0, 0x200}, 0x28) close(0xffffffffffffffff) 15:17:43 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000240)=""/170) 15:17:44 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) 15:17:44 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={@loopback, @mcast1, @private1, 0x0, 0x0, 0x401}) 15:17:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0xfffffff9, 0x0, 0x0, 0x0, "8000"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x17, 0x0, 0x0, 0x0, 0x0, "0000000000000000000000000000fffffdfd00"}) 15:17:44 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r0, 0x5501) close(r0) 15:17:44 executing program 3: pipe(&(0x7f0000000380)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="48000000080605f5ff00000000000000010000060900654a020073797a30000000000900020073797a31ab4fa389398b7cf89400000000050001000700000005000100070000000900020073797a320000"], 0x48}, 0x1, 0x0, 0x0, 0x8010}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x4000000000, 0x3, &(0x7f0000000500)=[{&(0x7f0000000100)="800000003804000019000300e60100006c00fec9000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000380)="fcba5820c3ef1b77e8a23dd18b16961616356dd7fdeb89769b12def3b6cfd1ab4505524f78c1aa2bf4de120e650f04d278edd8006ad9f89c8b7d8ed96e63d878ff15074525d84e21090fcf500adea45e5683baf409b890f14dec72b7819a765b1f523b740006fa097ad63376050c8f865b5ffbd88b998d1665f951439c15e32429223f310ee8e4d1652b156fd2a1b1c7deec970e41e7a4", 0x97, 0x6}, {0x0, 0x0, 0xffffffff}], 0x0, 0x0) r2 = socket(0x1a, 0x0, 0x1) sendmsg$NLBL_MGMT_C_PROTOCOLS(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="14000000179c306a8e4c9c70300e3ce1311452", @ANYRES16, @ANYBLOB="020000000000fbdbdf2507000000"], 0x14}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) read$char_usb(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000240)=""/142, 0x8e}, {&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f0000000480)=""/217, 0xd9}, {&(0x7f0000000580)=""/134, 0x86}, {&(0x7f0000000640)=""/191, 0xbf}], 0x5}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x10003, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x2, 0x80, 0x7f, 0x80, 0x0, 0x2, 0x4a20, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x45f0, 0x4, @perf_config_ext={0x80000000, 0x7}, 0x600, 0x7, 0x0, 0x7, 0x80, 0x7, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x5) umount2(&(0x7f0000000040)='./file0\x00', 0x0) [ 220.334481] audit: type=1804 audit(1594221464.600:15): pid=7993 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir896434876/syzkaller.yeL8jp/3/bus" dev="sda1" ino=15784 res=1 15:17:44 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)={0x24, 0x1, 0x4, 0x101, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_NLBUFSIZ={0x8}]}, 0x24}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, 0x0, 0x0) 15:17:44 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x7f, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x2812, r0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[], 0xfd30) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) [ 220.424585] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:17:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0xfffffff9, 0x0, 0x0, 0x0, "8000"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x17, 0x0, 0x0, 0x0, 0x0, "0000000000000000000000000000fffffdfd00"}) [ 220.466834] EXT4-fs (loop3): group descriptors corrupted! 