Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.146' (ECDSA) to the list of known hosts. 2020/07/19 08:42:19 fuzzer started 2020/07/19 08:42:19 dialing manager at 10.128.0.26:36697 2020/07/19 08:42:20 syscalls: 3206 2020/07/19 08:42:20 code coverage: enabled 2020/07/19 08:42:20 comparison tracing: enabled 2020/07/19 08:42:20 extra coverage: enabled 2020/07/19 08:42:20 setuid sandbox: enabled 2020/07/19 08:42:20 namespace sandbox: enabled 2020/07/19 08:42:20 Android sandbox: /sys/fs/selinux/policy does not exist 2020/07/19 08:42:20 fault injection: enabled 2020/07/19 08:42:20 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/07/19 08:42:20 net packet injection: enabled 2020/07/19 08:42:20 net device setup: enabled 2020/07/19 08:42:20 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/07/19 08:42:20 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/07/19 08:42:20 USB emulation: enabled 08:44:50 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f0000000000)=0x4, 0x4) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x101000) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) getpeername$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000000c0)=0x1c) r2 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/exec\x00', 0x2, 0x0) pwrite64(r2, &(0x7f0000000140)="698f690683a376ea0101b20b722d4305a45de7397931ae29c57a1989b0dca8ccc5db357a6ed8de0a105ee6a3680125e14938d2ead5f280a681eb8ed1a32e555d3829c372c25c0b59261afcc3a7a316299fcf6d37f062105f6d1e52031cfd9f7f5745f26275e8a98bf48c4dfeddbe66293424c751b8411e7c113d1a4545ecbbd1e4cca40ed61a14425d380f6d3e4fb4cd0e16256cbf4eff530685ee6a495999e26d009f8f179833e37064d7bba126dab95c669beca4b613bf21ca11b7e548f61e7bfe8314b0c1d0c4", 0xc8, 0x80000000) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240)='/dev/bsg\x00', 0x40000, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r3, 0x40087705, &(0x7f0000000280)={0x0, 0x7fffffff}) ioctl$HIDIOCGPHYS(r3, 0x80404812, &(0x7f00000002c0)) mount(&(0x7f0000000300)=@nullb='/dev/nullb0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='dax\x00', 0x8000, &(0x7f00000003c0)='/dev/usbmon#\x00') openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) sendfile(r4, r0, &(0x7f0000000440)=0x40, 0x4) r5 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-control\x00', 0x185800, 0x0) bind$pptp(r5, &(0x7f00000004c0)={0x18, 0x2, {0x3, @private=0xa010100}}, 0x1e) dup(r3) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000500)='/proc/capi/capi20\x00', 0x20040, 0x0) ioctl$TIOCSLCKTRMIOS(r6, 0x5457, &(0x7f0000000540)) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000600)={r5, r6, 0x4}, 0x10) syzkaller login: [ 202.973092][ T6844] IPVS: ftp: loaded support on port[0] = 21 [ 203.084621][ T6844] chnl_net:caif_netlink_parms(): no params data found 08:44:51 executing program 1: ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f0000000000)) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x2000, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={0x0, 0x9}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000180)={r1, 0x8}, 0x8) r2 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)="b255081b4a3b711840f8bdcc741559a3ecce4bed9e4ad4f39bc50a2a90bd284f94fa34134dbe5bc0208f8733b5a37c3fd572f76351be931efe763c57b468b91c", 0x40, 0xfffffffffffffffc) keyctl$setperm(0x5, r2, 0x8220220) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) r3 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt(r3, 0x5e, 0x6, &(0x7f0000000280)=""/41, &(0x7f00000002c0)=0x29) r4 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000300)) r5 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dri/renderD128\x00', 0x102, 0x0) ioctl$DRM_IOCTL_AGP_UNBIND(r5, 0x40106437, &(0x7f0000000380)={0x0, 0xff3c}) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000480)={&(0x7f0000000440)=[0x2, 0x8001, 0x0, 0x5], 0x4, 0x5, 0x80000000, 0xfffff709, 0x3, 0x3, 0x20, {0xff, 0x7, 0x0, 0x7, 0xff, 0x8, 0x7, 0x0, 0x1, 0x3, 0x6, 0x7f, 0x1, 0x3, "d649633dbadd12b17074d55a0475b87ec605b057eba35a70bbce307348bb8f44"}}) r6 = syz_open_dev$audion(&(0x7f0000000500)='/dev/audio#\x00', 0x80000000, 0x20000) ioctl$CAPI_MANUFACTURER_CMD(r6, 0xc0104320, &(0x7f0000000600)={0x5, &(0x7f0000000540)="b000da5f1455b55f26ce241c5e5fd46ca621705a6087368552b32ca2fc4e065c086ab28727356732c0f8727eabc3e180bac67d1981db2292696ecdf11d889c3a64cbb013e80ef51af21455854dc589cf34a97a2cf429cee05e5bad05816d4df74162002ee1bfea09cea8887b97570294f786df898dc691e9fc18453e454785be15c591f41bd5d35e333ffeda1542a79bebc0d3fe79e8a67e270bce"}) sendmsg$NFT_MSG_GETOBJ_RESET(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x40, 0x15, 0xa, 0x101, 0x0, 0x0, {0x7, 0x0, 0x9}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x3}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x5}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x1}]}, 0x40}, 0x1, 0x0, 0x0, 0xb5}, 0x20004040) read(0xffffffffffffffff, &(0x7f0000000780)=""/182, 0xb6) [ 203.148011][ T6844] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.157335][ T6844] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.166597][ T6844] device bridge_slave_0 entered promiscuous mode [ 203.176816][ T6844] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.183910][ T6844] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.191860][ T6844] device bridge_slave_1 entered promiscuous mode [ 203.217702][ T6844] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 203.228954][ T6844] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 203.254277][ T6844] team0: Port device team_slave_0 added [ 203.262748][ T6844] team0: Port device team_slave_1 added [ 203.282068][ T6844] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 203.289265][ T6844] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 203.315460][ T6844] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 203.337867][ T6844] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 203.344804][ T6844] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 203.370900][ T6844] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 203.397176][ T6992] IPVS: ftp: loaded support on port[0] = 21 08:44:51 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x2, 0x200000) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000040)={0x1, 0x1}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x391080, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000200)=0x81, &(0x7f0000000240)=0x4) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000280)='/dev/bsg\x00', 0x12000, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000002c0)={0x8, 0x9, 0x1, 0x0, 0x0, [{{r2}, 0x80}]}) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000340)={0x2, 0xffffffffffffffff, 0x1}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000380)={0x0, 0x5}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000400)={r4, @in={{0x2, 0x4e22, @broadcast}}, 0x8, 0x3, 0x7fff, 0x4, 0x6, 0x7, 0x1f}, &(0x7f00000004c0)=0x9c) r5 = socket$alg(0x26, 0x5, 0x0) sendfile(r5, r0, &(0x7f0000000500)=0x754, 0x80000001) pipe(&(0x7f0000000540)={0xffffffffffffffff}) bind$rds(r6, &(0x7f0000000580)={0x2, 0x4e22, @loopback}, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600)='nl80211\x00') sendmsg$NL80211_CMD_DEL_INTERFACE(r2, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r7, 0x800, 0x70bd25, 0x25dfdbfe, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x7fffffff, 0x4}}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}]}, 0x28}, 0x1, 0x0, 0x0, 0x20008090}, 0x84) ioctl$SNDRV_PCM_IOCTL_PREPARE(r6, 0x4140, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000700)='/dev/uinput\x00', 0x802, 0x0) ioctl$FITRIM(r8, 0xc0185879, &(0x7f0000000740)={0x4cce5c75, 0x6, 0x10000}) socket$pptp(0x18, 0x1, 0x2) [ 203.430387][ T6844] device hsr_slave_0 entered promiscuous mode [ 203.476396][ T6844] device hsr_slave_1 entered promiscuous mode [ 203.615049][ T7013] IPVS: ftp: loaded support on port[0] = 21 [ 203.751741][ T6992] chnl_net:caif_netlink_parms(): no params data found 08:44:51 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000040)={0x2, {0x2, 0xffb5, 0x401, 0x7116, 0x54, 0x4}}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x183600, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x89f9, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x4, 0x20, 0x5, 0x7067, 0x8, @private0, @rand_addr=' \x01\x00', 0x7800, 0x7feb, 0x3, 0x3e}}) r2 = syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_SUBDEV_G_EDID(r2, 0xc0285628, &(0x7f0000000200)={0x0, 0xfff, 0x8001, [], &(0x7f00000001c0)=0x3c}) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x24000, 0x0) getsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x20000, 0x0) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) fcntl$F_SET_FILE_RW_HINT(r3, 0x40e, &(0x7f0000000340)=0x5) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/tty/ldiscs\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000400)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r5, &(0x7f0000000480)={0x10, 0x30, 0xfa00, {&(0x7f00000003c0), 0x4, {0xa, 0x4e20, 0x1, @dev={0xfe, 0x80, [], 0x12}, 0xffff778a}, r6}}, 0x38) openat$zero(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/zero\x00', 0x8100, 0x0) accept(0xffffffffffffffff, 0x0, &(0x7f0000000500)) r7 = request_key(&(0x7f0000000540)='id_legacy\x00', &(0x7f0000000580)={'syz', 0x2}, &(0x7f00000005c0)=',@.\x00', 0xfffffffffffffff9) keyctl$negate(0xd, r7, 0xfffffffffffffff9, 0xfffffffffffffffb) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x28, 0x1412, 0x100, 0x70bd2c, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_STAT_RES={0x8}, @RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x5}, @RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2000}, 0x4003) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x70, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x70}, 0x1, 0x0, 0x0, 0x40000}, 0x4) [ 203.872876][ T7013] chnl_net:caif_netlink_parms(): no params data found [ 203.911360][ T6844] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 203.987820][ T6844] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 204.040690][ T6844] netdevsim netdevsim0 netdevsim2: renamed from eth2 08:44:52 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000000)={0x0, 0x0, 0x9, [0x1, 0x1ff, 0x20, 0x2, 0x0, 0x3912, 0x7, 0x6, 0x1]}, &(0x7f0000000040)=0x1a) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)={r1, 0x1ff}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100)={r1, 0x100, 0xb3b3, 0x8, 0xc2ef, 0x4}, &(0x7f0000000140)=0x14) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000180)={0x7, 0x8}, 0x2) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wg2\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x5, 0x3, 0x6, 0xc0000000, 0x20, r2, 0xfffffff9, [], r3, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x40) socket$inet(0x2, 0xa, 0x4) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x10000, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f00000002c0)={0x0, 0x80}, &(0x7f0000000300)=0x8) ioctl$SG_GET_NUM_WAITING(r4, 0x227d, &(0x7f0000000340)) r5 = socket$caif_stream(0x25, 0x1, 0x4) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000003c0)={'veth0_macvtap\x00', &(0x7f0000000380)=@ethtool_eee={0x45, 0x7, 0x10000, 0x3, 0x9, 0xfffffffc, 0x7, 0x9, [0x7fffffff, 0x8]}}) pipe2(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$VHOST_GET_VRING_BASE(r7, 0xc008af12, &(0x7f0000000440)) chroot(&(0x7f0000000480)='./file0\x00') getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e24, @multicast2}}, 0xff, 0x8}, &(0x7f0000000580)=0x90) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f00000005c0)={r8, @in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x3f, 0x9b7}, 0x90) syz_usb_connect$cdc_ncm(0x4, 0x90, &(0x7f0000000680)={{0x12, 0x1, 0x110, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x7e, 0x2, 0x1, 0x0, 0xe0, 0xc5, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x7, 0x24, 0x6, 0x0, 0x1, "62ab"}, {0x5, 0x24, 0x0, 0x4}, {0xd, 0x24, 0xf, 0x1, 0x7, 0x9, 0x5, 0x4}, {0x6, 0x24, 0x1a, 0x400, 0x35}, [@acm={0x4, 0x24, 0x2, 0xa}, @country_functional={0x10, 0x24, 0x7, 0x7f, 0xfff, [0x4, 0x1f, 0x1, 0xbd, 0x7]}, @obex={0x5, 0x24, 0x15, 0xce}, @network_terminal={0x7, 0x24, 0xa, 0x3, 0xc, 0x65, 