[ 64.718452][ T27] audit: type=1800 audit(1585028379.843:25): pid=9448 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 64.756534][ T27] audit: type=1800 audit(1585028379.843:26): pid=9448 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 64.792545][ T27] audit: type=1800 audit(1585028379.843:27): pid=9448 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 65.287752][ T9515] sshd (9515) used greatest stack depth: 23432 bytes left [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.156' (ECDSA) to the list of known hosts. 2020/03/24 05:39:50 fuzzer started 2020/03/24 05:39:52 dialing manager at 10.128.0.26:40805 2020/03/24 05:39:52 syscalls: 2996 2020/03/24 05:39:52 code coverage: enabled 2020/03/24 05:39:52 comparison tracing: enabled 2020/03/24 05:39:52 extra coverage: enabled 2020/03/24 05:39:52 setuid sandbox: enabled 2020/03/24 05:39:52 namespace sandbox: enabled 2020/03/24 05:39:52 Android sandbox: /sys/fs/selinux/policy does not exist 2020/03/24 05:39:52 fault injection: enabled 2020/03/24 05:39:52 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/03/24 05:39:52 net packet injection: enabled 2020/03/24 05:39:52 net device setup: enabled 2020/03/24 05:39:52 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/03/24 05:39:52 devlink PCI setup: PCI device 0000:00:10.0 is not available 05:40:54 executing program 0: 05:40:54 executing program 1: syzkaller login: [ 139.511480][ T9616] IPVS: ftp: loaded support on port[0] = 21 [ 139.643769][ T9616] chnl_net:caif_netlink_parms(): no params data found [ 139.777325][ T9616] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.785220][ T9616] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.794149][ T9616] device bridge_slave_0 entered promiscuous mode [ 139.806521][ T9616] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.813683][ T9616] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.822816][ T9616] device bridge_slave_1 entered promiscuous mode [ 139.850006][ T9622] IPVS: ftp: loaded support on port[0] = 21 [ 139.850438][ T9616] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 139.869471][ T9616] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 05:40:55 executing program 2: [ 139.898376][ T9616] team0: Port device team_slave_0 added [ 139.930445][ T9616] team0: Port device team_slave_1 added [ 139.990790][ T9616] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 140.007267][ T9616] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 140.057262][ T9616] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 140.099206][ T9616] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 140.106212][ T9616] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 140.133360][ T9616] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 140.151105][ T9624] IPVS: ftp: loaded support on port[0] = 21 05:40:55 executing program 3: [ 140.331215][ T9616] device hsr_slave_0 entered promiscuous mode 05:40:55 executing program 4: [ 140.386803][ T9616] device hsr_slave_1 entered promiscuous mode [ 140.488652][ T9622] chnl_net:caif_netlink_parms(): no params data found [ 140.517584][ T9627] IPVS: ftp: loaded support on port[0] = 21 05:40:55 executing program 5: [ 140.824993][ T9632] IPVS: ftp: loaded support on port[0] = 21 [ 140.842682][ T9622] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.860598][ T9622] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.871085][ T9622] device bridge_slave_0 entered promiscuous mode [ 140.919103][ T9622] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.926222][ T9622] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.939818][ T9622] device bridge_slave_1 entered promiscuous mode [ 141.004556][ T9622] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 141.019267][ T9624] chnl_net:caif_netlink_parms(): no params data found [ 141.052654][ T9622] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 141.085135][ T9622] team0: Port device team_slave_0 added [ 141.093789][ T9622] team0: Port device team_slave_1 added [ 141.112753][ T9627] chnl_net:caif_netlink_parms(): no params data found [ 141.153091][ T9622] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 141.160189][ T9622] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 141.193393][ T9622] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 141.218796][ T9636] IPVS: ftp: loaded support on port[0] = 21 [ 141.235129][ T9616] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 141.291334][ T9616] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 141.350404][ T9622] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 141.357988][ T9622] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 141.384369][ T9622] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 141.438908][ T9616] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 141.506460][ T9616] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 141.619130][ T9622] device hsr_slave_0 entered promiscuous mode [ 141.656830][ T9622] device hsr_slave_1 entered promiscuous mode [ 141.706658][ T9622] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 141.715151][ T9622] Cannot create hsr debugfs directory [ 141.726150][ T9624] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.733373][ T9624] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.743966][ T9624] device bridge_slave_0 entered promiscuous mode [ 141.771170][ T9627] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.781165][ T9627] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.790354][ T9627] device bridge_slave_0 entered promiscuous mode [ 141.813719][ T9624] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.824840][ T9624] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.832883][ T9624] device bridge_slave_1 entered promiscuous mode [ 141.853521][ T9627] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.863350][ T9627] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.871544][ T9627] device bridge_slave_1 entered promiscuous mode [ 141.917008][ T9624] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 141.970860][ T9627] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 141.985356][ T9627] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 142.000279][ T9624] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 142.053329][ T9624] team0: Port device team_slave_0 added [ 142.059853][ T9632] chnl_net:caif_netlink_parms(): no params data found [ 142.094368][ T9624] team0: Port device team_slave_1 added [ 142.113472][ T9627] team0: Port device team_slave_0 added [ 142.155486][ T9624] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 142.163093][ T9624] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 142.191834][ T9624] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 142.205397][ T9627] team0: Port device team_slave_1 added [ 142.248170][ T9624] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 142.256274][ T9624] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 142.284090][ T9624] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 142.296097][ T9627] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 142.304237][ T9627] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 142.331436][ T9627] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 142.386938][ T9627] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 142.393926][ T9627] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 142.422340][ T9627] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 142.477031][ T9636] chnl_net:caif_netlink_parms(): no params data found [ 142.541030][ T9624] device hsr_slave_0 entered promiscuous mode [ 142.608696][ T9624] device hsr_slave_1 entered promiscuous mode [ 142.646569][ T9624] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 142.655143][ T9624] Cannot create hsr debugfs directory [ 142.678867][ T9632] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.689813][ T9632] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.698219][ T9632] device bridge_slave_0 entered promiscuous mode [ 142.752838][ T9632] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.761061][ T9632] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.770828][ T9632] device bridge_slave_1 entered promiscuous mode [ 142.880177][ T9627] device hsr_slave_0 entered promiscuous mode [ 142.916963][ T9627] device hsr_slave_1 entered promiscuous mode [ 142.986518][ T9627] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 142.994118][ T9627] Cannot create hsr debugfs directory [ 143.049720][ T9636] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.057021][ T9636] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.064827][ T9636] device bridge_slave_0 entered promiscuous mode [ 143.080497][ T9622] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 143.140333][ T9632] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 143.154835][ T9636] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.162261][ T9636] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.170927][ T9636] device bridge_slave_1 entered promiscuous mode [ 143.198466][ T9636] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 143.207721][ T9622] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 143.251676][ T9632] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 143.283677][ T9636] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 143.292957][ T9622] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 143.354196][ T9622] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 143.465377][ T9632] team0: Port device team_slave_0 added [ 143.483747][ T9616] 8021q: adding VLAN 0 to HW filter on device bond0 [ 143.493339][ T9636] team0: Port device team_slave_0 added [ 143.504943][ T9636] team0: Port device team_slave_1 added [ 143.512563][ T9632] team0: Port device team_slave_1 added [ 143.537745][ T9624] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 143.583892][ T9624] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 143.645506][ T9624] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 143.700179][ T9624] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 143.776657][ T9632] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 143.783643][ T9632] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 143.810548][ T9632] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 143.824016][ T9632] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 143.831558][ T9632] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 143.858389][ T9632] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 143.883352][ T9636] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 143.891056][ T9636] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 143.917589][ T9636] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 143.942789][ T9616] 8021q: adding VLAN 0 to HW filter on device team0 [ 143.972288][ T9636] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 143.980454][ T9636] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 144.008126][ T9636] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 144.023993][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 144.032962][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 144.090053][ T9632] device hsr_slave_0 entered promiscuous mode [ 144.140318][ T9632] device hsr_slave_1 entered promiscuous mode [ 144.199461][ T9632] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 144.207216][ T9632] Cannot create hsr debugfs directory [ 144.230383][ T3465] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 144.240182][ T3465] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 144.249957][ T3465] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.257192][ T3465] bridge0: port 1(bridge_slave_0) entered forwarding state [ 144.265838][ T3465] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 144.275893][ T3465] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 144.284834][ T3465] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.291929][ T3465] bridge0: port 2(bridge_slave_1) entered forwarding state [ 144.300090][ T3465] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 144.355222][ T3465] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 144.363359][ T3465] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 144.428941][ T9636] device hsr_slave_0 entered promiscuous mode [ 144.476907][ T9636] device hsr_slave_1 entered promiscuous mode [ 144.516514][ T9636] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 144.524252][ T9636] Cannot create hsr debugfs directory [ 144.554303][ T3465] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 144.563033][ T3465] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 144.572069][ T3465] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 144.580898][ T3465] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 144.590230][ T3465] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 144.598905][ T3465] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 144.608485][ T3465] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 144.634446][ T9616] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 144.650871][ T9616] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 144.682567][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 144.691170][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 144.737143][ T9627] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 144.793939][ T9627] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 144.842551][ T9627] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 144.896641][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 144.904185][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 144.927014][ T9627] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 145.035406][ T9624] 8021q: adding VLAN 0 to HW filter on device bond0 [ 145.055705][ T9622] 8021q: adding VLAN 0 to HW filter on device bond0 [ 145.070876][ T9616] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 145.169452][ T9622] 8021q: adding VLAN 0 to HW filter on device team0 [ 145.177645][ T3463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 145.185472][ T3463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 145.198075][ T3463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 145.205923][ T3463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 145.238033][ T9624] 8021q: adding VLAN 0 to HW filter on device team0 [ 145.245652][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 145.255247][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 145.281726][ T9616] device veth0_vlan entered promiscuous mode [ 145.298505][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 145.309344][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 145.353279][ T9632] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 145.389766][ T9632] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 145.449462][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 145.458652][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 145.466573][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 145.475180][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 145.484068][ T2681] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.491202][ T2681] bridge0: port 1(bridge_slave_0) entered forwarding state [ 145.499525][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 145.508414][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 145.517210][ T2681] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.524281][ T2681] bridge0: port 2(bridge_slave_1) entered forwarding state [ 145.531966][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 145.541100][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 145.549651][ T2681] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.556760][ T2681] bridge0: port 1(bridge_slave_0) entered forwarding state [ 145.577868][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 145.585949][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 145.595464][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 