15:17:44 executing program 2: mknod(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, &(0x7f0000000280)={[{@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x4}}], [{@hash='hash'}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@seclabel='seclabel'}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) mount(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) add_key$keyring(0x0, &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000000)='fscrypt-provisioning\x00', 0x0, &(0x7f0000000080), 0x8, 0x0) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x80000001) 15:17:44 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@remote, 0x0, 0x33}, 0x0, @in6=@empty, 0x0, 0x4, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 220.567657] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 220.608858] EXT4-fs (loop3): group descriptors corrupted! 15:17:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0xfffffff9, 0x0, 0x0, 0x0, "8000"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x17, 0x0, 0x0, 0x0, 0x0, "0000000000000000000000000000fffffdfd00"}) 15:17:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffb, 0x1, &(0x7f0000000400)=[{&(0x7f00000002c0)="eb3c906d6b66732e666174000210010002000270fff8dd", 0x17}], 0x810009, 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x3000031, 0x0) 15:17:45 executing program 3: pipe(&(0x7f0000000380)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="48000000080605f5ff00000000000000010000060900654a020073797a30000000000900020073797a31ab4fa389398b7cf89400000000050001000700000005000100070000000900020073797a320000"], 0x48}, 0x1, 0x0, 0x0, 0x8010}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x4000000000, 0x3, &(0x7f0000000500)=[{&(0x7f0000000100)="800000003804000019000300e60100006c00fec9000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000380)="fcba5820c3ef1b77e8a23dd18b16961616356dd7fdeb89769b12def3b6cfd1ab4505524f78c1aa2bf4de120e650f04d278edd8006ad9f89c8b7d8ed96e63d878ff15074525d84e21090fcf500adea45e5683baf409b890f14dec72b7819a765b1f523b740006fa097ad63376050c8f865b5ffbd88b998d1665f951439c15e32429223f310ee8e4d1652b156fd2a1b1c7deec970e41e7a4", 0x97, 0x6}, {0x0, 0x0, 0xffffffff}], 0x0, 0x0) r2 = socket(0x1a, 0x0, 0x1) sendmsg$NLBL_MGMT_C_PROTOCOLS(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="14000000179c306a8e4c9c70300e3ce1311452", @ANYRES16, @ANYBLOB="020000000000fbdbdf2507000000"], 0x14}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) read$char_usb(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000240)=""/142, 0x8e}, {&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f0000000480)=""/217, 0xd9}, {&(0x7f0000000580)=""/134, 0x86}, {&(0x7f0000000640)=""/191, 0xbf}], 0x5}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x10003, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x2, 0x80, 0x7f, 0x80, 0x0, 0x2, 0x4a20, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x45f0, 0x4, @perf_config_ext={0x80000000, 0x7}, 0x600, 0x7, 0x0, 0x7, 0x80, 0x7, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x5) umount2(&(0x7f0000000040)='./file0\x00', 0x0) [ 220.687921] audit: type=1804 audit(1594221464.950:16): pid=8012 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir128148167/syzkaller.Xd7ay2/10/bus" dev="sda1" ino=15771 res=1 [ 220.837591] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 220.852587] audit: type=1804 audit(1594221465.000:17): pid=8029 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir128148167/syzkaller.Xd7ay2/10/bus" dev="sda1" ino=15771 res=1 15:17:45 executing program 2: mknod(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, &(0x7f0000000280)={[{@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x4}}], [{@hash='hash'}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@seclabel='seclabel'}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) mount(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) add_key$keyring(0x0, &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000000)='fscrypt-provisioning\x00', 0x0, &(0x7f0000000080), 0x8, 0x0) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x80000001) 15:17:45 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x7f, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x2812, r0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[], 0xfd30) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 15:17:45 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0xfffffff9, 0x0, 0x0, 0x0, "8000"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x17, 0x0, 0x0, 0x0, 0x0, "0000000000000000000000000000fffffdfd00"}) [ 220.910820] EXT4-fs (loop3): group descriptors corrupted! 