0x8}]}, {{0x9, 0x5, 0x81, 0x3, 0x200, 0xbc, 0x0, 0x4}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x1, 0x40, 0x1}}, {{0x9, 0x5, 0x3, 0x2, 0x40, 0x4}}}}}}}]}}, &(0x7f0000000ac0)={0xa, &(0x7f0000000740)={0xa, 0x6, 0x110, 0xfc, 0xa6, 0x3, 0xff}, 0xb9, &(0x7f0000000780)={0x5, 0xf, 0xb9, 0x5, [@wireless={0xb, 0x10, 0x1, 0x8, 0x40, 0x5, 0x1, 0x200}, @ss_container_id={0x14, 0x10, 0x4, 0xf8, "61daa4db7cf86dd02c4809bff059ac11"}, @generic={0x7e, 0x10, 0xb, "dd6d30e49e7340865f8e76a8f8f94e801e32bb7633cf2269fd976da3f5e868fafa04ebc4c7c0cdc4611fd52981801296bd7839d5a7163a479d5cf77023fb124c5ab85242119abeb67dcd79fc40b25aa5e9b01e5f6f7b6bb504699521914a2922e97678fe9bb81cc6370aa6dc8e32532b4aa720093f2d506d41c2c1"}, @ext_cap={0x7, 0x10, 0x2, 0x16, 0x2, 0x7, 0x6}, @ssp_cap={0x10, 0x10, 0xa, 0x40, 0x1, 0x5, 0xf000, 0x1, [0x30]}]}, 0x7, [{0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x41f}}, {0x6e, &(0x7f0000000880)=@string={0x6e, 0x3, "8a5034430620f203fe8d8e7e16043a065f7658eb85bc22c6c9c5cef9061985bc2cb2cc97487a3d8fcdf99ffc2aad4c05d553e17f6452361a0e9dd4643c879a3a53c8612bbb2a3edce7192dedb670551b1f8db32384e94c911ea7d607a2a88a62ec755ca6e835267ddd57a8d9"}}, {0x4, &(0x7f0000000900)=@lang_id={0x4, 0x3, 0x42b}}, {0x4, &(0x7f0000000940)=@lang_id={0x4, 0x3, 0x403}}, {0xa3, &(0x7f0000000980)=@string={0xa3, 0x3, "73d18457d873b7583cc7fd112307fa4866ee0a5c4d1e260ba6144321d7978815927e8538a88277ffd57d33c3ffda150f8c28767e6273c9914722fe338bef66efe4cae66dd1bc37d5f4b5b083bb24d212bcafc9be2d3380ee542375256a8112aae6908eb191991f4d4882bb21d7ac89829f72af8845ae6e8ab19a8291b89c2ff4b2e486745ce85e2bd42b9dadfe13465d99d127143d8275d1bf463c0723a4f659f0"}}, {0x4, &(0x7f0000000a40)=@lang_id={0x4, 0x3, 0x804}}, {0x4, &(0x7f0000000a80)=@lang_id={0x4, 0x3, 0x280a}}]}) [ 204.114197][ T6844] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 204.214168][ T7265] IPVS: ftp: loaded support on port[0] = 21 [ 204.276939][ T6992] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.284021][ T6992] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.297388][ T6992] device bridge_slave_0 entered promiscuous mode [ 204.331972][ T7013] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.340066][ T7293] IPVS: ftp: loaded support on port[0] = 21 [ 204.345817][ T7013] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.354837][ T7013] device bridge_slave_0 entered promiscuous mode [ 204.381563][ T6992] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.395776][ T6992] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.407192][ T6992] device bridge_slave_1 entered promiscuous mode [ 204.428307][ T7013] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.435360][ T7013] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.449764][ T7013] device bridge_slave_1 entered promiscuous mode [ 204.504197][ T7013] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 204.530864][ T6992] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 08:44:52 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0xff28, 0x7}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={r1, @in6={{0xa, 0x4e22, 0x3ff, @local, 0x28}}, 0x9, 0x7}, &(0x7f0000000140)=0x90) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f00000001c0)={0x9c0000, 0xffffffe6, 0x4, 0xffffffffffffffff, 0x0, &(0x7f0000000180)={0x9b0972, 0x8, [], @value=0x6}}) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f0000000200)={0x4bf, 0x3}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) r3 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x3, 0x200) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000280)={0x0, 0x4}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={r4, @in6={{0xa, 0x4e23, 0x61e, @dev={0xfe, 0x80, [], 0x35}, 0x6}}}, &(0x7f00000003c0)=0x90) r5 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000400)='/dev/audio1\x00', 0x460400, 0x0) flock(r5, 0xa) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000440)='/proc/capi/capi20\x00', 0x880002, 0x0) ioctl$KDADDIO(r6, 0x4b34, 0x1f) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r7, 0x84, 0x7c, &(0x7f00000004c0)={r4, 0x0, 0x20}, &(0x7f0000000500)=0x8) ioperm(0x6, 0x8, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(0xffffffffffffffff, 0xc0106403, &(0x7f0000000540)={0x7a1, 0x7, 0x30d, 0x1}) r8 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ocfs2_control\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETPROPERTY(r8, 0xc04064aa, &(0x7f0000000680)={&(0x7f00000005c0)=[0x0, 0x0], &(0x7f0000000600)=[{}, {}, {}], 0x8, 0x0, [], 0x2, 0x3}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000006c0)) [ 204.550000][ T7013] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 204.574100][ T6992] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 204.677489][ T7013] team0: Port device team_slave_0 added [ 204.689649][ T6992] team0: Port device team_slave_0 added [ 204.699521][ T7013] team0: Port device team_slave_1 added [ 204.760252][ T6992] team0: Port device team_slave_1 added [ 204.812281][ T7293] chnl_net:caif_netlink_parms(): no params data found [ 204.834671][ T7013] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 204.844160][ T7013] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 204.871065][ T7013] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 204.887717][ T6992] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 204.894647][ T6992] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 204.920878][ T6992] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 204.934675][ T6992] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 204.944357][ T6992] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 204.971619][ T6992] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 204.985091][ T7013] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 204.992351][ T7013] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 205.018679][ T7013] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 205.033814][ T7265] chnl_net:caif_netlink_parms(): no params data found [ 205.057802][ T7482] IPVS: ftp: loaded support on port[0] = 21 [ 205.169711][ T7013] device hsr_slave_0 entered promiscuous mode [ 205.216456][ T7013] device hsr_slave_1 entered promiscuous mode [ 205.255932][ T7013] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 205.263578][ T7013] Cannot create hsr debugfs directory [ 205.317461][ T6992] device hsr_slave_0 entered promiscuous mode [ 205.376281][ T6992] device hsr_slave_1 entered promiscuous mode [ 205.435854][ T6992] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 205.443396][ T6992] Cannot create hsr debugfs directory [ 205.507641][ T7265] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.514866][ T7265] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.524441][ T7265] device bridge_slave_0 entered promiscuous mode [ 205.558382][ T7265] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.565437][ T7265] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.575636][ T7265] device bridge_slave_1 entered promiscuous mode [ 205.583435][ T7293] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.591204][ T7293] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.599049][ T7293] device bridge_slave_0 entered promiscuous mode [ 205.630342][ T7293] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.640330][ T7293] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.649325][ T7293] device bridge_slave_1 entered promiscuous mode [ 205.698793][ T7293] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 205.712235][ T7293] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 205.736221][ T7265] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 205.797174][ T7265] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 205.841753][ T7293] team0: Port device team_slave_0 added [ 205.853750][ T7482] chnl_net:caif_netlink_parms(): no params data found [ 205.879703][ T7293] team0: Port device team_slave_1 added [ 205.912406][ T7265] team0: Port device team_slave_0 added [ 205.923955][ T6844] 8021q: adding VLAN 0 to HW filter on device bond0 [ 205.944469][ T7265] team0: Port device team_slave_1 added [ 205.988897][ T7293] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 205.999570][ T7293] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 206.028361][ T7293] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 206.044675][ T7293] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 206.053025][ T7293] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 206.080768][ T7293] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 206.096470][ T7265] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 206.103405][ T7265] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 206.130505][ T7265] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 206.143139][ T7265] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 206.150163][ T7265] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 206.176339][ T7265] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 206.253908][ T2598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 206.262154][ T2598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 206.277564][ T7013] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 206.314105][ T7013] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 206.348615][ T7482] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.355674][ T7482] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.363773][ T7482] device bridge_slave_0 entered promiscuous mode [ 206.373420][ T6844] 8021q: adding VLAN 0 to HW filter on device team0 [ 206.448590][ T7293] device hsr_slave_0 entered promiscuous mode [ 206.488663][ T7293] device hsr_slave_1 entered promiscuous mode [ 206.535840][ T7293] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 206.543381][ T7293] Cannot create hsr debugfs directory [ 206.555254][ T7013] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 206.599476][ T7482] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.607094][ T7482] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.614610][ T7482] device bridge_slave_1 entered promiscuous mode [ 206.667929][ T7265] device hsr_slave_0 entered promiscuous mode [ 206.716323][ T7265] device hsr_slave_1 entered promiscuous mode [ 206.776037][ T7265] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 206.783568][ T7265] Cannot create hsr debugfs directory [ 206.790704][ T2598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 206.799709][ T2598] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 206.808209][ T2598] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.815375][ T2598] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.823501][ T2598] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 206.833875][ T7013] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 206.906989][ T7482] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 206.936823][ T7482] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 206.991027][ T6992] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 207.029095][ T6992] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 207.068391][ T6992] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 207.127607][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 207.136900][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 207.145090][ T2496] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.152162][ T2496] bridge0: port 2(bridge_slave_1) entered forwarding state [ 207.159875][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 207.169322][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 207.178168][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 207.187129][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 207.195361][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 207.204532][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 207.213011][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 207.221418][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 207.230429][ T6992] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 207.300895][ T7482] team0: Port device team_slave_0 added [ 207.317037][ T7482] team0: Port device team_slave_1 added [ 207.324745][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 