145.605653][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 145.614948][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 145.624309][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 145.632853][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 145.643694][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 145.652574][ T2681] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.659706][ T2681] bridge0: port 2(bridge_slave_1) entered forwarding state [ 145.674238][ T9616] device veth1_vlan entered promiscuous mode [ 145.682302][ T9636] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 145.720670][ T9632] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 145.804130][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 145.813508][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 145.822085][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 145.831279][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 145.839930][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 145.848897][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 145.859799][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 145.868619][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 145.877253][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 145.897257][ T9636] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 145.959121][ T9632] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 146.026098][ T9636] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 146.064826][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 146.073428][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 146.082422][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 146.091131][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 146.099919][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 146.125872][ T9616] device veth0_macvtap entered promiscuous mode [ 146.137552][ T9636] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 146.178320][ T3465] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 146.190582][ T3465] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 146.200478][ T3465] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 146.209845][ T3465] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 146.221536][ T3465] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 146.250543][ T9624] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 146.262048][ T9624] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 146.275834][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 146.284812][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 146.293992][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 146.304153][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 146.313521][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 146.321529][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 146.331899][ T9616] device veth1_macvtap entered promiscuous mode [ 146.352912][ T9622] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 146.368861][ T9627] 8021q: adding VLAN 0 to HW filter on device bond0 [ 146.386736][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 146.395208][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 146.437033][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 146.445123][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 146.497767][ T3463] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 146.507797][ T3463] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 146.515856][ T3463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 146.526461][ T3463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 146.541299][ T9624] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 146.571878][ T9627] 8021q: adding VLAN 0 to HW filter on device team0 [ 146.582538][ T9616] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 146.602337][ T3465] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 146.617497][ T3465] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 146.656478][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 146.665297][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 146.675209][ T2681] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.682336][ T2681] bridge0: port 1(bridge_slave_0) entered forwarding state [ 146.694587][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 146.704875][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 146.713910][ T2681] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.721196][ T2681] bridge0: port 2(bridge_slave_1) entered forwarding state [ 146.729305][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 146.746737][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 146.763993][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 146.772351][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 146.788109][ T9616] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 146.812588][ T9622] device veth0_vlan entered promiscuous mode [ 146.821194][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 146.831419][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 146.841520][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 146.850970][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 146.860297][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 146.870107][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 146.879420][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 146.919871][ T9622] device veth1_vlan entered promiscuous mode [ 146.931004][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 146.942527][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 146.951928][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 147.041797][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 147.050624][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 147.059351][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 147.068149][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 147.076740][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 147.085037][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 147.164146][ T9632] 8021q: adding VLAN 0 to HW filter on device bond0 [ 147.184547][ T9636] 8021q: adding VLAN 0 to HW filter on device bond0 [ 147.198559][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 147.207183][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 147.215666][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 147.225573][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 147.234951][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 147.243119][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 147.252728][ T9624] device veth0_vlan entered promiscuous mode [ 147.349701][ T9627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 147.364362][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 147.373009][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 147.400232][ T9632] 8021q: adding VLAN 0 to HW filter on device team0 [ 147.440282][ T9624] device veth1_vlan entered promiscuous mode [ 147.454606][ T9636] 8021q: adding VLAN 0 to HW filter on device team0 [ 147.467614][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 147.486741][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 147.495282][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 05:41:02 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000480)=ANY=[@ANYBLOB="68000000a60008000000000000c45c", @ANYBLOB="000225bdf000ffdbdf25010000000000000009410000004c001802000000657468000000000000000000000000000000000000000000ef"], 0x2}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 147.517836][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 147.525788][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 147.551946][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 147.561061][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.568226][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 147.582100][ T9622] device veth0_macvtap entered promiscuous mode [ 147.627729][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 147.635850][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 147.645137][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 147.655813][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 147.664903][ T2685] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.672053][ T2685] bridge0: port 1(bridge_slave_0) entered forwarding state [ 147.680808][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 147.689877][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 147.698602][ T2685] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.705682][ T2685] bridge0: port 2(bridge_slave_1) entered forwarding state [ 147.717183][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 147.725137][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 147.734117][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 147.743628][ T2685] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.750763][ T2685] bridge0: port 2(bridge_slave_1) entered forwarding state [ 147.772070][ T9622] device veth1_macvtap entered promiscuous mode [ 147.792007][ T9656] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 147.818373][ T3463] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 147.826332][ T9656] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 61184)! [ 147.831538][ T3463] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 147.843415][ T9656] EXT4-fs (loop0): group descriptors corrupted! [ 147.847273][ T3463] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 147.859787][ T3463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 147.869144][ T3463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 147.878403][ T3463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 147.894546][ T9627] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 147.920772][ T3463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 147.931367][ T3463] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 147.975873][ T9622] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 147.993841][ T9622] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 148.005594][ T9622] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 148.031913][ T9622] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 148.051149][ T9622] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 148.065758][ T9622] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 148.074330][ T9655] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 148.081186][ T3457] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 148.097048][ T9655] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 61184)! [ 148.098437][ T3457] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 148.118539][ T9655] EXT4-fs (loop0): group descriptors corrupted! [ 148.122700][ T3457] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 148.135285][ T3457] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 148.144521][ T3457] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 148.154160][ T3457] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 148.163215][ T3457] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 148.172094][ T3457] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 148.182346][ T3457] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 148.191969][ T3457] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 148.201255][ T3457] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 148.210379][ T3457] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 05:41:03 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000480)=ANY=[@ANYBLOB="68000000a60008000000000000c45c", @ANYBLOB="000225bdf000ffdbdf25010000000000000009410000004c001802000000657468000000000000000000000000000000000000000000ef"], 0x2}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 148.228906][ T3463] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 148.237872][ T3463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 148.251211][ T3463] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 148.287205][ T9624] device veth0_macvtap entered promiscuous mode [ 148.347607][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 148.364242][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 148.372728][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 148.381995][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 148.390883][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 148.399604][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 148.407933][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 148.417323][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 148.473619][ T9666] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 148.484243][ T9666] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 61184)! [ 148.499754][ T9666] EXT4-fs (loop0): group descriptors corrupted! [ 148.563041][ T9624] device veth1_macvtap entered promiscuous mode [ 148.597925][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 05:41:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r8, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x48, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {}, {0x4, 0xfff1}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @loopback}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newtfilter={0x48, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {}, {0x0, 0xfff1}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @loopback}]}}]}, 0x48}}, 0x0) [ 148.687956][ T9636] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 148.701393][ T9636] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 148.710891][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 148.720893][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 148.763348][ T9624] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 148.782453][ T9624] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 148.806582][ T9624] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 148.823015][ T9624] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 148.844083][ T9624] batman_adv: batadv0: Interface activated: batadv_slave_0 05:41:04 executing program 1: bpf$BPF_BTF_LOAD(0x9, &(0x7f00000003c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) [ 148.872208][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 148.893811][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 148.914806][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready 05:41:04 executing program 1: bpf$BPF_BTF_LOAD(0x9, &(0x7f00000003c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) [ 148.932319][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 148.943694][ T3457] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 148.967479][ T3457] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 05:41:04 executing program 1: bpf$BPF_BTF_LOAD(0x9, &(0x7f00000003c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) [ 148.992824][ T9624] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 149.008620][ T9624] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 149.020672][ T9624] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 149.045637][ T9624] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 149.068412][ T9624] batman_adv: batadv0: Interface activated: batadv_slave_1 05:41:04 executing program 1: bpf$BPF_BTF_LOAD(0x9, &(0x7f00000003c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) [ 149.099878][ T9627] device veth0_vlan entered promiscuous mode [ 149.123999][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 149.135307][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 05:41:04 executing program 1: bpf$BPF_BTF_LOAD(0x9, 0x0, 0x0) [ 149.145293][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 149.163753][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 149.186659][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 149.196186][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 149.227844][ T9627] device veth1_vlan entered promiscuous mode [ 