[ 393.712600] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.2'. [ 393.737197] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.4'. [ 393.748934] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. [ 393.767226] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 393.784873] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.5'. [ 393.850570] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.1'. [ 393.875053] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.2'. [ 393.887546] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. [ 393.898780] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.4'. [ 393.911214] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 394.485614] syz-executor.4 (5909) used greatest stack depth: 23368 bytes left [ 395.328341] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 395.335800] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 395.344297] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 395.351088] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 395.360088] device bridge_slave_1 left promiscuous mode [ 395.366364] bridge0: port 2(bridge_slave_1) entered disabled state [ 395.424689] device bridge_slave_0 left promiscuous mode [ 395.430485] bridge0: port 1(bridge_slave_0) entered disabled state [ 395.476428] device veth1_macvtap left promiscuous mode [ 395.484782] device veth0_macvtap left promiscuous mode [ 395.490242] device veth1_vlan left promiscuous mode [ 395.496425] device veth0_vlan left promiscuous mode [ 395.613734] device hsr_slave_1 left promiscuous mode [ 395.673808] device hsr_slave_0 left promiscuous mode [ 395.718363] team0 (unregistering): Port device team_slave_1 removed [ 395.727464] team0 (unregistering): Port device team_slave_0 removed [ 395.737631] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 395.774737] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 395.830682] bond0 (unregistering): Released all slaves Warning: Permanently added '10.128.1.91' (ECDSA) to the list of known hosts. [ 399.187463] nla_parse: 1 callbacks suppressed [ 399.187468] netlink: 32 bytes leftover after parsing attributes in process `syz-executor273'. [ 399.202366] netlink: 32 bytes leftover after parsing attributes in process `syz-executor273'. [ 399.211534] netlink: 32 bytes leftover after parsing attributes in process `syz-executor273'. [ 399.220706] netlink: 32 bytes leftover after parsing attributes in process `syz-executor273'. [ 399.230014] netlink: 32 bytes leftover after parsing attributes in process `syz-executor273'. [ 399.240173] netlink: 32 bytes leftover after parsing attributes in process `syz-executor273'. [ 399.283777] ================================================================== [ 399.291508] BUG: KASAN: use-after-free in tcf_action_destroy+0xda/0xf0 [ 399.298387] Read of size 8 at addr ffff8881f3614b80 by task syz-executor273/30025 [ 399.306001] [ 399.307638] CPU: 0 PID: 30025 Comm: syz-executor273 Not tainted 4.19.204-syzkaller #0 [ 399.315596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 399.325518] Call Trace: [ 399.328094] dump_stack+0x17c/0x226 [ 399.331718] print_address_description.cold.6+0x9/0x211 [ 399.337657] kasan_report.cold.7+0x242/0x2fe [ 399.342068] ? tcf_action_destroy+0xda/0xf0 [ 399.346989] __asan_report_load8_noabort+0x14/0x20 [ 399.351997] tcf_action_destroy+0xda/0xf0 [ 399.356139] tcf_action_init+0x292/0x300 [ 399.360306] ? tcf_action_init_1+0xbc0/0xbc0 [ 399.364790] tcf_action_add+0xf2/0x320 [ 399.368777] ? tca_action_gd+0x1440/0x1440 [ 399.373112] ? __mutex_lock+0xd2f/0x1190 [ 399.377170] ? lock_downgrade+0x860/0x860 [ 399.381399] ? memset+0x31/0x40 [ 399.384659] ? nla_parse+0x34/0x280 [ 399.388484] tc_ctl_action+0x28d/0x3d0 [ 399.392354] ? tcf_action_add+0x320/0x320 [ 399.396670] rtnetlink_rcv_msg+0x34f/0x950 [ 399.400992] ? rtnl_calcit.isra.10+0x360/0x360 [ 399.405679] ? __netlink_lookup+0x2fd/0x630 [ 399.410076] ? lock_downgrade+0x860/0x860 [ 399.414220] netlink_rcv_skb+0x13e/0x3d0 [ 399.418360] ? lock_downgrade+0x860/0x860 [ 399.422507] ? rtnl_calcit.isra.10+0x360/0x360 [ 399.427076] ? netlink_ack+0x990/0x990 [ 399.430946] ? netlink_deliver_tap+0x182/0xb00 [ 399.435677] ? kasan_check_read+0x11/0x20 [ 399.439912] rtnetlink_rcv+0x10/0x20 [ 399.443603] netlink_unicast+0x443/0x660 [ 399.447837] ? netlink_sendskb+0x40/0x40 [ 399.451876] ? _copy_from_iter_full+0x189/0x770 [ 399.456522] ? __check_object_size+0x1e0/0x300 [ 399.461168] netlink_sendmsg+0x667/0xc60 [ 399.465223] ? nlmsg_notify+0x140/0x140 [ 399.469402] ? apparmor_socket_sendmsg+0x1b/0x20 [ 399.474148] ? nlmsg_notify+0x140/0x140 [ 399.478110] sock_sendmsg+0xac/0xf0 [ 399.482069] ___sys_sendmsg+0x647/0x950 [ 399.486028] ? do_huge_pmd_anonymous_page+0xdb8/0x1dd0 [ 399.491296] ? copy_msghdr_from_user+0x430/0x430 [ 399.496206] ? __fget+0x285/0x400 [ 399.499638] ? kasan_check_read+0x11/0x20 [ 399.503850] ? __fget+0x2a2/0x400 [ 399.507563] ? do_dup2+0x3f0/0x3f0 [ 399.511082] ? __handle_mm_fault+0x21a4/0x4100 [ 399.515730] ? __fget_light+0x174/0x1e0 [ 399.519781] ? __fdget+0xe/0x10 [ 399.523040] __sys_sendmsg+0xd9/0x180 [ 399.527259] ? __ia32_sys_shutdown+0x70/0x70 [ 399.531704] ? up_read+0x1a/0x110 [ 399.535164] ? __do_page_fault+0x53a/0xb30 [ 399.539380] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 399.544809] __x64_sys_sendmsg+0x73/0xb0 [ 399.549088] do_syscall_64+0xd0/0x4e0 [ 399.552956] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 399.558121] RIP: 0033:0x445c79 [ 399.561362] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 11 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 399.581573] RSP: 002b:00007f0142d63318 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 399.589261] RAX: ffffffffffffffda RBX: 00000000004cb428 RCX: 0000000000445c79 [ 399.596688] RDX: 0000000000000000 RSI: 0000000020002980 RDI: 0000000000000003 [ 399.604198] RBP: 00000000004cb420 R08: 0000000000000000 R09: 0000000000000000 [ 399.611805] R10: 0000000000000000 R11: 0000000000000246 R12: 6b72616d6e6e6f63 [ 399.619054] R13: 00007ffc31707d0f R14: 00007f0142d63400 R15: 0000000000022000 [ 399.626573] [ 399.628220] Allocated by task 30014: [ 399.631916] kasan_kmalloc.part.1+0x62/0xf0 [ 399.636335] kasan_kmalloc+0xaf/0xc0 [ 399.640026] __kmalloc+0x15d/0x3d0 [ 399.643550] tcf_idr_create+0x55/0x560 [ 399.647428] tcf_connmark_init+0x3d8/0x6a0 [ 399.651751] tcf_action_init_1+0x8c6/0xbc0 [ 