207.332726][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 207.342356][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 207.363678][ T6844] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 207.448648][ T7482] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 207.455604][ T7482] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 207.489344][ T7482] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 207.506728][ T3920] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 207.514130][ T3920] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 207.530670][ T6844] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 207.549821][ T7482] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 207.558044][ T7482] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 207.584899][ T7482] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 207.651731][ T7293] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 207.688553][ T7293] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 207.778714][ T7482] device hsr_slave_0 entered promiscuous mode [ 207.836094][ T7482] device hsr_slave_1 entered promiscuous mode [ 207.875877][ T7482] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 207.883413][ T7482] Cannot create hsr debugfs directory [ 207.906363][ T7293] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 207.985003][ T7265] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 208.028414][ T7265] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 208.081564][ T7293] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 208.155841][ T7265] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 208.198336][ T7265] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 208.245837][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 208.254339][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 208.263748][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 208.272715][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 208.292747][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 208.300561][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 208.311639][ T6844] device veth0_vlan entered promiscuous mode [ 208.384826][ T6844] device veth1_vlan entered promiscuous mode [ 208.476236][ T3920] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 208.484688][ T3920] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 208.501475][ T3920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 208.511705][ T3920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 208.530091][ T6844] device veth0_macvtap entered promiscuous mode [ 208.592830][ T6844] device veth1_macvtap entered promiscuous mode [ 208.622790][ T7013] 8021q: adding VLAN 0 to HW filter on device bond0 [ 208.652497][ T7482] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 208.698042][ T7482] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 208.741409][ T6844] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 208.753196][ T6844] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 208.766624][ T7482] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 208.791167][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 208.799140][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 208.810755][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 208.819486][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 208.831165][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 208.840631][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 208.859761][ T7013] 8021q: adding VLAN 0 to HW filter on device team0 [ 208.871567][ T6844] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 208.893295][ T6844] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 208.903901][ T6844] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 208.912835][ T6844] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 208.924787][ T7482] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 208.950194][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 208.958016][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 208.981198][ T6992] 8021q: adding VLAN 0 to HW filter on device bond0 [ 209.040457][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 209.050946][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 209.059804][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.066902][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 209.075184][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 209.084243][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 209.092625][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.099734][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.247684][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 209.255707][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 209.267485][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 209.277344][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 209.285034][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 209.296733][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 209.305336][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 209.319096][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 209.352186][ T6992] 8021q: adding VLAN 0 to HW filter on device team0 08:44:57 executing program 0: [ 209.396276][ T7013] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 209.434829][ T7013] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 08:44:57 executing program 0: [ 209.463318][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 209.497012][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 08:44:57 executing program 0: 08:44:57 executing program 0: [ 209.506507][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 209.523500][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 209.546833][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 209.555185][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 209.606607][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 209.614212][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 08:44:57 executing program 0: 08:44:57 executing program 0: [ 209.664167][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 209.687946][ T2496] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.695127][ T2496] bridge0: port 1(bridge_slave_0) entered forwarding state 08:44:57 executing program 0: [ 209.717393][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 209.746286][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 209.754567][ T2496] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.761663][ T2496] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.796016][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 209.826600][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 209.834341][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 209.866576][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 209.874908][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 209.886539][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 209.898859][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 209.907423][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 209.914836][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 209.927360][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 209.965929][ T7013] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 209.981174][ T6992] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 209.994892][ T6992] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 210.007352][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 210.015518][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 210.023974][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 210.032345][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 210.073355][ T7293] 8021q: adding VLAN 0 to HW filter on device bond0 [ 210.083197][ T7265] 8021q: adding VLAN 0 to HW filter on device bond0 [ 210.091239][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 210.134882][ T7265] 8021q: adding VLAN 0 to HW filter on device team0 [ 210.143775][ T2598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 210.153215][ T2598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 210.161900][ T2598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 210.170382][ T2598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 210.178247][ T2598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 210.186170][ T2598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 210.199573][ T7293] 8021q: adding VLAN 0 to HW filter on device team0 [ 210.210812][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 210.227573][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 210.235714][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 210.244391][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 210.253168][ T7883] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.260254][ T7883] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.287023][ T7013] device veth0_vlan entered promiscuous mode [ 210.302535][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 210.313649][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 210.321640][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 210.329940][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 210.338681][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 210.347175][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.354184][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.362313][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 210.371398][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 210.380235][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.387334][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.394738][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 210.403874][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 210.411402][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 210.418849][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 210.429716][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 210.438095][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.445128][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.454006][ T6992] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 210.477446][ T7013] device veth1_vlan entered promiscuous mode [ 210.499332][ T8146] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 210.507778][ T8146] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 210.515590][ T8146] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 210.525112][ T8146] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 210.533824][ T8146] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 210.542939][ T8146] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 210.552193][ T8146] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 210.561207][ T8146] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 210.590885][ T2598] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 210.599651][ T2598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 210.608426][ T2598] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 210.619302][ T2598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 210.628900][ T2598] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 210.638030][ T2598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 210.647166][ T2598] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 210.655372][ T2598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 210.664087][ T2598] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 210.673562][ T2598] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 210.691553][ T7265] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 210.707540][ T7265] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 210.731240][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 210.739853][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 210.748561][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 210.758319][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 210.766915][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 210.775291][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 210.784291][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 