149.237486][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 149.255993][ T9636] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 149.285798][ T9632] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 149.506018][ T9627] device veth0_macvtap entered promiscuous mode [ 149.532732][ T3457] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 149.542579][ T3457] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 05:41:04 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000100)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb', 0x0) write$binfmt_elf64(r0, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d0000000000000000000000dfeb7bba00281293bd5d74dafc20380003000000c763bf0c0079be7a2ce3c134108fe74950f9b93a5ea0cee7257825501bb77bf723be80699ab51e67f4fee76bb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b953a500000000000086314219123c233beca448dd9f"], 0xa8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) [ 149.563593][ T9627] device veth1_macvtap entered promiscuous mode [ 149.573501][ T3465] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 149.583527][ T3465] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 149.620130][ T3465] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 149.634019][ T3465] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 149.700005][ T9627] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 149.714219][ T9709] ERROR: Domain ' /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.2 proc:/self/fd/3' not defined. [ 149.738149][ T9627] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 149.748596][ T9627] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 149.759669][ T9627] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 149.786444][ T9627] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 149.798572][ T9627] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 149.815532][ T9627] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 149.838091][ T3465] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 149.851128][ T3465] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 149.860728][ T3465] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 149.869935][ T3465] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 149.879710][ T3465] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 149.888577][ T3465] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 149.903918][ T9627] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 149.920560][ T9627] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 149.930772][ T9627] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 149.941464][ T9627] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 149.951511][ T9627] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 149.962271][ T9627] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 149.973816][ T9627] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 149.989184][ T9636] device veth0_vlan entered promiscuous mode [ 149.999861][ T3457] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 150.008723][ T3457] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 150.035629][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 150.044792][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 150.063348][ T9636] device veth1_vlan entered promiscuous mode [ 150.183437][ T3457] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 150.192074][ T3457] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 150.203323][ T3457] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 150.211799][ T3457] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 150.221321][ T3457] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 150.229437][ T3457] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 150.288937][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 150.298575][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 150.320813][ T9632] device veth0_vlan entered promiscuous mode [ 150.331024][ T9636] device veth0_macvtap entered promiscuous mode 05:41:05 executing program 3: r0 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4620, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000140)=0x8, 0x4) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x2203) [ 150.344486][ T9636] device veth1_macvtap entered promiscuous mode [ 150.414012][ T9632] device veth1_vlan entered promiscuous mode [ 150.431885][ T9636] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 150.455597][ T9636] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 150.467939][ T9636] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 150.478698][ T9636] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 150.488808][ T9636] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 150.506483][ T9636] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 150.516352][ T9636] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 150.534667][ T9636] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 150.549031][ T9636] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 150.567511][ T2682] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 150.575777][ T2682] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 150.584354][ T2682] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 150.593533][ T2682] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 150.606602][ T9636] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 150.623914][ T9636] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 150.634578][ T9636] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 150.645543][ T9636] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 150.655849][ T9636] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 150.666445][ T9636] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 150.676296][ T9636] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 150.687588][ T9636] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 150.699827][ T9636] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 150.715193][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 150.724118][ T0] NOHZ: local_softirq_pending 08 [ 150.724837][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 150.853736][ T2682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 150.863895][ T2682] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 150.930178][ T9632] device veth0_macvtap entered promiscuous mode [ 150.954509][ T9632] device veth1_macvtap entered promiscuous mode [ 150.986887][ T9632] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 150.997513][ T9632] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 151.007622][ T9632] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 151.018610][ T9632] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 151.028669][ T9632] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 151.039216][ T9632] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 151.049450][ T9632] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 151.060863][ T9632] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 151.071294][ T9632] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 151.082389][ T9632] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 151.095285][ T9632] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 151.109470][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 151.118935][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 151.128305][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 151.137342][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 151.149867][ T9632] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 151.161647][ T9632] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 151.172293][ T9632] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 151.186304][ T9632] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 151.220906][ T9632] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 151.234754][ T9632] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 151.245631][ T9632] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 