15:17:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffb, 0x1, &(0x7f0000000400)=[{&(0x7f00000002c0)="eb3c906d6b66732e666174000210010002000270fff8dd", 0x17}], 0x810009, 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x3000031, 0x0) 15:17:45 executing program 3: socket$packet(0x11, 0xa, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000100)={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, {0xa, 0x0, 0xffff8000, @ipv4={[], [], @broadcast}}, 0x0, [0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x5c) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000001340)=""/4067, 0xfe3}], 0x1, 0x0, 0x0, 0x1f4}}], 0x1, 0x100, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) 15:17:45 executing program 2: mknod(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, &(0x7f0000000280)={[{@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x4}}], [{@hash='hash'}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@seclabel='seclabel'}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) mount(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) add_key$keyring(0x0, &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000000)='fscrypt-provisioning\x00', 0x0, &(0x7f0000000080), 0x8, 0x0) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x80000001) 15:17:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x20000000102, 0x0) semop(r0, &(0x7f0000000000)=[{0x2, 0xfffa}, {}], 0x2) semop(r0, &(0x7f0000000080)=[{0x2, 0xd}], 0x1) timer_create(0x0, 0x0, 0x0) 15:17:45 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0xfffffff9, 0x0, 0x0, 0x0, "8000"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) dup3(r3, r2, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x17, 0x0, 0x0, 0x0, 0x0, "0000000000000000000000000000fffffdfd00"}) 15:17:46 executing program 5: socket$packet(0x11, 0xa, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000100)={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, {0xa, 0x0, 0xffff8000, @ipv4={[], [], @broadcast}}, 0x0, [0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x5c) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000001340)=""/4067, 0xfe3}], 0x1, 0x0, 0x0, 0x1f4}}], 0x1, 0x100, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) 15:17:46 executing program 2: mknod(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, &(0x7f0000000280)={[{@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x4}}], [{@hash='hash'}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@seclabel='seclabel'}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) mount(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) add_key$keyring(0x0, &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000000)='fscrypt-provisioning\x00', 0x0, &(0x7f0000000080), 0x8, 0x0) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x80000001) 15:17:46 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="800000000001010400000000ffffffffffffffe1240001801400018008000100e000000108000200ac1414000c000280050001000000000004000d7c3c0002802c00018014000300fc02000000000000000000000000000014000400ff0100000000000000000000000000010c0002800500010000000000080007"], 0x80}}, 0x0) 15:17:46 executing program 4: syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffb, 