210.793004][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 210.801750][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 210.810873][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 210.824205][ T7013] device veth0_macvtap entered promiscuous mode [ 210.838165][ T7293] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 210.860110][ T7013] device veth1_macvtap entered promiscuous mode [ 210.877246][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 210.885110][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 210.897154][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 210.904489][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 210.920314][ T7265] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 210.953845][ T7482] 8021q: adding VLAN 0 to HW filter on device bond0 [ 210.963047][ T8146] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 210.971861][ T8146] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 210.980521][ T8146] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 210.989065][ T8146] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 210.997569][ T6992] device veth0_vlan entered promiscuous mode [ 211.007489][ T7013] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 211.019591][ T7013] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 211.030824][ T7013] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 211.044986][ T7293] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 211.067892][ T7482] 8021q: adding VLAN 0 to HW filter on device team0 [ 211.074633][ T8146] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 211.084421][ T8146] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 211.094102][ T8146] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 211.103859][ T8146] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 211.112173][ T8146] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 211.120381][ T8146] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 211.131131][ T6992] device veth1_vlan entered promiscuous mode [ 211.156696][ T7013] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 211.169743][ T7013] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 211.190520][ T7013] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 211.207760][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 211.217555][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 211.227619][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.234661][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.242527][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 211.251670][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 211.260958][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 211.269534][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 211.278194][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 211.287291][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 211.295502][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.302572][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.310290][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 211.318979][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 211.352359][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 211.362301][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 211.372142][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 211.381468][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 211.391170][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 211.400738][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 211.410382][ T7013] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 211.428939][ T7013] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 211.440996][ T7013] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 211.453599][ T7013] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 211.479440][ T6992] device veth0_macvtap entered promiscuous mode [ 211.490385][ T6992] device veth1_macvtap entered promiscuous mode [ 211.500722][ T8146] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 211.511182][ T8146] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 211.519405][ T8146] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 211.528670][ T8146] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 211.537442][ T8146] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 211.545527][ T8146] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 211.553982][ T8146] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 211.562312][ T8146] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 211.574712][ T7482] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 211.647893][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 211.657285][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 211.676273][ T7265] device veth0_vlan entered promiscuous mode [ 211.704466][ T6992] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 211.716735][ T6992] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 211.727638][ T6992] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 211.739006][ T6992] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 211.750425][ T6992] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 211.762915][ T6992] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 211.774772][ T6992] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 211.785549][ T6992] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 211.798421][ T6992] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 211.809604][ T6992] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 211.820915][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 211.830572][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 211.839279][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 211.847787][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 211.856652][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 211.864636][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 211.873083][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 211.880558][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 211.888602][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 211.897918][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 211.909025][ T7293] device veth0_vlan entered promiscuous mode [ 211.962044][ T6992] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 211.976360][ T6992] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 211.985184][ T6992] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 211.994989][ T6992] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 212.010366][ T7265] device veth1_vlan entered promiscuous mode [ 212.028476][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 212.036870][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 212.044527][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 212.061505][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 212.070795][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 212.099175][ T7482] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 212.188604][ T7293] device veth1_vlan entered promiscuous mode [ 212.209526][ T3920] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 212.218826][ T3920] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 212.231137][ T3920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 212.241823][ T3920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 212.310695][ T7265] device veth0_macvtap entered promiscuous mode [ 212.408787][ T7265] device veth1_macvtap entered promiscuous mode 08:45:00 executing program 1: 08:45:00 executing program 0: [ 212.465621][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 212.474492][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 212.484153][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 212.509249][ T7293] device veth0_macvtap entered promiscuous mode [ 212.551254][ T7482] device veth0_vlan entered promiscuous mode [ 212.574405][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 212.597398][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 212.617816][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 212.626630][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 212.646763][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 212.654647][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 212.676495][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 212.686662][ T7265] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 212.704487][ T7265] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 212.724210][ T7265] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 212.753729][ T7265] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 212.768096][ T7265] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 212.779014][ T7265] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 212.790825][ T7265] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 212.802807][ T7265] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 212.814456][ T7265] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 212.825038][ T7265] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 212.835858][ T7265] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 212.845639][ T7265] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 212.856779][ T7265] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 212.867833][ T7265] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 212.877742][ T7293] device veth1_macvtap entered promiscuous mode [ 212.888914][ T2598] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 212.896704][ T2598] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 212.904940][ T2598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 212.914761][ T2598] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 212.923259][ T2598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 212.934852][ T7482] device veth1_vlan entered promiscuous mode [ 212.957182][ T7265] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 212.966176][ T7265] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 212.974835][ T7265] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 212.984079][ T7265] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 213.002653][ T7293] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 213.017180][ T7293] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.028612][ T7293] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 213.039431][ T7293] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.051183][ T7293] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 213.061957][ T7293] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.072083][ T7293] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 213.083319][ T7293] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.094504][ T7293] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 213.158727][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 213.166891][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 213.174648][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 213.184106][ T2496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 213.195202][ T7293] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 213.206828][ T7293] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.217419][ T7293] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 213.228804][ T7293] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.239001][ T7293] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 213.249983][ T7293] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.262486][ T7293] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 213.275792][ T7293] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.287601][ T7293] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 213.315734][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 213.324172][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 213.333710][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 213.343377][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 213.399497][ T7293] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 213.409085][ T7293] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 213.424566][ T7293] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 213.433581][ T7293] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 213.445011][ T7482] device veth0_macvtap entered promiscuous mode 08:45:01 executing program 3: [ 213.559127][ T7482] device veth1_macvtap entered promiscuous mode [ 213.709422][ T7482] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 213.744924][ T7482] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.757817][ T7482] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 213.769561][ T7482] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.780332][ T7482] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 213.791607][ T8227] syz-executor.4 uses obsolete (PF_INET,SOCK_PACKET) [ 213.791679][ T7482] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.809337][ T7482] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 213.821752][ T7482] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.832619][ T7482] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 213.845898][ T7482] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.858589][ T7482] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 213.870506][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 213.880570][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 213.893942][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 213.905423][ T7482] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 213.916333][ T7482] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.927026][ T7482] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 213.937541][ T7482] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.948497][ T7482] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 213.959821][ T7482] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.969689][ T7482] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 213.980856][ T7482] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.990848][ T7482] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 214.001315][ T7482] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 214.012436][ T7482] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 214.021612][ T2598] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 214.030879][ T2598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 214.043841][ T7482] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 214.053006][ T7482] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 214.063491][ T7482] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 214.073353][ T7482] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 08:45:02 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) 08:45:02 executing program 2: 08:45:02 executing program 1: 08:45:02 executing program 0: 08:45:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x2, 0x3, 0x60805ec670aad39f, 0x0, 0x0, {}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1}}]}, 0x1c}}, 0x0) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x20, 0x2, 0x3, 0x60805ec670aad39f, 0x0, 0x0, {}, [@NFQA_CFG_PARAMS={0x9, 0x2, {0x0, 0x2}}]}, 0x20}}, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) 08:45:02 executing program 5: io_setup(0x5, &(0x7f00000000c0)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x806, 0x0) io_submit(r0, 0x8, &(0x7f0000000280)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000040), 0xa}]) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 08:45:02 executing program 0: r0 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000001b40)=""/102400, 0x19000}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='maps\x00') writev(r0, &(0x7f00000016c0)=[{&(0x7f0000000440)="7e81f368117c6f30d3d9ce1eac4331523abd537a8f804365bf25c9e706e8648dd68fe306715f4856d27e7b1019628983160f9efa964f6d9264f3b715a95a09cecb8690fadf3fda5d38812da5a0d7ebec729aacecb8eeb028faa25bbbffaba7dcc687ca8e1ea45dd285177b52aae1e461d5b77b1fb87fe2e387149efc65c5783077bd56380a3d74560301ad27017ae775b663b43b8dacb766ce8288d0eb61d34707d9b643886764c0913b90be37b56b812aa028cab6009b4c06ebdfaf19afb56b5fb6f9a5b456f92858f92e6e93a60e54923cb1c6b58d39cb29b61f3849262b10bcde2b668c254deb649cd3833173e22c064babe06a87164a6eb14253f73ca8be1aecfe43881dcaca0ae4108cf0eed78df07471f551c8f179da8aee00890eccf66476d21f747d50ffb091cf29587fed63d034994afe0d836fc54be79bd59af67e17cb6422af16b9daec1c5940be9ca6debb313aedd2284ae071d7e069b0029f1943a943fa44b678b3ff0d0dcdf2f087f2d40c93bd592c62d3c7e4d8dbbc5179cf1a46e1a608fe55bd9d671e2ab47ab6cda164946a94eafacdf1e834d1d64df54290ad3db69881e3a1b7f91ff04100e8522b71646bb10e5b3e82081a67f400f74b100df0d7a9f3db9bf631300f373c7259d77d5844b9e205836ae9d54d38432e180d831b509c9e2deb45419b32dbe9da6c607bd26f38d3b1bfdb6bfb6b2b55fea25e9d8b95dcc7188f76b97122709d321c955f75345d6e717f057b0db07ca303641e2f127096ae52071d1307053d3977a77f078a3db0a82a1a8660b7b432bcdb97c27439ead0e9ae007988eedc65e56adf6cdc89a82fc3b6290c5f5accc4a4ac255fae9a4b6a41581eb93ff68cade154dad79724d27b881b38d9c9f514b6577e5e82b712041da283355242f5f23d46d48fdfb84177f67591bab0557dc784bd498254325f74aa6f48334f1f8ed4a9c23a68dc3d9af6a549a9dd4413b41e9ce8dcaedaf6ff83100fe1e155fd5bc448d862cd038b2da8568bd663b0952e95d5af6dea162eb662812d3808841710d7c81fb8e47bc2bfa9fd5404fc6dcd118693af30e14517be5bd79d9342fb6b2a332197d729428667419577131f7a55698bd1260891d38e042a8b5797ca7833eaa1578af795a1cff5c7fdcf7a7bbe3c4c502c684a3385ab6e1662fe938fb659e4e82715e8e1e36e55a471e6341db2bbdbe6190da485cb6b2012c5f98ec00d1dec4bba9b329c99d1a3eb145bbb33a9a83f7f9b7ad8b951a9b7994fcc88cccaa8f24d93a4ba4e921c021012a011488139deca8c33c4eb5b44dbf08eaf507ed60a953b642b9c04b38f1f319cf54fb90b2f883ed748db7d122037deac1efca9eb52e1a70f24dab1ba6db359af73e2a8c62dd81815c2a87d14e43135a7ac4874cacfbfe2108b7d0f4fab994a4c7cfb2af1b8e9e725bd614991b979582ae0f5bcf58cbe52877c015b52a9826f6a32db164b15d21e3419e3e737335d113571130a51aa64a0c8447fe00f2bd3be0c90da01b34e8122e485a30519bd2092662bbabfbd596f273907d4aaae581aa6e913be6efab2c5103e26b7467f6e03316b8a75aad724dd4c844b2a39e441a07d803779933c1bce69eebd0050ccac413a996663d847b0ae7cb9122158c1dbe667417ae60e2c815c25096f3b7dc3cc06d3fac0a08ad0701643b0f71331c8e5ec0ab444d95ddd31d659e01050fcb34ddb8a73f51409f801bb36202b23b21536f2b267c757d573e06698fe8d825d69cc71d1fb32a934ebbb20165eea528736555c28ab3866f9ca479744a0590ed141ae1f43b995af4a497f8d92a95f253e862caf1ea1d4be3ad0aaab5a3b642adb51522d927f4b143013a6da1bf796e7e67264dcb49c0bd4c39f7f403950362e960fc58e54ec45995e19c42649419d6a1fc7d9661ee66b27278dcee003d76ae81ac26cb3f1447d56b9d925e5e6a71550facde6af99a97faaf00040afaf728cddfdc8e96b2bd41801f2c626bd25f4e653a120c2743e0914e221149301dae40446a6032ff24966d4099d68116a843af2501feb187178b92ede5345ab573051547cdf9ce8f8b2044204e77aca7d91f512adeacd5738efe52e28bdb1378157b0f8e5745bcccf427eef93217d662dfa3db9dc15796cdd84710d7b2a6ec985ac4a22d6aecb1146ead7fbb63d035f83fb6f3c5ec16161e0bb38084eba79d2be64db84dd385ebe0a5c3c9e7ea98cb251bb7e1615e54905abdc0662f4da5eecbef0dd9f13fbcba49a8460e5809f925e6251c5cd457d41a810dbd1e86f8b1702ab4b06a3e7fbd9403290fedc281cb44b21677fd9c53bc444dc1e242094a2cfac4319008bfc882e2af7e40abc89fb9b64e178f3f26ded299ba878bcae19b5404748a1aa97eb6d5e4054da69c4d39f7b84bb3be1b9aef4ff1ed6dc5d2442044f2d21a8abf239cf8def4adc032fd8b57723f8db7b7b8e61203c6678e97dd5410248336b4ff56279960f91d2564806706e5fb43b69d150a74f423411bc65fec0a3da8b37697936a0e2803fd74512974b9b840d35a35d539f94b81bfa2fb158946edab9630bbf38120f3ceb53b14d1246bc3508de90fe36f36f517072239373f189f24b504901737fb2bbd6a70faf97df957e031cdb2f274a5127cc46bcc7de4ae62aa202abd39f862b60ebca708132b80aa59554ab2ce26d27895fd465bc16f9c660a55ccbaab5178ef1d75c6a3850a748a9c73bb0e7716fed0adf94f0de80287adc9e31ae22897cb2b8f094bd550d337967908a3f14b7b347c55f3a4691ec616e5b8792a5cad37061b3101a5ab3dd1c293514c8bdfced06b63c88f35bad20d8f626d26a685979574a8b683b91eb6f9c67bf6d2752a397823b0a4e9be7386a1b036f3a993faf7854d6428b9ae5c60266d10d5fc62aba9821b853f8f9062365ddf6f2b45e8a203cf0878c6a1f3d3498d35eeb6caf76b9a90669482cd182d90ac37e3d8db9d6767292c03e93ef61b7b5f157b7ed88092517eceb8f3f47b48ada05a91b2b4d3fb1ddf25b9712a4427304e2aa6a25123f099500e80c1c24d3be3cac8bc90a70d98964402b32e59b72e365a2ab181b2472e18ffe1c3aceddbe5e13af94079aa4dac4e33d13878e3f79707d1387dd2d64fef39fca24c393c27c2de0253525b3972d261090f479555d176eada0ac8fc3076b6b0698b53ed1343aee55acc86d4f1454ba841b30ae2092afe4a8bb3dd79fc65dd546a2f3f30424eaaba0b0e4af6118be3d10f5c390e5b75fbbd8e69fbfab1c52eea47872ad1ee8be28cb5194f2b50ab9638a25110230fb29dfd9dc00efcd30da19815d2cee05539d13759a1c9257bba4d8334016fb1b831a884a79233278f78b271dc2d5f45050545f7758cce3ef57013fc5f96c2b67845a4cd6758ab651cfaa925071aa769141559b0873bd64ce31d1781ba53dd35fcd71e505f8e293a79a6f107cd3929ca4092fe6d4ef95f6696425e56141b9f2e1de8c553da82e972475d4020e3465dfce4b0758bb643d2adfd8389e7acb2b108d0443afe5ebcaca795ec40f943819534dbb1a2d67740152ec8fb1208294898c9a3b6d8b969e5690a8fffcc629712610431070300d2397dc084de8e652f95be487c179f7de1a18753aa12d76f057bb22cb2c494b1c4642265250e7265f062b82c8789c9c44f587a9bb7306a669406199f68ca949b8cf03d359358a5370cce99429963f0dafdc5a89b9a95e3b5b6e4b649602bc84a44de85ecbb7a6047bf305608e351757c649662baa191199617e4d65246da8bf29cd683f15dcefe782d8fe1496cf75ed6e675f291344ea7b7e85ee6aa5e1a77ca984366f4d7e10e2a23c12258c06c0e4d82ca7827e728a3dd24cd1f93a9669675be7c45ae46327b2f469cc788410bf0b3b66cf623c1fe1ce9f62d7473460c2805c70b4d43b52e72950c06bfeefc09e80cf138d1c765f71401f9fce576a599a803b2aa5f13583c4df033df9b54fbc81ee439400c441074088b176bceea604ef5a1d133fcb0d67c83d06e5d01180e29bf7ecc8d6062dbebcedbf1445fdb70366f2490d62d6bd0f2e8bc29aef822ba6705105f6a6a29ab70bd0f664bfedb91341dfbe948cbca278e76e311eff311cf6bd946b430d947b1ea54b7ceda123494d5ee2a95b3c1c36647d9bbe72817d614d4d819c2abc3570f0f57144afc7036833e2ea888af9b6e4b71d1dbb948009edbf6af1f5ccb6ae66d8a52ea478306276e166383da41096d97fb24f363f78387e94e23fdde69e16298ff578249fe05db9d9abc87ff9ca9d930e97fd73dd3637", 0xbe2}, {&(0x7f00000000c0)="6c1df4f1d3cdab5d5b2219c5056a0d9b4decc634d170073dfcaf10b385b827421d8ee439698c27d17b62af93a8789e027be43240a5fb898d31f9b47895021e251fa76bb2fcacb5df906ac47129eb40", 0x4f}, {&(0x7f0000000180)}, {0x0}, {}, {&(0x7f0000001440)="c67df4a5cde696778d541db30b542f49943e27a8f417445c5811361c68e720a1945e186cab1e1058497c57f05b0f6f5a9e60be56dbab63c1984f26ae6b36e55a95e864b89e6be450d08b01ed1a1cfde68984f0a5f56912d1db0b7c2e9b385858c58a393c96f38b303985d3830ca908f32e03fef4afbaee", 0x77}, {&(0x7f0000000300)}], 0x7) preadv(r1, &(0x7f00000017c0), 0x375, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) socket$netlink(0x10, 0x3, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x51f) close(r2) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, 0x0, &(0x7f00000014c0)) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) 08:45:02 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/166, 0xa6}], 0x1) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f00000002c0)) r2 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) dup3(r1, r0, 0x0) tkill(r2, 0x15) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:45:02 executing program 3: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000000040)="24000000220007031dfffd946f61050002000000054300000000391e421ba3a20400ff7e280000001100ffd613d3475bb65f6400004efb0000000000007e23f7efbf54000000005cc37fcfa3", 0x4c}], 0x1}, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, 0x0, 0x0) 08:45:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000700)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb7", 0xa7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 08:45:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000001a00)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x0) dup3(r1, r0, 0x0) 08:45:02 executing program 5: ioprio_set$uid(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) syz_open_dev$ptys(0xc, 0x3, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000cab000)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) socket$nl_xfrm(0x10, 0x3, 0x6) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0xf1, 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 214.681387][ T8253] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 214.718878][ T8257] input: syz0 as /devices/virtual/input/input7 [ 214.761755][ C1] hrtimer: interrupt took 48137 ns [ 214.854337][ T8253] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 08:45:02 