151.258823][ T9632] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 151.272517][ T9632] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 151.286151][ T9632] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 151.298796][ T9632] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 151.316580][ T2682] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 151.325319][ T2682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 05:41:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x0, 0x0, 0x200}}) 05:41:06 executing program 1: bpf$BPF_BTF_LOAD(0x9, 0x0, 0x0) 05:41:06 executing program 0: r0 = add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0x0, r0) 05:41:06 executing program 3: r0 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4620, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000140)=0x8, 0x4) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x2203) 05:41:06 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000100)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb', 0x0) write$binfmt_elf64(r0, &(0x7f0000000e00)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d0000000000000000000000dfeb7bba00281293bd5d74dafc20380003000000c763bf0c0079be7a2ce3c134108fe74950f9b93a5ea0cee7257825501bb77bf723be80699ab51e67f4fee76bb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b953a500000000000086314219123c233beca448dd9f"], 0xa8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 05:41:06 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x4, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 05:41:06 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0xc3630, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x81, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820004, 0x0, 0x0, [0x0, 0xeca7020000000000, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x2c) socket$kcm(0x2, 0x0, 0x2) perf_event_open(0x0, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x11, 0x0, 0x300) r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003d00)={0x0, 0x0, 0x0}, 0xfd00) write$cgroup_subtree(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:41:06 executing program 3: r0 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4620, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000140)=0x8, 0x4) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x2203) 05:41:06 executing program 0: prctl$PR_GET_PDEATHSIG(0x24, &(0x7f0000000040)) 05:41:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x4b34, &(0x7f0000000100)) 05:41:06 executing program 1: bpf$BPF_BTF_LOAD(0x9, 0x0, 0x0) 05:41:07 executing program 1: bpf$BPF_BTF_LOAD(0x9, &(0x7f00000003c0)={0x0, 0x0}, 0x20) [ 151.916382][ C0] hrtimer: interrupt took 56275 ns 05:41:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x0, 0x0, 0x200}}) 05:41:07 executing program 0: setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000002f000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:41:07 executing program 3: r0 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4620, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000140)=0x8, 0x4) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x2203) 05:41:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) accept4$vsock_stream(r2, 0x0, 0x0, 0x0) 05:41:07 executing program 1: bpf$BPF_BTF_LOAD(0x9, &(0x7f00000003c0)={0x0, 0x0}, 0x20) [ 152.286994][ T9776] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 05:41:07 executing program 3: r0 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4620, 0x0, @loopback}, 0x1c) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x2203) 05:41:07 executing program 2: bpf$BPF_PROG_TEST_RUN(0x13, 0x0, 0x0) 05:41:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) accept4$vsock_stream(r2, 0x0, 0x0, 0x0) 05:41:07 executing program 1: bpf$BPF_BTF_LOAD(0x9, &(0x7f00000003c0)={0x0, 0x0}, 0x20) 05:41:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:41:07 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000100)={0x3}) 05:41:07 executing program 3: r0 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4620, 0x0, @loopback}, 0x1c) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x2203) [ 152.802087][ T9809] [ 152.805181][ T9809] ====================================================== [ 152.812723][ T9809] WARNING: possible circular locking dependency detected [ 152.820085][ T9809] 5.6.0-rc3-next-20200228-syzkaller #0 Not tainted [ 152.827175][ T9809] ------------------------------------------------------ [ 152.834845][ T9809] syz-executor.1/9809 is trying to acquire lock: [ 152.841260][ T9809] ffff88809f0e82a0 (&tty->termios_rwsem){++++}, at: n_tty_receive_buf_common+0x87/0x2ac0 [ 152.851619][ T9809] [ 152.851619][ T9809] but task is already holding lock: [ 152.859028][ T9809] ffffffff89f414c0 (sel_lock){+.+.}, at: paste_selection+0x155/0x490 [ 152.867097][ T9809] [ 152.867097][ T9809] which lock already depends on the new lock. [ 152.867097][ T9809] [ 152.877584][ T9809] [ 152.877584][ T9809] the existing dependency chain (in reverse order) is: [ 152.886672][ T9809] [ 152.886672][ T9809] -> #2 (sel_lock){+.+.}: [ 152.893346][ T9809] __mutex_lock+0x156/0x13c0 [ 152.898444][ T9809] set_selection_kernel+0x38a/0x13c0 [ 152.904245][ T9809] set_selection_user+0x94/0xd7 [ 152.909790][ T9809] tioclinux+0x115/0x480 [ 152.914634][ T9809] vt_ioctl+0x18a6/0x2450 [ 152.919472][ T9809] tty_ioctl+0xedd/0x1440 [ 152.924503][ T9809] ksys_ioctl+0x11a/0x180 [ 152.929347][ T9809] __x64_sys_ioctl+0x6f/0xb0 [ 152.934617][ T9809] do_syscall_64+0xf6/0x790 [ 152.939628][ T9809] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 152.946283][ T9809] [ 152.946283][ T9809] -> #1 (console_lock){+.+.}: [ 152.953210][ T9809] console_lock+0x44/0x80 [ 152.959342][ T9809] con_flush_chars+0x35/0x90 [ 152.965561][ T9809] n_tty_write+0xd49/0xf90 [ 152.971411][ T9809] tty_write+0x48f/0x7f0 [ 152.976342][ T9809] __vfs_write+0x76/0x100 [ 152.981441][ T9809] vfs_write+0x262/0x5c0 [ 152.986219][ T9809] ksys_write+0x127/0x250 [ 152.991433][ T9809] do_syscall_64+0xf6/0x790 [ 152.996442][ T9809] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 153.002887][ T9809] [ 153.002887][ T9809] -> #0 (&tty->termios_rwsem){++++}: [ 153.010882][ T9809] __lock_acquire+0x24b3/0x5270 [ 153.016233][ T9809] lock_acquire+0x197/0x420 [ 153.021237][ T9809] down_read+0x96/0x430 [ 153.025987][ T9809] n_tty_receive_buf_common+0x87/0x2ac0 [ 153.032034][ T9809] tty_ldisc_receive_buf+0xa9/0x190 [ 153.037757][ T9809] paste_selection+0x1e5/0x490 [ 153.043032][ T9809] tioclinux+0x12c/0x480 [ 153.047777][ T9809] vt_ioctl+0x18a6/0x2450 [ 153.052616][ T9809] tty_ioctl+0xedd/0x1440 [ 153.057454][ T9809] ksys_ioctl+0x11a/0x180 [ 153.062291][ T9809] __x64_sys_ioctl+0x6f/0xb0 [ 153.067410][ T9809] do_syscall_64+0xf6/0x790 [ 153.072444][ T9809] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 153.078858][ T9809] [ 153.078858][ T9809] other info that might help us debug this: [ 153.078858][ T9809] [ 153.089164][ T9809] Chain exists of: [ 153.089164][ T9809] &tty->termios_rwsem --> console_lock --> sel_lock [ 153.089164][ T9809] [ 153.101645][ T9809] Possible unsafe locking scenario: [ 153.101645][ T9809] [ 153.109081][ T9809] CPU0 CPU1 [ 153.114521][ T9809] ---- ---- [ 153.119865][ T9809] lock(sel_lock); [ 153.123661][ T9809] lock(console_lock); [ 153.130312][ T9809] lock(sel_lock); [ 153.136614][ T9809] lock(&tty->termios_rwsem); [ 153.141354][ T9809] [ 153.141354][ T9809] *** DEADLOCK *** [ 153.141354][ T9809] [ 153.149489][ T9809] 3 locks held by syz-executor.1/9809: [ 153.154928][ T9809] #0: ffff88809f0e8090 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x22/0x80 [ 153.164124][ T9809] #1: ffff8880aa1be0a8 (&buf->lock){+.+.}, at: paste_selection+0x122/0x490 [ 153.172800][ T9809] #2: ffffffff89f414c0 (sel_lock){+.+.