0x1, &(0x7f0000000400)=[{&(0x7f00000002c0)="eb3c906d6b66732e666174000210010002000270fff8dd", 0x17}], 0x810009, 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x3000031, 0x0) 15:17:46 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0xfffffff9, 0x0, 0x0, 0x0, "8000"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) dup3(r3, r2, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x17, 0x0, 0x0, 0x0, 0x0, "0000000000000000000000000000fffffdfd00"}) 15:17:46 executing program 3: socket$packet(0x11, 0xa, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000100)={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, {0xa, 0x0, 0xffff8000, @ipv4={[], [], @broadcast}}, 0x0, [0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x5c) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000001340)=""/4067, 0xfe3}], 0x1, 0x0, 0x0, 0x1f4}}], 0x1, 0x100, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) 15:17:46 executing program 2: socket$packet(0x11, 0xa, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000100)={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, {0xa, 0x0, 0xffff8000, @ipv4={[], [], @broadcast}}, 0x0, [0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x5c) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000001340)=""/4067, 0xfe3}], 0x1, 0x0, 0x0, 0x1f4}}], 0x1, 0x100, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) 15:17:46 executing program 1: mkdir(0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f00000038c0), 0x4000000000000a8, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="810000000000000008000a00", @ANYRES32=0x0, @ANYBLOB="08001b"], 0x30}}, 0x0) 15:17:46 executing program 4: syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffb, 0x1, &(0x7f0000000400)=[{&(0x7f00000002c0)="eb3c906d6b66732e666174000210010002000270fff8dd", 0x17}], 0x810009, 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x3000031, 0x0) 15:17:46 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0xfffffff9, 0x0, 0x0, 0x0, "8000"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) dup3(r3, r2, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x17, 0x0, 0x0, 0x0, 0x0, "0000000000000000000000000000fffffdfd00"}) [ 222.777983] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 222.931133] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 15:17:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="800000000001010400000000ffffffffffffffe1240001801400018008000100e000000108000200ac1414000c000280050001000000000004000d803c0002802c00018014000300fc02000000000000000000000000000014000400ff0100000000000000000000000000010c0002800500010000000000080007"], 0x80}}, 0x4c0d0) 15:17:47 executing program 4: mount(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x3000031, 0x0) [ 223.072680] ================================================================== [ 223.080198] BUG: KASAN: global-out-of-bounds in nfnetlink_parse_nat_setup+0x5ed/0x640 [ 223.088152] Read of size 8 at addr ffffffff88301498 by task syz-executor.1/8131 [ 223.095576] [ 223.097199] CPU: 1 PID: 8131 Comm: syz-executor.1 Not tainted 4.19.131-syzkaller #0 [ 223.104974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 223.114306] Call Trace: [ 223.116884] dump_stack+0x1fc/0x2fe [ 223.120501] print_address_description.cold+0x5/0x219 [ 223.125678] kasan_report_error.cold+0x8a/0x1c7 [ 223.130333] ? nfnetlink_parse_nat_setup+0x5ed/0x640 [ 223.135419] __asan_report_load8_noabort+0x88/0x90 [ 223.140344] ? nfnetlink_parse_nat_setup+0x5ed/0x640 [ 223.145434] nfnetlink_parse_nat_setup+0x5ed/0x640 [ 223.150349] ? nf_nat_inet_fn+0xb00/0xb00 [ 223.154481] ? lock_downgrade+0x720/0x720 [ 223.158613] ? check_preemption_disabled+0x41/0x280 [ 223.163613] ? should_fail+0x142/0x7b0 [ 