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_map={0x60ce}}) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_settings={0xdd, 0x0, @te1=0x0}}) 08:45:02 executing program 3: r0 = socket(0x40000000002, 0x3, 0x80000000002) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge_slave_0\x00', 0xf) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) 08:45:02 executing program 5: ioprio_set$uid(0x0, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 08:45:02 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x200000000204a100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_int(r0, 0x29, 0x1, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1e) wait4(0x0, 0x0, 0x0, 0x0) [ 214.996760][ T8272] input: syz0 as /devices/virtual/input/input8 [ 215.024011][ T8293] raw_sendmsg: syz-executor.3 forgot to set AF_INET. Fix it! 08:45:03 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000600)=[{&(0x7f0000000140)=""/224, 0xe0}], 0x1, 0x0) 08:45:03 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) mkdir(&(0x7f0000000280)='./control\x00', 0x0) read(r0, &(0x7f0000000740)=""/384, 0x180) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) r3 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x2c00) r4 = gettid() fcntl$setown(r0, 0x8, r4) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffc]}, 0x0, 0x8) fcntl$setsig(r0, 0xa, 0x11) inotify_add_watch(r3, &(0x7f0000000180)='./control\x00', 0xa0000b64) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 08:45:03 executing program 4: r0 = memfd_create(&(0x7f0000000180)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000080)=@v2, 0xfe7f, 0x0) 08:45:03 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) 08:45:03 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@remote, 0x0, 0x32}, @in=@local, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x96}, [@algo_crypt={0x48, 0x2, {{'cbc(des3_ede)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 08:45:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000300)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) write$P9_RRENAME(r4, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) 08:45:05 executing program 3: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000140)) syz_open_dev$tty1(0xc, 0x4, 0x1) 08:45:05 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) 08:45:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x200}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 08:45:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='timerslack_ns\x00') writev(r2, &(0x7f0000000000), 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) sendto$inet6(r3, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x6}, 0x1c) 08:45:05 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = socket$inet(0x2, 0xa, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000140)='tmpfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x2042000, &(0x7f0000000500)=ANY=[]) 08:45:05 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7be", 0x10) r1 = accept(r0, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[], 0x190}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmsg(r1, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/73, 0x200000c9}], 0x1}, 0x0) 08:45:05 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x3c, 0x0, 0x0}) [ 217.787995][ T8367] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 217.823333][ T8367] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 08:45:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7be", 0x10) 08:45:05 executing program 1: unshare(0x8000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r5, &(0x7f00000004c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000480), r4, r2}}, 0x18) 08:45:05 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f13000)={0xa, 0x4e22}, 0x1c) syz_emit_ethernet(0x32, &(0x7f0000000080)={@link_local, @dev, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr, @broadcast}, {0x0, 0x4e22, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) 08:45:05 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x21) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2d}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x2, 0x0) 08:45:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0) clone(0x4000008006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/unix\x00') exit(0x0) preadv(r0, &(0x7f0000000500), 0x241, 0x0) 08:45:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7be", 0x10) 08:45:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/445], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x10, 0x0, &(0x7f0000000540)="8d14fb003092bd81ed4e5b534c5747c8", 0x0, 0x1000}, 0x28) [ 218.139586][ T8415] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables 08:45:06 executing program 0: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x23}}, 0x10) 08:45:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7be", 0x10) r1 = accept(r0, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[], 0x190}}, 0x0) recvmsg(r1, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/73, 0x49}], 0x1}, 0x0) 08:45:06 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="ad56b6c5820fae9d6dcd3292ea540900000000000000efb2b5d4d3c292c46861a651ca7a7f6359db86a9d29f75f5cc", 0x2f) 08:45:06 executing program 4: socket$inet6(0xa, 0x80000, 0x7fffffff) r0 = perf_event_open(&(0x7f00000010c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r0, 0xf502, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$FUSE_NOTIFY_STORE(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB="2d00000004000000000000000000000000320000050000e8ffffff0000000000000000000000000000000016ccb61324073d82e33a014009b3e743670baad7bd5d6978bc2a9b151f67e6237b72c0575d08222001aa936aa5cb06aede5c"], 0x2d) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x2e) ioctl$EVIOCSKEYCODE(r2, 0x40084504, &(0x7f0000000080)=[0x1, 0x4]) setsockopt$inet_int(r1, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) write$binfmt_elf32(r1, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x8, 0xf7, 0x3f, 0x9, 0x2, 0x3d, 0x2, 0x0, 0x38, 0x3e3, 0x9, 0x1, 0x20, 0x2, 0x7ff, 0x5}, [{0x4, 0x0, 0xfff, 0x6, 0xe6da, 0x6, 0x200, 0xf0400}, {0x5, 0x7b72, 0x100, 0x3, 0xe63, 0x8, 0x10000, 0xffff9cde}], "873fe9c8dd132f7e9677a1ccb063ed048f4e17db6df3eb16b543dc48f621ed8eb26b70bf4c2387c4472e70113b0662f1e6f85e859e14667c6684b13b9c56c232777231b8acd7b169feade8073e26f0f162af7e17869f420345c2a13ebea13f59f5451eccb1daa3ec4efda175d86021da26774f606feec7007d54c161c93dcacdcd64682838a89476c5bf0252620528c59c1390ad2674b64cb3dbb138d6ea388c44bc566718e3c25a45ef9d422cff8afdaad2a54a0e598b7db2d2ef", [[], [], [], [], []]}, 0x633) r3 = socket$inet(0x2, 0x3, 0x2) r4 = getpid() write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x6, {{0x8, 0x0, 0x0, r4}}}, 0x28) setsockopt$inet_int(r3, 0x0, 0xcb, &(0x7f0000000000)=0x10001, 0x10) add_key$user(&(0x7f0000000280)='user\x00', 0x0, &(0x7f0000000000)="03", 0x1, 0xfffffffffffffffd) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, 0x0) 08:45:06 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000001a40)='/dev/mixer\x00', 0x0, 0x0) ioctl$mixer_OSS_GETVERSION(r0, 0x80044df9, 0x0) 08:45:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="ad56b6c5820fae9d6dcd3292ea54090000", 0x11) 08:45:06 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x2) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/netstat\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0) 08:45:06 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000002c80)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)="f69a4243474c97969716db59f46df0e292915a4277800372c30d87558b7164bbf2d571c5503e0000", 0x28}], 0x1}}], 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x6}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000002c80), 0x1, 0x0) 08:45:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7be", 0x10) r1 = accept(r0, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[], 0x190}}, 0x0) recvmsg(r1, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/73, 0x200000c9}], 0x1}, 0x0) 08:45:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x9) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0) clone(0x4000008006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/unix\x00') exit(0x0) preadv(r0, &(0x7f0000000500), 0x241, 0x0) 08:45:07 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000001a40)='/dev/mixer\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x0) ftruncate(r4, 0x1000000) sendfile(r3, r4, &(0x7f00000000c0)=0xf18001, 0xeefffdef) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r4, &(0x7f0000000000)={0x20000001}) ioctl$mixer_OSS_GETVERSION(r0, 0x80044d76, &(0x7f0000000400)) 08:45:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f00000001c0)) 08:45:07 executing program 3: getpid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x2004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, @perf_config_ext={0xffffffffffffffff, 0xd1}, 0x5d828, 0x0, 0x0, 0x1, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, &(0x7f00000001c0)=""/91) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000240)="400f1af4660f38826900b9800000c00f3235000400000f30c4234d6b05fb80000016f246ab400f3801203e440fc71f410f092e2e3d0fc75c7ffc353520e035200000000f22a0", 0x46}], 0x1, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='io\x00') ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 219.377016][ T8473] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 08:45:07 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) 08:45:07 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/netstat\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) 08:45:07 executing program 0: 08:45:07 executing program 2: 08:45:07 executing program 0: 08:45:07 executing program 2: 08:45:07 executing program 0: 08:45:08 executing program 5: 08:45:08 executing program 3: 08:45:08 executing program 2: 08:45:08 executing program 1: 08:45:08 executing program 0: 08:45:08 executing program 2: 08:45:08 executing program 4: 08:45:08 executing program 1: 08:45:08 executing program 0: 08:45:08 executing program 3: 08:45:08 executing program 5: 08:45:08 executing program 2: 08:45:08 executing program 2: 08:45:08 executing program 5: 08:45:08 executing program 1: 08:45:08 executing program 3: 08:45:08 executing program 4: 08:45:08 executing program 0: 08:45:08 executing program 3: 08:45:08 executing program 5: 08:45:08 executing program 2: 08:45:08 executing program 0: 08:45:08 executing program 1: 08:45:08 executing program 4: 08:45:08 executing program 3: 08:45:08 executing program 5: 08:45:08 executing program 2: 08:45:08 executing program 0: 08:45:08 executing program 4: 08:45:08 executing program 1: 08:45:08 executing program 5: 08:45:08 executing program 3: 08:45:08 executing program 0: 08:45:08 executing program 2: 08:45:08 executing program 1: 08:45:08 executing program 4: 08:45:08 executing program 5: 08:45:08 executing program 3: 08:45:08 executing program 0: 08:45:09 executing program 2: 08:45:09 executing program 1: 08:45:09 executing program 4: 08:45:09 executing program 0: 08:45:09 executing program 3: 08:45:09 executing program 5: 08:45:09 executing program 2: 08:45:09 executing program 1: 08:45:09 executing program 4: 08:45:09 executing program 3: 08:45:09 executing program 2: 08:45:09 executing program 1: 08:45:09 executing program 5: 08:45:09 executing program 0: 08:45:09 executing program 5: 08:45:09 executing program 3: 08:45:09 executing program 4: 08:45:09 executing program 2: 08:45:09 executing program 1: 08:45:09 executing program 0: 08:45:09 executing program 3: 08:45:09 executing program 1: 08:45:09 executing program 2: 08:45:09 executing program 0: 08:45:09 executing program 4: 08:45:09 executing program 5: 08:45:09 executing program 1: 08:45:09 executing program 3: 08:45:09 executing program 2: 08:45:09 executing program 0: 08:45:09 executing program 4: 08:45:09 executing program 5: 08:45:09 executing program 1: 08:45:09 executing program 3: 08:45:09 executing program 4: 08:45:09 executing program 2: 08:45:09 executing program 5: 08:45:09 executing program 0: 08:45:09 executing program 2: 08:45:09 executing program 0: 