399.655961] tcf_action_init+0x178/0x300 [ 399.660107] tcf_action_add+0xf2/0x320 [ 399.663991] tc_ctl_action+0x28d/0x3d0 [ 399.667958] rtnetlink_rcv_msg+0x34f/0x950 [ 399.672185] netlink_rcv_skb+0x13e/0x3d0 [ 399.676222] rtnetlink_rcv+0x10/0x20 [ 399.679912] netlink_unicast+0x443/0x660 [ 399.684135] netlink_sendmsg+0x667/0xc60 [ 399.688175] sock_sendmsg+0xac/0xf0 [ 399.691791] ___sys_sendmsg+0x647/0x950 [ 399.695829] __sys_sendmsg+0xd9/0x180 [ 399.699706] __x64_sys_sendmsg+0x73/0xb0 [ 399.703828] do_syscall_64+0xd0/0x4e0 [ 399.707605] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 399.712882] [ 399.714485] Freed by task 30032: [ 399.717834] __kasan_slab_free+0x13c/0x220 [ 399.722064] kasan_slab_free+0xe/0x10 [ 399.725838] kfree+0xcf/0x220 [ 399.729180] tcf_action_cleanup+0xfd/0x130 [ 399.733391] __tcf_action_put+0xbe/0x100 [ 399.737702] __tcf_idr_release+0x6a/0x90 [ 399.741767] tcf_generic_walker+0x581/0x940 [ 399.746077] tcf_connmark_walker+0x113/0x1d0 [ 399.750549] tca_action_gd+0x7ae/0x1440 [ 399.754577] tc_ctl_action+0x1fe/0x3d0 [ 399.758530] rtnetlink_rcv_msg+0x34f/0x950 [ 399.762748] netlink_rcv_skb+0x13e/0x3d0 [ 399.766782] rtnetlink_rcv+0x10/0x20 [ 399.770469] netlink_unicast+0x443/0x660 [ 399.774561] netlink_sendmsg+0x667/0xc60 [ 399.778600] sock_sendmsg+0xac/0xf0 [ 399.782297] ___sys_sendmsg+0x647/0x950 [ 399.786602] __sys_sendmsg+0xd9/0x180 [ 399.790374] __x64_sys_sendmsg+0x73/0xb0 [ 399.794412] do_syscall_64+0xd0/0x4e0 [ 399.798273] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 399.803636] [ 399.805255] The buggy address belongs to the object at ffff8881f3614b80 [ 399.805255] which belongs to the cache kmalloc-256 of size 256 [ 399.817988] The buggy address is located 0 bytes inside of [ 399.817988] 256-byte region [ffff8881f3614b80, ffff8881f3614c80) [ 399.829663] The buggy address belongs to the page: [ 399.834651] page:ffffea0007cd8500 count:1 mapcount:0 mapping:ffff8881f60007c0 index:0xffff8881f3614cc0 [ 399.844424] flags: 0x17ffe0000000100(slab) [ 399.848641] raw: 017ffe0000000100 ffffea000795a348 ffffea0007ce9588 ffff8881f60007c0 [ 399.856584] raw: ffff8881f3614cc0 ffff8881f3614040 000000010000000b 0000000000000000 [ 399.865331] page dumped because: kasan: bad access detected [ 399.871018] [ 399.872620] Memory state around the buggy address: [ 399.877627] ffff8881f3614a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 399.885058] ffff8881f3614b00: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 399.892413] >ffff8881f3614b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 399.899952] ^ [ 399.903384] ffff8881f3614c00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 399.910721] ffff8881f3614c80: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 399.918150] ================================================================== [ 399.925599] Disabling lock debugging due to kernel taint [ 399.944887] ------------[ cut here ]------------ [ 399.949796] refcount_t: underflow; use-after-free. [ 399.955496] WARNING: CPU: 1 PID: 30025 at lib/refcount.c:280 refcount_dec_not_one+0x141/0x160 [ 399.964325] Modules linked in: [ 399.967660] CPU: 1 PID: 30025 Comm: syz-executor273 Tainted: G B 4.19.204-syzkaller #0 [ 