223.167507] ctnetlink_parse_nat_setup+0xb6/0x640 [ 223.172334] ctnetlink_create_conntrack+0x4bb/0x12c0 [ 223.177422] ? ctnetlink_change_synproxy.isra.0+0x380/0x380 [ 223.183117] ? hash_conntrack_raw+0x2d6/0x460 [ 223.187594] ? nf_ct_get_tuplepr+0x310/0x310 [ 223.191983] ? nf_ct_gc_expired+0x300/0x300 [ 223.196288] ? nfnetlink_rcv_msg+0x98d/0xf60 [ 223.200685] ctnetlink_new_conntrack+0x4f3/0xde0 [ 223.205430] ? ctnetlink_create_conntrack+0x12c0/0x12c0 [ 223.210776] ? nfnetlink_rcv_msg+0x98d/0xf60 [ 223.215168] ? netlink_deliver_tap+0x8fb/0xb00 [ 223.219734] ? nfnetlink_rcv_msg+0x95a/0xf60 [ 223.224132] ? ctnetlink_create_conntrack+0x12c0/0x12c0 [ 223.229479] nfnetlink_rcv_msg+0xc4f/0xf60 [ 223.233707] ? nfnetlink_net_exit_batch+0x150/0x150 [ 223.238724] ? cred_has_capability.isra.0+0x139/0x2b0 [ 223.243894] ? cred_has_capability.isra.0+0x1b0/0x2b0 [ 223.249065] ? check_nnp_nosuid.isra.0+0x2a0/0x2a0 [ 223.253976] ? check_nnp_nosuid.isra.0+0x2a0/0x2a0 [ 223.258889] netlink_rcv_skb+0x160/0x440 [ 223.262938] ? nfnetlink_net_exit_batch+0x150/0x150 [ 223.267936] ? netlink_ack+0xae0/0xae0 [ 223.271816] ? ns_capable+0xde/0x100 [ 223.275526] nfnetlink_rcv+0x1b2/0x41b [ 223.279408] ? nfnetlink_rcv_batch+0x1df0/0x1df0 [ 223.284151] netlink_unicast+0x4d5/0x690 [ 223.288196] ? netlink_sendskb+0x110/0x110 [ 223.292417] netlink_sendmsg+0x6bb/0xc40 [ 223.296464] ? nlmsg_notify+0x1a0/0x1a0 [ 223.300419] ? kernel_recvmsg+0x220/0x220 [ 223.304558] ? nlmsg_notify+0x1a0/0x1a0 [ 223.308515] sock_sendmsg+0xc3/0x120 [ 223.312214] ___sys_sendmsg+0x7bb/0x8e0 [ 223.316177] ? __lock_acquire+0x6de/0x3ff0 [ 223.320393] ? copy_msghdr_from_user+0x440/0x440 [ 223.325134] ? __fget+0x32f/0x510 [ 223.328573] ? lock_downgrade+0x720/0x720 [ 223.332703] ? check_preemption_disabled+0x41/0x280 [ 223.337717] ? check_preemption_disabled+0x41/0x280 [ 223.342719] ? __fget+0x356/0x510 [ 223.346159] ? do_dup2+0x450/0x450 [ 223.349687] ? __fdget+0x1d0/0x230 [ 223.353217] __x64_sys_sendmsg+0x132/0x220 [ 223.357443] ? __sys_sendmsg+0x1b0/0x1b0 [ 223.361497] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 223.366235] ? trace_hardirqs_off_caller+0x69/0x210 [ 223.371234] ? do_syscall_64+0x21/0x620 [ 223.375193] do_syscall_64+0xf9/0x620 [ 223.378993] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 223.384173] RIP: 0033:0x45cba9 [ 223.387397] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 223.406279] RSP: 002b:00007f237855bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 223.413966] RAX: ffffffffffffffda RBX: 00000000004fee60 RCX: 000000000045cba9 [ 223.421216] RDX: 000000000004c0d0 RSI: 0000000020000300 RDI: 0000000000000004 [ 223.428476] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 223.435730] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 223.442981] R13: 000000000000095a R14: 00000000004cc2f6 R15: 00007f237855c6d4 [ 223.450242] [ 223.451848] The buggy address belongs to the variable: [ 223.457121] nft_flow_offload_policy+0x38/0x100 [ 223.461765] [ 223.463372] Memory state around the buggy address: [ 223.468285] ffffffff88301380: 00 00 00 00 00 00 00 00 00 00 00 00 00 fa fa fa [ 223.475626] ffffffff88301400: fa fa fa fa 00 05 fa fa fa fa fa fa 00 00 00 00 [ 223.482966] >ffffffff88301480: fa fa fa fa 00 00 07 fa fa fa fa fa 00 00 00 00 [ 223.490301] ^ [ 223.494428] ffffffff88301500: fa fa fa fa 00 00 00 00 fa fa fa fa 00 00 00 00 [ 223.501766] ffffffff88301580: 00 00 fa fa fa fa fa fa 00 00 00 00 00 00 fa fa [ 223.509100] ================================================================== [ 223.516434] Disabling lock debugging due to kernel taint [ 223.574614] Kernel panic - not syncing: panic_on_warn set ... [ 223.574614] [ 223.582009] CPU: 0 PID: 8131 Comm: syz-executor.1 Tainted: G B 4.19.131-syzkaller #0 [ 