08:45:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xb8, &(0x7f0000000240)="c4fe910700001a0b000000000000e07bee6333b5cacd891969b61832cb470c94d61f3514dca771f3321613602c22bee39d365da4a455f4c9fd98ec346760c7bae64d3d00f80a16eb9067a568097aa4c3d6ecd74d473ff2bdb969312256c959b23dc67ef8a112b1101ff70ba1b1ea9eccc4d20091612f4738fd8472c841a30df0ccd5f3caa33b2ce49cf406000000000000002a6f8bc4c94a0a104ab4fb3b4bc679f40402e29bbd9f8a29e27a1dea45b217db6e5ad12abff8"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:45:09 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x7e, &(0x7f0000000a40)={@broadcast=[0xff, 0xff, 0xff, 0x0], @random="f674049167a6", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0x48, 0x4, 0x0, @empty={[0x3, 0x3c]}, @mcast2, {[], @time_exceed={0x3, 0x0, 0x0, 0x0, [], {0x0, 0x6, "389c47", 0x0, 0x0, 0x0, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [@hopopts={0x2c, 0x1, [], [@calipso={0x7, 0x8}, @generic={0x1f}]}]}}}}}}}, 0x0) 08:45:09 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xcf, &(0x7f0000000240)="c4fe910700001a0b000000000000e07bee6333b5cacd891969b61832cb470c94d61f3514dca771f3321613602c22bee39d365da4a455f4c9fd98ec346760c7bae64d3d00f80a16eb9067a568097aa4c3d6ecd74d473ff2bdb969312256c959b23dc67ef8a112b1101ff70ba1b1ea9eccc4d20091612f4738fd8472c841a30df0ccd5f3caa33b2ce49cf406000000000000002a6f8bc4c94a0a104ab4fb3b4bc679f40402e29bbd9f8a29e27a1dea45b217db6e5ad12abff8074596b321dd7032fe4150623853eb04efa7479a2bf7bb"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x17) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 08:45:09 executing program 1: syz_emit_ethernet(0x7e, &(0x7f0000000a40)={@broadcast=[0xff, 0xff, 0xff, 0x0], @random="f674049167a6", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0x2, 0x4, 0x0, @empty={[0x3, 0x3c]}, @mcast2, {[], @time_exceed={0x3, 0x0, 0x0, 0x0, [], {0x0, 0x6, "389c47", 0x0, 0x0, 0x0, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [@hopopts={0x0, 0x1, [], [@calipso={0x7, 0x8}, @pad1, @generic]}]}}}}}}}, 0x0) 08:45:09 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) 08:45:09 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 08:45:09 executing program 2: syz_emit_ethernet(0x83, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaad06caaaa86dd601bfc97004d8880fe800001000000000000000000000600ff05"], 0x0) 08:45:09 executing program 5: syz_mount_image$ntfs(&(0x7f0000000580)='ntfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001ac0)={[{@errors_continue='errors=continue'}]}) 08:45:10 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000040)={'icmp6\x00'}, &(0x7f0000000080)=0x1e) 08:45:10 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x110}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 08:45:10 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x6c, &(0x7f0000000240)="c4fe910700001a0b000000000000e07bee6333b5cacd891969b61832cb470c94d61f3514dca771f3321613602c22bee39d365da4a455f4c9fd98ec346760c7bae64d3d00f80a16eb9067a568097aa4c3d6ecd74d473ff2bdb969312256c959b23dc67ef8a112b1101ff70ba1"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x17) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 08:45:10 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) recvmmsg(r0, &(0x7f0000003b80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 222.112111][ T8643] ntfs: (device loop5): parse_options(): Unrecognized mount option . [ 222.182750][ T8643] ntfs: (device loop5): parse_options(): Unrecognized mount option . 08:45:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02000035000523d25a80648c63940d0224fc60100002400a000200051a82c137153e670402098010000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:45:12 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x97, &(0x7f0000000240)="c4fe910700001a0b000000000000e07bee6333b5cacd891969b61832cb470c94d61f3514dca771f3321613602c22bee39d365da4a455f4c9fd98ec346760c7bae64d3d00f80a16eb9067a568097aa4c3d6ecd74d473ff2bdb969312256c959b23dc67ef8a112b1101ff70ba1b1ea9eccc4d20091612f4738fd8472c841a30df0ccd5f3caa33b2ce49cf406000000000000002a6f8bc4c9"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x17) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 08:45:12 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000000a40)={@broadcast=[0xff, 0xff, 0xff, 0x0], @random="f674049167a6", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0x68, 0x33, 0x0, @empty={[0x3, 0x3c]}, @mcast2, {[], @time_exceed={0x3, 0x0, 0x0, 0x0, [], {0x0, 0x6, "389c47", 0x0, 0x2f, 0x0, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [@hopopts={0x2c, 0x5, [], [@hao={0xc9, 0x10, @empty}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x6]}}]}]}}}}}}}, 0x0) 08:45:12 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x1, 0x0) write$fb(r0, 0x0, 0x0) 08:45:12 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={[{@nls={'nls', 0x3d, 'maciceland'}}]}) 08:45:12 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x10b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 08:45:12 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x86, &(0x7f0000000a40)={@broadcast=[0xff, 0xff, 0xff, 0x0], @random="f674049167a6", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0x50, 0x33, 0x0, @empty={[0x3, 0x3c]}, @mcast2, {[], @time_exceed={0x3, 0x0, 0x0, 0x0, [], {0x0, 0x6, "389c47", 0x0, 0x0, 0x0, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [@hopopts={0x2c, 0x2, [], [@hao={0xc9, 0x10, @empty}, @pad1]}]}}}}}}}, 0x0) 08:45:12 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 224.997138][ T8681] hfsplus: unable to find HFS+ superblock 08:45:13 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x86, &(0x7f0000000a40)={@broadcast=[0xff, 0xff, 0xff, 0x0], @random="f674049167a6", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0x50, 0x33, 0x0, @empty={[0x3, 0x3c]}, @mcast2, {[], @time_exceed={0x3, 0x0, 0x0, 0x0, [], {0x0, 0x6, "389c47", 0x0, 0x0, 0x0, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [@hopopts={0x2c, 0x2, [], [@hao={0xc9, 0x10, @empty}, @pad1]}]}}}}}}}, 0x0) [ 225.065183][ T8681] hfsplus: unable to find HFS+ superblock 08:45:13 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02000035000535d25a80648c63940d0324fc60100002400a000200051a82c137153e670402098010000000d1bd", 0x33fe0}], 0x1}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001400)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000240)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl0\x00', r6, 0x29, 0x5, 0x80, 0x80000000, 0x7a, @private0={0xfc, 0x0, [], 0x1}, @private2={0xfc, 0x2, [], 0x1}, 0x40, 0x7800, 0x7, 0xffffffff}}) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r8, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xfffffffffffffd19, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r9, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000000000003337e690e3316cc2"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], r7, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x69f2b14}, 0x10, r9}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x10, &(0x7f0000000240)={&(0x7f0000000140)=""/225, 0xe1, r9}}, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02000035000535d25a80648c63940d0324fc60100002400a000200051a82c137153e670402098010000000d1bd", 0x33fe0}], 0x1}, 0x0) r10 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r10, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02000035000535d25a80648c63940d0324fc60100002400a000200051a82c137153e670402098010000000d1bd", 0x33fe0}], 0x1}, 0x0) syz_emit_ethernet(0x83, &(0x7f00000000c0)=ANY=[@ANYRES16=r10, @ANYRES32=r0, @ANYRESDEC, @ANYRES16], 0x0) 08:45:13 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000580)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f99", 0xb0}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) 08:45:13 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, 0x0, 0x0) 08:45:13 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x12e, &(0x7f0000000a40)={@broadcast=[0xff, 0xff, 0xff, 0x0], @random="f674049167a6", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0xf8, 0x3a, 0x0, @empty={[0x3, 0x3c]}, @mcast2, {[], @time_exceed={0x3, 0x0, 0x0, 0x0, [], {0x0, 0x6, "389c47", 0x0, 0x2f, 0x0, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [@hopopts={0x0, 0x18, [], [@hao={0xc9, 0x10, @empty}, @calipso={0x7, 0x20, {0x0, 0x6, 0x0, 0x0, [0x0, 0x0, 0x0]}}, @pad1, @generic={0x0, 0x87, "13192ff5fc28461e7271a9fed5b74c777ff5eee0a1e91f1fbfede029da682833bde21219ac7729a934cfa8ff28c87645460325f38d7d26717de17a9a7dec2d0850c302c4555b0f0245b8faf481d1b2c547d5c6279eeed19e89681af059e9bfe23c1632975a72c174f3687a33e65d6c59d2e051e79fc3c396b6066de341073a66276e7038461dda"}]}]}}}}}}}, 0x0) [ 225.274966][ T8723] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 225.331992][ T8723] netlink: 'syz-executor.2': attribute type 9 has an invalid length. [ 225.340071][ T8723] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.2'. [ 225.427620][ T8723] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 225.435932][ T8723] netlink: 'syz-executor.2': attribute type 9 has an invalid length. [ 225.445304][ T8723] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.2'. [ 225.462394][ T8723] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 225.470649][ T8723] netlink: 'syz-executor.2': attribute type 9 has an invalid length. [ 225.480039][ T8723] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.2'. [ 225.514780][ T8723] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 225.525878][ T8723] netlink: 'syz-executor.2': attribute type 9 has an invalid length. [ 225.535388][ T8723] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.2'. [ 225.555318][ T8744] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 225.583295][ T8744] netlink: 'syz-executor.2': attribute type 9 has an invalid length. [ 225.591468][ T8744] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.2'. [ 225.603172][ T8734] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.2'. 08:45:15 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000009c0)={'filter\x00'}, &(0x7f0000000a40)=0x44) 08:45:15 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) write$binfmt_script(r0, 0x0, 0x0) 08:45:15 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/dev\x00') preadv(r0, &(0x7f0000001300)=[{&(0x7f0000000800)=""/142, 0xffffff07}], 0x1, 0xfff) 08:45:15 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f0000000a40)={@broadcast=[0xff, 0xff, 0xff, 0x0], @random="f674049167a6", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0x30, 0x6, 0x0, @empty={[0x3, 0x3c]}, @mcast2, {[], @time_exceed={0x3, 0x0, 0x0, 0x0, [], {0x0, 0x6, "389c47", 0x0, 0x0, 0x0, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}}}}}, 0x0) 08:45:16 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x2ab, 0x0, 0x0, 0x0, &(0x7f0000000380)) 08:45:16 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02000035000523d25a80648c63940d0324fc60586502400a000a00051a82c137153e670402098010000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:45:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02000035000523d25a80648c63940d0324fc60100002400a000200051a82c137153e670400098010000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:45:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') preadv(r1, &(0x7f0000001300)=[{&(0x7f0000000800)=""/142, 0xffffff07}], 0x1, 0xfff) 08:45:16 executing program 2: 08:45:16 executing program 5: 08:45:16 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 08:45:16 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x7e, &(0x7f0000000a40)={@broadcast=[0xff, 0xff, 0xff, 0x0], @random="f674049167a6", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0x48, 0x4, 0x0, @empty={[0x3, 0x3c]}, @mcast2, {[], @time_exceed={0x3, 0x0, 0x0, 0x0, [], {0x0, 0x6, "389c47", 0x0, 0x2f, 0x0, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [@hopopts={0x0, 0x1, [], [@calipso={0x7, 0x8}, @pad1, @generic]}]}}}}}}}, 0x0) 08:45:16 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x86, &(0x7f0000000a40)={@broadcast=[0xff, 0xff, 0xff, 0x0], @random="f674049167a6", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0x50, 0x3a, 0x0, @empty={[0x3, 0x3c]}, @mcast2, {[], @time_exceed={0x3, 0x0, 0x0, 0x0, [], {0x0, 0x6, "389c47", 0x0, 0x11, 0x0, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [@hopopts={0x0, 0x2, [], [@hao={0xc9, 