399.976992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 399.986445] RIP: 0010:refcount_dec_not_one+0x141/0x160 [ 399.991702] Code: 83 f8 01 74 29 44 8d 60 ff 44 39 e0 73 8f 80 3d 34 c1 fb 05 00 75 ab 48 c7 c7 00 5f 8b 87 c6 05 24 c1 fb 05 01 e8 eb b0 98 03 <0f> 0b eb 94 31 c0 eb 95 48 89 df e8 bf bb 4a fe e9 3d ff ff ff e8 [ 400.010864] RSP: 0018:ffff8881d4c1f118 EFLAGS: 00010282 [ 400.016206] RAX: 0000000000000000 RBX: ffff8881f3614b9c RCX: 0000000000000000 [ 400.023450] RDX: 0000000000000004 RSI: ffffffff878b7aa0 RDI: ffffffff8a3e1aa0 [ 400.030707] RBP: ffff8881d4c1f1a0 R08: ffffed103ece5081 R09: ffffed103ece5080 [ 400.038181] R10: ffffed103ece5080 R11: ffff8881f6728407 R12: 00000000ffffffff [ 400.045434] R13: ffff8881d4c1f138 R14: 1ffff1103a983e23 R15: ffff8881d4c1f178 [ 400.052863] FS: 00007f0142d63700(0000) GS:ffff8881f6700000(0000) knlGS:0000000000000000 [ 400.061072] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 400.067212] CR2: 0000000020000808 CR3: 00000001e1c47004 CR4: 00000000001606e0 [ 400.074572] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 400.081827] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 400.089080] Call Trace: [ 400.091656] ? refcount_dec_checked+0x40/0x40 [ 400.096484] ? preempt_schedule+0x4d/0x60 [ 400.100606] ? ___preempt_schedule+0x16/0x18 [ 400.104993] refcount_dec_and_lock+0x17/0x50 [ 400.109377] __tcf_action_put+0x42/0x100 [ 400.113426] __tcf_idr_release+0x6a/0x90 [ 400.117499] tcf_action_destroy+0x7d/0xf0 [ 400.121816] tcf_action_init+0x292/0x300 [ 400.125937] ? tcf_action_init_1+0xbc0/0xbc0 [ 400.130333] tcf_action_add+0xf2/0x320 [ 400.134194] ? tca_action_gd+0x1440/0x1440 [ 400.138400] ? __mutex_lock+0xd2f/0x1190 [ 400.142492] ? lock_downgrade+0x860/0x860 [ 400.146655] ? memset+0x31/0x40 [ 400.149920] ? nla_parse+0x34/0x280 [ 400.153670] tc_ctl_action+0x28d/0x3d0 [ 400.157546] ? tcf_action_add+0x320/0x320 [ 400.161686] rtnetlink_rcv_msg+0x34f/0x950 [ 400.165990] ? rtnl_calcit.isra.10+0x360/0x360 [ 400.170550] ? __netlink_lookup+0x2fd/0x630 [ 400.174853] ? lock_downgrade+0x860/0x860 [ 400.178979] netlink_rcv_skb+0x13e/0x3d0 [ 400.183016] ? lock_downgrade+0x860/0x860 [ 400.187137] ? rtnl_calcit.isra.10+0x360/0x360 [ 400.191704] ? netlink_ack+0x990/0x990 [ 400.195578] ? netlink_deliver_tap+0x182/0xb00 [ 400.200135] ? kasan_check_read+0x11/0x20 [ 400.204256] rtnetlink_rcv+0x10/0x20 [ 400.207943] netlink_unicast+0x443/0x660 [ 400.212156] ? netlink_sendskb+0x40/0x40 [ 400.216274] ? _copy_from_iter_full+0x189/0x770 [ 400.220919] ? __check_object_size+0x1e0/0x300 [ 400.225487] netlink_sendmsg+0x667/0xc60 [ 400.229534] ? nlmsg_notify+0x140/0x140 [ 400.233524] ? apparmor_socket_sendmsg+0x1b/0x20 [ 400.238260] ? nlmsg_notify+0x140/0x140 [ 400.242386] sock_sendmsg+0xac/0xf0 [ 400.245990] ___sys_sendmsg+0x647/0x950 [ 400.250040] ? do_huge_pmd_anonymous_page+0xdb8/0x1dd0 [ 400.255388] ? copy_msghdr_from_user+0x430/0x430 [ 400.260125] ? __fget+0x285/0x400 [ 400.263588] ? kasan_check_read+0x11/0x20 [ 400.267978] ? __fget+0x2a2/0x400 [ 400.271418] ? do_dup2+0x3f0/0x3f0 [ 400.275124] ? __handle_mm_fault+0x21a4/0x4100 [ 400.279681] ? __fget_light+0x174/0x1e0 [ 400.283625] ? __fdget+0xe/0x10 [ 