}, at: paste_selection+0x155/0x490 [ 153.181302][ T9809] [ 153.181302][ T9809] stack backtrace: [ 153.187299][ T9809] CPU: 0 PID: 9809 Comm: syz-executor.1 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 153.197187][ T9809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 153.207363][ T9809] Call Trace: [ 153.210754][ T9809] dump_stack+0x188/0x20d [ 153.215082][ T9809] check_noncircular+0x32e/0x3e0 [ 153.220024][ T9809] ? print_circular_bug.isra.0+0x220/0x220 [ 153.225847][ T9809] ? graph_lock+0x7e/0x210 [ 153.230253][ T9809] ? alloc_list_entry+0xb0/0xb0 [ 153.235085][ T9809] ? mark_lock+0xbc/0x1220 [ 153.239929][ T9809] __lock_acquire+0x24b3/0x5270 [ 153.244770][ T9809] ? mark_held_locks+0xe0/0xe0 [ 153.249516][ T9809] lock_acquire+0x197/0x420 [ 153.254001][ T9809] ? n_tty_receive_buf_common+0x87/0x2ac0 [ 153.259709][ T9809] down_read+0x96/0x430 [ 153.263851][ T9809] ? n_tty_receive_buf_common+0x87/0x2ac0 [ 153.269549][ T9809] ? down_read_killable+0x460/0x460 [ 153.274737][ T9809] ? __mutex_lock+0x458/0x13c0 [ 153.279482][ T9809] n_tty_receive_buf_common+0x87/0x2ac0 [ 153.285044][ T9809] ? paste_selection+0x147/0x490 [ 153.289963][ T9809] ? mark_lock+0xbc/0x1220 [ 153.294371][ T9809] tty_ldisc_receive_buf+0xa9/0x190 [ 153.299551][ T9809] ? n_tty_receive_buf_common+0x2ac0/0x2ac0 [ 153.305427][ T9809] paste_selection+0x1e5/0x490 [ 153.310174][ T9809] ? sel_pos+0x90/0x90 [ 153.314245][ T9809] ? wake_up_q+0x140/0x140 [ 153.318664][ T9809] tioclinux+0x12c/0x480 [ 153.322896][ T9809] vt_ioctl+0x18a6/0x2450 [ 153.327221][ T9809] ? complete_change_console+0x390/0x390 [ 153.332837][ T9809] ? tomoyo_path_number_perm+0x238/0x4d0 [ 153.338453][ T9809] ? tomoyo_execute_permission+0x470/0x470 [ 153.344237][ T9809] ? find_held_lock+0x2d/0x110 [ 153.348985][ T9809] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 153.354894][ T9809] ? complete_change_console+0x390/0x390 [ 153.360668][ T9809] tty_ioctl+0xedd/0x1440 [ 153.364991][ T9809] ? tty_vhangup+0x30/0x30 [ 153.369394][ T9809] ? do_vfs_ioctl+0x506/0x12c0 [ 153.374147][ T9809] ? ioctl_file_clone+0x180/0x180 [ 153.379261][ T9809] ? __fget_files+0x329/0x4f0 [ 153.383936][ T9809] ? do_dup2+0x520/0x520 [ 153.388185][ T9809] ? __x64_sys_futex+0x380/0x4f0 [ 153.393131][ T9809] ? tty_vhangup+0x30/0x30 [ 153.397536][ T9809] ksys_ioctl+0x11a/0x180 [ 153.401850][ T9809] __x64_sys_ioctl+0x6f/0xb0 [ 153.406422][ T9809] ? lockdep_hardirqs_on+0x417/0x5d0 [ 153.412221][ T9809] do_syscall_64+0xf6/0x790 [ 153.416712][ T9809] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 153.422581][ T9809] RIP: 0033:0x45c849 [ 153.426457][ T9809] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 153.446057][ T9809] RSP: 002b:00007f131124fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 153.454478][ T9809] RAX: ffffffffffffffda RBX: 00007f13112506d4 RCX: 000000000045c849 [ 153.462452][ T9809] RDX: 0000000020000100 RSI: 000000000000541c RDI: 0000000000000003 [ 153.470420][ T9809] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 153.478370][ T9809] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 153.486320][ T9809] R13: 0000000000000573 R14: 00000000004c8075 R15: 000000000076bf0c 05:41:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:41:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) accept4$vsock_stream(r2, 0x0, 0x0, 0x0) 05:41:08 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800800000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a0101fffff70000000000006353d6f7159be33eb96bcb4cab90257113f365340200000000"], 0x0, 0x65, 0x0, 0x20000000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0x47}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 05:41:08 executing program 3: r0 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4620, 0x0, @loopback}, 0x1c) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x2203) 05:41:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) accept4$vsock_stream(r2, 0x0, 0x0, 0x0) 05:41:08 executing program 3: r0 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000140)=0x8, 0x4) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x2203) 05:41:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) accept4$vsock_stream(r2, 0x0, 0x0, 0x0) 05:41:08 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x30, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x0, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, 0x0}, 0x78) 05:41:08 executing program 3: r0 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000140)=0x8, 0x4) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x2203) 05:41:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) accept4$vsock_stream(r2, 0x0, 0x0, 0x0) 05:41:09 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000100)={0x3}) 05:41:09 executing program 3: r0 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000140)=0x8, 0x4) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x2203) 05:41:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:41:09 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff38, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="48000000100005ef21c6ea0c7645570000000000", @ANYRES32=r3, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000080)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}, @ipv4={[], [], @local}, @local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={@local, @rand_addr="6409c0b80e989ba29fb30dc012b97603", @ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000, 0x400003, r3}) [ 154.221348][ T9857] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 154.224675][ T9857] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 05:41:11 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800800000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a0101fffff70000000000006353d6f7159be33eb96bcb4cab90257113f365340200000000"], 0x0, 0x65, 0x0, 0x20000000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0x47}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 05:41:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) accept4$vsock_stream(r2, 0x0, 0x0, 0x0) 05:41:11 executing program 3: r0 = socket$inet6(0xa, 0x1200000002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4620, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000140)=0x8, 0x4) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x2203) 05:41:11 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff38, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="48000000100005ef21c6ea0c7645570000000000", @ANYRES32=r3, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000080)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}, @ipv4={[], [], @local}, @local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={@local, @rand_addr="6409c0b80e989ba29fb30dc012b97603", @ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000, 0x400003, r3}) 05:41:11 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000100)={0x3}) 05:41:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:41:11 executing program 3: r0 = socket$inet6(0xa, 0x1200000002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4620, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000140)=0x8, 0x4) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x2203) 05:41:11 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000100)={0x3}) 05:41:11 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 156.620190][ T9874] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 05:41:11 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff38, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="48000000100005ef21c6ea0c7645570000000000", @ANYRES32=r3, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000080)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}, @ipv4={[], [], @local}, @local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={@local, @rand_addr="6409c0b80e989ba29fb30dc012b97603", @ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000, 0x400003, r3}) 05:41:11 executing program 3: r0 = socket$inet6(0xa, 0x1200000002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4620, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000140)=0x8, 0x4) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x2203) 05:41:11 