223.591183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 223.600531] Call Trace: [ 223.603116] dump_stack+0x1fc/0x2fe [ 223.606743] panic+0x26a/0x50e [ 223.610038] ? __warn_printk+0xf3/0xf3 [ 223.613915] ? preempt_schedule_common+0x45/0xc0 [ 223.618650] ? ___preempt_schedule+0x16/0x18 [ 223.623035] ? trace_hardirqs_on+0x55/0x210 [ 223.627336] kasan_end_report+0x43/0x49 [ 223.631288] kasan_report_error.cold+0xa7/0x1c7 [ 223.635939] ? nfnetlink_parse_nat_setup+0x5ed/0x640 [ 223.641018] __asan_report_load8_noabort+0x88/0x90 [ 223.645926] ? nfnetlink_parse_nat_setup+0x5ed/0x640 [ 223.651015] nfnetlink_parse_nat_setup+0x5ed/0x640 [ 223.655921] ? nf_nat_inet_fn+0xb00/0xb00 [ 223.660046] ? lock_downgrade+0x720/0x720 [ 223.664171] ? check_preemption_disabled+0x41/0x280 [ 223.669166] ? should_fail+0x142/0x7b0 [ 223.673039] ctnetlink_parse_nat_setup+0xb6/0x640 [ 223.677861] ctnetlink_create_conntrack+0x4bb/0x12c0 [ 223.682941] ? ctnetlink_change_synproxy.isra.0+0x380/0x380 [ 223.688629] ? hash_conntrack_raw+0x2d6/0x460 [ 223.693102] ? nf_ct_get_tuplepr+0x310/0x310 [ 223.697488] ? nf_ct_gc_expired+0x300/0x300 [ 223.701786] ? nfnetlink_rcv_msg+0x98d/0xf60 [ 223.706179] ctnetlink_new_conntrack+0x4f3/0xde0 [ 223.710914] ? ctnetlink_create_conntrack+0x12c0/0x12c0 [ 223.716253] ? nfnetlink_rcv_msg+0x98d/0xf60 [ 223.720647] ? netlink_deliver_tap+0x8fb/0xb00 [ 223.725210] ? nfnetlink_rcv_msg+0x95a/0xf60 [ 223.729599] ? ctnetlink_create_conntrack+0x12c0/0x12c0 [ 223.734944] nfnetlink_rcv_msg+0xc4f/0xf60 [ 223.739161] ? nfnetlink_net_exit_batch+0x150/0x150 [ 223.744159] ? cred_has_capability.isra.0+0x139/0x2b0 [ 223.749334] ? cred_has_capability.isra.0+0x1b0/0x2b0 [ 223.754514] ? check_nnp_nosuid.isra.0+0x2a0/0x2a0 [ 223.759419] ? check_nnp_nosuid.isra.0+0x2a0/0x2a0 [ 223.764328] netlink_rcv_skb+0x160/0x440 [ 223.768369] ? nfnetlink_net_exit_batch+0x150/0x150 [ 223.773362] ? netlink_ack+0xae0/0xae0 [ 223.777231] ? ns_capable+0xde/0x100 [ 223.780921] nfnetlink_rcv+0x1b2/0x41b [ 223.784785] ? nfnetlink_rcv_batch+0x1df0/0x1df0 [ 223.789518] netlink_unicast+0x4d5/0x690 [ 223.793560] ? netlink_sendskb+0x110/0x110 [ 223.797774] netlink_sendmsg+0x6bb/0xc40 [ 223.801814] ? nlmsg_notify+0x1a0/0x1a0 [ 223.805766] ? kernel_recvmsg+0x220/0x220 [ 223.809890] ? nlmsg_notify+0x1a0/0x1a0 [ 223.813842] sock_sendmsg+0xc3/0x120 [ 223.817535] ___sys_sendmsg+0x7bb/0x8e0 [ 223.821492] ? __lock_acquire+0x6de/0x3ff0 [ 223.825714] ? copy_msghdr_from_user+0x440/0x440 [ 223.830449] ? __fget+0x32f/0x510 [ 223.833888] ? lock_downgrade+0x720/0x720 [ 223.838013] ? check_preemption_disabled+0x41/0x280 [ 223.843006] ? check_preemption_disabled+0x41/0x280 [ 223.848001] ? __fget+0x356/0x510 [ 223.851432] ? do_dup2+0x450/0x450 [ 223.854981] ? __fdget+0x1d0/0x230 [ 223.858503] __x64_sys_sendmsg+0x132/0x220 [ 223.862728] ? __sys_sendmsg+0x1b0/0x1b0 [ 223.866799] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 223.871532] ? trace_hardirqs_off_caller+0x69/0x210 [ 223.876530] ? do_syscall_64+0x21/0x620 [ 223.880483] do_syscall_64+0xf9/0x620 [ 223.884272] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 223.889440] RIP: 0033:0x45cba9 [ 223.892619] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 223.911510] RSP: 002b:00007f237855bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 223.919266] RAX: ffffffffffffffda RBX: 00000000004fee60 RCX: 000000000045cba9 [ 223.926514] RDX: 000000000004c0d0 RSI: 0000000020000300 RDI: 0000000000000004 [ 223.933802] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 223.941051] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 223.948299] R13: 000000000000095a R14: 00000000004cc2f6 R15: 00007f237855c6d4 [ 223.956758] Kernel Offset: disabled [ 223.960372] Rebooting in 86400 seconds..