0x10, @empty}]}]}}}}}}}, 0x0) [ 228.220102][ T8770] attempt to access beyond end of device [ 228.260166][ T8770] loop3: rw=2048, want=3, limit=1 08:45:16 executing program 5: fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02000035000535d25a80648c63940d0324fc60100002400a000200051a82c137153e670402098010000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:45:16 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x12e, &(0x7f0000000a40)={@broadcast=[0xff, 0xff, 0xff, 0x0], @random="f674049167a6", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0x2, 0x3a, 0x0, @empty={[0x3, 0x3c]}, @mcast2, {[], @time_exceed={0x3, 0x0, 0x0, 0x0, [], {0x0, 0x6, "389c47", 0x0, 0x2f, 0x0, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [@hopopts={0x2c, 0x18, [], [@hao={0xc9, 0x10, @empty}, @calipso={0x7, 0x20, {0x0, 0x6, 0x0, 0x0, [0x0, 0x0, 0x6]}}, @pad1, @generic={0x0, 0x87, "13192ff5fc28461e7271a9fed5b74c777ff5eee0a1e91f1fbfede029da682833bde21219ac7729a934cfa8ff28c87645460325f38d7d26717de17a9a7dec2d0850c302c4555b0f0245b8faf481d1b2c547d5c6279eeed19e89681af059e9bfe23c1632975a72c174f3687a33e65d6c59d2e051e79fc3c396b6066de341073a66276e7038461dda"}]}]}}}}}}}, 0x0) [ 228.271025][ T8770] hfsplus: unable to find HFS+ superblock [ 228.285576][ T8778] ================================================================== [ 228.293833][ T8778] BUG: KASAN: slab-out-of-bounds in __xfrm6_tunnel_spi_lookup+0x3a9/0x3b0 [ 228.302325][ T8778] Read of size 8 at addr ffff888097e67df8 by task syz-executor.2/8778 [ 228.310484][ T8778] CPU: 0 PID: 8778 Comm: syz-executor.2 Not tainted 5.8.0-rc5-next-20200716-syzkaller #0 [ 228.320271][ T8778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 228.330304][ T8778] Call Trace: [ 228.333582][ T8778] dump_stack+0x18f/0x20d [ 228.337905][ T8778] ? __xfrm6_tunnel_spi_lookup+0x3a9/0x3b0 [ 228.343687][ T8778] ? __xfrm6_tunnel_spi_lookup+0x3a9/0x3b0 [ 228.349477][ T8778] print_address_description.constprop.0.cold+0xae/0x497 [ 228.356493][ T8778] ? lockdep_hardirqs_off+0x66/0xa0 [ 228.361668][ T8778] ? vprintk_func+0x97/0x1a6 [ 228.366231][ T8778] ? __xfrm6_tunnel_spi_lookup+0x3a9/0x3b0 [ 228.372015][ T8778] ? __xfrm6_tunnel_spi_lookup+0x3a9/0x3b0 [ 228.377809][ T8778] kasan_report.cold+0x1f/0x37 [ 228.382558][ T8778] ? __xfrm6_tunnel_spi_lookup+0x3a9/0x3b0 [ 228.388506][ T8778] __xfrm6_tunnel_spi_lookup+0x3a9/0x3b0 [ 228.394114][ T8778] xfrm6_tunnel_spi_lookup+0x8a/0x1d0 [ 228.399465][ T8778] xfrmi6_rcv_tunnel+0xb9/0x100 [ 228.404291][ T8778] tunnel46_rcv+0xef/0x2b0 [ 228.408694][ T8778] ip6_protocol_deliver_rcu+0x2e8/0x1670 [ 228.414308][ T8778] ip6_input_finish+0x7f/0x160 [ 228.419042][ T8778] ip6_input+0x9c/0xd0 [ 228.423100][ T8778] ip6_mc_input+0x411/0xea0 [ 228.427600][ T8778] ? ip6_input+0xd0/0xd0 [ 228.431821][ T8778] ? lock_is_held_type+0xb0/0xe0 [ 228.436730][ T8778] ipv6_rcv+0x28e/0x3c0 [ 228.440865][ T8778] ? ip6_rcv_core+0x1bb0/0x1bb0 [ 228.445701][ T8778] __netif_receive_skb_one_core+0x114/0x180 [ 228.451573][ T8778] ? __netif_receive_skb_core+0x3690/0x3690 [ 228.457447][ T8778] ? lockdep_hardirqs_on+0x6a/0xe0 [ 228.462533][ T8778] ? read_seqcount_begin.constprop.0+0x139/0x1f0 [ 228.468835][ T8778] ? ktime_get_with_offset+0x130/0x1a0 [ 228.474267][ T8778] __netif_receive_skb+0x27/0x1c0 [ 228.479262][ T8778] netif_receive_skb+0x159/0x990 [ 228.484169][ T8778] ? __netif_receive_skb+0x1c0/0x1c0 [ 228.489425][ T8778] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 228.495377][ T8778] ? kvm_sched_clock_read+0x14/0x40 [ 228.500545][ T8778] ? sched_clock+0x2a/0x40 [ 228.504933][ T8778] ? sched_clock_cpu+0x18/0x1b0 [ 228.509755][ T8778] ? sched_clock_cpu+0x18/0x1b0 [ 228.514594][ T8778] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 228.520738][ T8778] tun_rx_batched.isra.0+0x460/0x720 [ 228.526011][ T8778] ? tun_get_user+0x197f/0x35b0 [ 228.530836][ T8778] ? tun_sock_write_space+0x1d0/0x1d0 [ 228.536181][ T8778] ? lock_release+0x8d0/0x8d0 [ 228.540840][ T8778] ? tun_get_user+0x231f/0x35b0 [ 228.545682][ T8778] ? __local_bh_enable_ip+0x159/0x250 [ 228.551030][ T8778] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 228.556987][ T8778] ? tun_get_user+0x231f/0x35b0 [ 228.561820][ T8778] ? trace_hardirqs_on+0x5f/0x220 [ 228.566825][ T8778] tun_get_user+0x23b2/0x35b0 [ 228.571479][ T8778] ? tun_build_skb+0xf30/0xf30 [ 228.576227][ T8778] ? tun_get+0x160/0x280 [ 228.580455][ T8778] tun_chr_write_iter+0xba/0x151 [ 228.585373][ T8778] new_sync_write+0x422/0x650 [ 228.590036][ T8778] ? new_sync_read+0x6e0/0x6e0 [ 228.594811][ T8778] ? lock_downgrade+0x820/0x820 [ 228.599689][ T8778] ? apparmor_file_permission+0x26e/0x4e0 [ 228.605399][ T8778] vfs_write+0x5c6/0x6f0 [ 228.609637][ T8778] ksys_write+0x12d/0x250 [ 228.613956][ T8778] ? __ia32_sys_read+0xb0/0xb0 [ 228.618688][ T8778] ? lock_is_held_type+0xb0/0xe0 [ 228.623597][ T8778] ? do_syscall_64+0x1c/0xe0 [ 228.628293][ T8778] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 228.634247][ T8778] do_syscall_64+0x60/0xe0 [ 228.638635][ T8778] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 228.644499][ T8778] RIP: 0033:0x415c91 [ 228.648368][ T8778] Code: Bad RIP value. [ 228.652417][ T8778] RSP: 002b:00007fd072141c60 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 228.660800][ T8778] RAX: ffffffffffffffda RBX: 000000000078bf00 RCX: 0000000000415c91 [ 228.668743][ T8778] RDX: 000000000000007e RSI: 0000000020000a40 RDI: 00000000000000f0 [ 228.676688][ T8778] RBP: 000000000078bf40 R08: 0000000000000000 R09: 0000000000000000 [ 228.684628][ T8778] R10: 0000000000000000 R11: 0000000000000293 R12: 000000000078bf0c [ 228.692573][ T8778] R13: 00007ffda1f3230f R14: 00007fd0721429c0 R15: 000000000078bf0c [ 228.700549][ T8778] Allocated by task 7013: [ 228.704867][ T8778] kasan_save_stack+0x1b/0x40 [ 228.709511][ T8778] __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 228.715112][ T8778] __kmalloc+0x1a8/0x320 [ 228.719349][ T8778] ops_init+0xfb/0x470 [ 228.723395][ T8778] setup_net+0x2d8/0x850 [ 228.727606][ T8778] copy_net_ns+0x2cf/0x5e0 [ 228.732009][ T8778] create_new_namespaces+0x3f6/0xb10 [ 228.737289][ T8778] unshare_nsproxy_namespaces+0xbd/0x1f0 [ 228.742907][ T8778] ksys_unshare+0x445/0x8e0 [ 228.747382][ T8778] __x64_sys_unshare+0x2d/0x40 [ 228.752113][ T8778] do_syscall_64+0x60/0xe0 [ 228.756500][ T8778] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 228.762363][ T8778] The buggy address belongs to the object at ffff888097e67c00 [ 228.762363][ T8778] which belongs to the cache kmalloc-512 of size 512 [ 228.776383][ T8778] The buggy address is located 504 bytes inside of [ 228.776383][ T8778] 512-byte region [ffff888097e67c00, ffff888097e67e00) [ 228.789618][ T8778] The buggy address belongs to the page: [ 228.795239][ T8778] page:00000000bf1c67ae refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888097e67000 pfn:0x97e67 [ 228.806653][ T8778] flags: 0xfffe0000000200(slab) [ 228.811477][ T8778] raw: 00fffe0000000200 ffffea00025eb1c8 ffffea00025b8c88 ffff8880aa000600 [ 228.820044][ T8778] raw: ffff888097e67000 ffff888097e67000 0000000100000003 0000000000000000 [ 228.828606][ T8778] page dumped because: kasan: bad access detected [ 228.834987][ T8778] Memory state around the buggy address: [ 228.840589][ T8778] ffff888097e67c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 228.848623][ T8778] ffff888097e67d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 228.856661][ T8778] >ffff888097e67d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 228.864693][ T8778] ^ [ 228.872637][ T8778] ffff888097e67e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 228.880670][ T8778] ffff888097e67e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 228.888713][ T8778] ================================================================== [ 228.896741][ T8778] Disabling lock debugging due to kernel taint [ 228.902924][ T8778] Kernel panic - not syncing: panic_on_warn set ... [ 228.909625][ T8778] CPU: 0 PID: 8778 Comm: syz-executor.2 Tainted: G B 5.8.0-rc5-next-20200716-syzkaller #0 [ 228.920816][ T8778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 228.930857][ T8778] Call Trace: [ 228.934130][ T8778] dump_stack+0x18f/0x20d [ 228.938427][ T8778] ? __xfrm6_tunnel_spi_lookup+0x2f0/0x3b0 [ 228.944198][ T8778] panic+0x2e3/0x75c [ 228.948060][ T8778] ? __warn_printk+0xf3/0xf3 [ 228.952617][ T8778] ? __xfrm6_tunnel_spi_lookup+0x3a9/0x3b0 [ 228.958402][ T8778] ? trace_hardirqs_on+0x55/0x220 [ 228.963402][ T8778] ? __xfrm6_tunnel_spi_lookup+0x3a9/0x3b0 [ 228.969173][ T8778] ? __xfrm6_tunnel_spi_lookup+0x3a9/0x3b0 [ 228.974946][ T8778] end_report+0x4d/0x53 [ 228.979087][ T8778] kasan_report.cold+0xd/0x37 [ 228.983731][ T8778] ? __xfrm6_tunnel_spi_lookup+0x3a9/0x3b0 [ 228.989503][ T8778] __xfrm6_tunnel_spi_lookup+0x3a9/0x3b0 [ 228.995105][ T8778] xfrm6_tunnel_spi_lookup+0x8a/0x1d0 [ 229.000448][ T8778] xfrmi6_rcv_tunnel+0xb9/0x100 [ 229.005280][ T8778] tunnel46_rcv+0xef/0x2b0 [ 229.009698][ T8778] ip6_protocol_deliver_rcu+0x2e8/0x1670 [ 229.015311][ T8778] ip6_input_finish+0x7f/0x160 [ 229.020050][ T8778] ip6_input+0x9c/0xd0 [ 229.024094][ T8778] ip6_mc_input+0x411/0xea0 [ 229.028562][ T8778] ? ip6_input+0xd0/0xd0 [ 229.032778][ T8778] ? lock_is_held_type+0xb0/0xe0 [ 229.037688][ T8778] ipv6_rcv+0x28e/0x3c0 [ 229.041814][ T8778] ? ip6_rcv_core+0x1bb0/0x1bb0 [ 229.046643][ T8778] __netif_receive_skb_one_core+0x114/0x180 [ 229.052513][ T8778] ? __netif_receive_skb_core+0x3690/0x3690 [ 229.058370][ T8778] ? lockdep_hardirqs_on+0x6a/0xe0 [ 229.063459][ T8778] ? read_seqcount_begin.constprop.0+0x139/0x1f0 [ 229.069760][ T8778] ? ktime_get_with_offset+0x130/0x1a0 [ 229.075192][ T8778] __netif_receive_skb+0x27/0x1c0 [ 229.080187][ T8778] netif_receive_skb+0x159/0x990 [ 229.085095][ T8778] ? __netif_receive_skb+0x1c0/0x1c0 [ 229.090354][ T8778] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 229.096305][ T8778] ? kvm_sched_clock_read+0x14/0x40 [ 229.101488][ T8778] ? sched_clock+0x2a/0x40 [ 229.105872][ T8778] ? sched_clock_cpu+0x18/0x1b0 [ 229.110690][ T8778] ? sched_clock_cpu+0x18/0x1b0 [ 229.115514][ T8778] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 229.121648][ T8778] tun_rx_batched.isra.0+0x460/0x720 [ 229.126899][ T8778] ? tun_get_user+0x197f/0x35b0 [ 229.131718][ T8778] ? tun_sock_write_space+0x1d0/0x1d0 [ 229.137062][ T8778] ? lock_release+0x8d0/0x8d0 [ 229.141706][ T8778] ? tun_get_user+0x231f/0x35b0 [ 229.146536][ T8778] ? __local_bh_enable_ip+0x159/0x250 [ 229.151876][ T8778] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 229.157824][ T8778] ? tun_get_user+0x231f/0x35b0 [ 229.162642][ T8778] ? trace_hardirqs_on+0x5f/0x220 [ 229.167632][ T8778] tun_get_user+0x23b2/0x35b0 [ 229.172281][ T8778] ? tun_build_skb+0xf30/0xf30 [ 229.177012][ T8778] ? tun_get+0x160/0x280 [ 229.181227][ T8778] tun_chr_write_iter+0xba/0x151 [ 229.186150][ T8778] new_sync_write+0x422/0x650 [ 229.190794][ T8778] ? new_sync_read+0x6e0/0x6e0 [ 229.195528][ T8778] ? lock_downgrade+0x820/0x820 [ 229.200353][ T8778] ? apparmor_file_permission+0x26e/0x4e0 [ 229.206049][ T8778] vfs_write+0x5c6/0x6f0 [ 229.210267][ T8778] ksys_write+0x12d/0x250 [ 229.214573][ T8778] ? __ia32_sys_read+0xb0/0xb0 [ 229.219322][ T8778] ? lock_is_held_type+0xb0/0xe0 [ 229.224228][ T8778] ? do_syscall_64+0x1c/0xe0 [ 229.228788][ T8778] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 229.234739][ T8778] do_syscall_64+0x60/0xe0 [ 229.239128][ T8778] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 229.244985][ T8778] RIP: 0033:0x415c91 [ 229.248842][ T8778] Code: Bad RIP value. [ 229.252876][ T8778] RSP: 002b:00007fd072141c60 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 229.261257][ T8778] RAX: ffffffffffffffda RBX: 000000000078bf00 RCX: 0000000000415c91 [ 229.269197][ T8778] RDX: 000000000000007e RSI: 0000000020000a40 RDI: 00000000000000f0 [ 229.277141][ T8778] RBP: 000000000078bf40 R08: 0000000000000000 R09: 0000000000000000 [ 229.285081][ T8778] R10: 0000000000000000 R11: 0000000000000293 R12: 000000000078bf0c [ 229.293021][ T8778] R13: 00007ffda1f3230f R14: 00007fd0721429c0 R15: 000000000078bf0c [ 229.302135][ T8778] Kernel Offset: disabled [ 229.306452][ T8778] Rebooting in 86400 seconds..