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 156.833196][ T9892] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 05:41:14 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800800000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a0101fffff70000000000006353d6f7159be33eb96bcb4cab90257113f365340200000000"], 0x0, 0x65, 0x0, 0x20000000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0x47}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 05:41:14 executing program 3: setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4620, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x5, &(0x7f0000000140)=0x8, 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x2203) 05:41:14 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff38, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="48000000100005ef21c6ea0c7645570000000000", @ANYRES32=r3, @ANYBLOB="0100000000000000280012000c0001007665746800000500ececfac5e025573fb5926c7ae92af81866c7b481eb54a8288c7bb65cc70200020814a79f7488f611d01cb85041b7f809000000004600006ff084010793c3bc1747efb513ef7216412e3bbfb4941d2b0500003c3daeba77c4e343d199812b3862a78324fd19d15991370100afec87ff2f99746c2aed6d90fff50cc840f622b17a4a827b1a75991f90c9f4b905bba36c199b6615f31bca41e26bd754a284f1d5b0a45697de633a103c7f5c94ada8d5cc248fe9f6bca8371b6c9a7698be850f832755594a630928739d035cb506505793eb035093ddac01077a248b872ea0a14664865263377b586e8886915327a8fb7c5796cdc5a4e259513b020000000000000000000000000093a9bbbdda74cd528f3ea5f210c9258cb5f784f2417ce6f05aecde45749bec180000000000000000fffffff9000000000000000000000000000004269cae211e628f819c74fb44694a4b651cf27a2e895bb0eea99513ed6df0f5616be7180b91e888e2634a8d407cf34ae2437c34628d2baf7c8288557fac54c90954", @ANYRES32=0x0, @ANYBLOB="0b4a1914200cc3ad134d722638e76806c8290e7b562b6cf4fa7af6933aa62720930c5bde676ddb9c0c311a7feda8455842b5365ce6d9082f1f056abd876b3e43df416758c774ccb2812e65015ed0b8842bd64eaedb3091495364373194c8291924cde4eb65b0168d36955facea07381b9a4e74fa4c0f111cc2fbf6cd1ea6877a05e7d76dc889950a0af8a3842cf9e6364c087a3d48f2dfc7e7f89b7aa5060d8e3c2e7630e2a22d7e017e36c2e9fcd5e64ba064ca4f8e00a658f5fefd6b640a4270e7b5a6431e3e326a41614b2f54f06fa19d4a475b9da7f71d8bdc5e22c3e9e6ddfe7b23706ad4e0e97bef4388bbbdb5e2cb77e43eb48248565888a7a67a38fe5344e4d43ddccca47ad855d1174aed891ab7cb13c7773d32cee8d2a16aca453da8165308f03920d7fd3c360ebb9451376bf5632af7bcadf36fd435da0c0217370b4c9a6e1d63e0fa0ccaaee41f1f885ea0e9e58e9828a4b8ba15adf788ec35a8b7812ec90544402f24fd4aa56d6b6cc69503e0b9937ba71bd84d4ad99d88d26ebe9d2d1634f5db9ae05d89fcffd8aea88254f9b55dac78a4cc4fba181da2a30d235de529b13e53d8d89a0000107fea3653e607f98fbcaa0fc16569d9028dba1e"], 0x48}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000080)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}, @ipv4={[], [], @local}, @local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={@local, @rand_addr="6409c0b80e989ba29fb30dc012b97603", @ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000, 0x400003, r3}) 05:41:14 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:41:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:41:14 executing program 1: ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x3}) 05:41:14 executing program 1: ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x3}) 05:41:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) accept4$vsock_stream(r1, 0x0, 0x0, 0x0) 05:41:14 executing program 3: setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4620, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x5, &(0x7f0000000140)=0x8, 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x2203) [ 159.702418][ T9910] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 05:41:14 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff38, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="48000000100005ef21c6ea0c7645570000000000", @ANYRES32=r3, @ANYBLOB="0100000000000000280012000c0001007665746800000500ececfac5e025573fb5926c7ae92af81866c7b481eb54a8288c7bb65cc70200020814a79f7488f611d01cb85041b7f809000000004600006ff084010793c3bc1747efb513ef7216412e3bbfb4941d2b0500003c3daeba77c4e343d199812b3862a78324fd19d15991370100afec87ff2f99746c2aed6d90fff50cc840f622b17a4a827b1a75991f90c9f4b905bba36c199b6615f31bca41e26bd754a284f1d5b0a45697de633a103c7f5c94ada8d5cc248fe9f6bca8371b6c9a7698be850f832755594a630928739d035cb506505793eb035093ddac01077a248b872ea0a14664865263377b586e8886915327a8fb7c5796cdc5a4e259513b020000000000000000000000000093a9bbbdda74cd528f3ea5f210c9258cb5f784f2417ce6f05aecde45749bec180000000000000000fffffff9000000000000000000000000000004269cae211e628f819c74fb44694a4b651cf27a2e895bb0eea99513ed6df0f5616be7180b91e888e2634a8d407cf34ae2437c34628d2baf7c8288557fac54c90954", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r4, 0x0, r4) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={@local, @rand_addr="6409c0b80e989ba29fb30dc012b97603", @ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000, 0x400003, r3}) 05:41:14 executing program 1: ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x3}) 05:41:15 executing program 3: setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4620, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x5, &(0x7f0000000140)=0x8, 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x2203) [ 159.914176][ T9929] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 05:41:17 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800800000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a0101fffff70000000000006353d6f7159be33eb96bcb4cab90257113f365340200000000"], 0x0, 0x65, 0x0, 0x20000000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0x47}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 05:41:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) accept4$vsock_stream(r1, 0x0, 0x0, 0x0) 05:41:17 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4620, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000140)=0x8, 0x4) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x2203) 05:41:17 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff38, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="48000000100005ef21c6ea0c7645570000000000", @ANYRES32=r3, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="0b4a1914200cc3ad134d722638e76806c8290e7b562b6cf4fa7af6933aa62720930c5bde676ddb9c0c311a7feda8455842b5365ce6d9082f1f056abd876b3e43df416758c774ccb2812e65015ed0b8842bd64eaedb3091495364373194c8291924cde4eb65b0168d36955facea07381b9a4e74fa4c0f111cc2fbf6cd1ea6877a05e7d76dc889950a0af8a3842cf9e6364c087a3d48f2dfc7e7f89b7aa5060d8e3c2e7630e2a22d7e017e36c2e9fcd5e64ba064ca4f8e00a658f5fefd6b640a4270e7b5a6431e3e326a41614b2f54f06fa19d4a475b9da7f71d8bdc5e22c3e9e6ddfe7b23706ad4e0e97bef4388bbbdb5e2cb77e43eb48248565888a7a67a38fe5344e4d43ddccca47ad855d1174aed891ab7cb13c7773d32cee8d2a16aca453da8165308f03920d7fd3c360ebb9451376bf5632af7bcadf36fd435da0c0217370b4c9a6e1d63e0fa0ccaaee41f1f885ea0e9e58e9828a4b8ba15adf788ec35a8b7812ec90544402f24fd4aa56d6b6cc69503e0b9937ba71bd84d4ad99d88d26ebe9d2d1634f5db9ae05d89fcffd8aea88254f9b55dac78a4cc4fba181da2a30d235de529b13e53d8d89a0000107fea3653e607f98fbcaa0fc16569d9028dba1e"], 0x48}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r4, 0x0, r4) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={@local, @rand_addr="6409c0b80e989ba29fb30dc012b97603", @ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000, 0x400003, r3}) 05:41:17 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000100)={0x3}) 05:41:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00'}) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:41:17 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4620, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000140)=0x8, 0x4) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x2203) 05:41:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) accept4$vsock_stream(r1, 0x0, 0x0, 0x0) [ 162.777557][ T9955] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 05:41:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) accept4$vsock_stream(r1, 0x0, 0x0, 0x0)