400.287060] __sys_sendmsg+0xd9/0x180 [ 400.290834] ? __ia32_sys_shutdown+0x70/0x70 [ 400.295226] ? up_read+0x1a/0x110 [ 400.298668] ? __do_page_fault+0x53a/0xb30 [ 400.304114] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 400.309728] __x64_sys_sendmsg+0x73/0xb0 [ 400.313962] do_syscall_64+0xd0/0x4e0 [ 400.317838] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 400.323095] RIP: 0033:0x445c79 [ 400.326264] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 11 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 400.345392] RSP: 002b:00007f0142d63318 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 400.353083] RAX: ffffffffffffffda RBX: 00000000004cb428 RCX: 0000000000445c79 [ 400.360510] RDX: 0000000000000000 RSI: 0000000020002980 RDI: 0000000000000003 [ 400.367756] RBP: 00000000004cb420 R08: 0000000000000000 R09: 0000000000000000 [ 400.375003] R10: 0000000000000000 R11: 0000000000000246 R12: 6b72616d6e6e6f63 [ 400.382292] R13: 00007ffc31707d0f R14: 00007f0142d63400 R15: 0000000000022000 [ 400.389564] irq event stamp: 284 [ 400.393003] hardirqs last enabled at (283): [] __free_pages_ok+0x616/0xd60 [ 400.401902] hardirqs last disabled at (284): [] _raw_spin_lock_irqsave+0x74/0xd0 [ 400.411291] softirqs last enabled at (220): [] __do_softirq+0x62d/0x919 [ 400.420208] softirqs last disabled at (129): [] irq_exit+0x17f/0x1c0 [ 400.428360] ---[ end trace 7521c076108ecb3a ]--- [ 400.436143] netlink: 32 bytes leftover after parsing attributes in process `syz-executor273'. [ 400.446638] netlink: 32 bytes leftover after parsing attributes in process `syz-executor273'. [ 400.456029] netlink: 32 bytes leftover after parsing attributes in process `syz-executor273'. [ 400.465337] netlink: 32 bytes leftover after parsing attributes in process `syz-executor273'. [ 401.313483] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 401.320315] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 401.328877] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 401.336123] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 401.343539] device bridge_slave_1 left promiscuous mode [ 401.348948] bridge0: port 2(bridge_slave_1) entered disabled state [ 401.371302] device bridge_slave_0 left promiscuous mode [ 401.376887] bridge0: port 1(bridge_slave_0) entered disabled state [ 401.432109] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 401.439057] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 401.448042] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 401.455099] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 401.463993] device bridge_slave_1 left promiscuous mode [ 401.469817] bridge0: port 2(bridge_slave_1) entered disabled state [ 401.511233] device bridge_slave_0 left promiscuous mode [ 401.516856] bridge0: port 1(bridge_slave_0) entered disabled state [ 401.562264] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 401.568986] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 401.576484] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 401.583724] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 401.591406] device bridge_slave_1 left promiscuous mode [ 401.596829] bridge0: port 2(bridge_slave_1) entered disabled state [ 401.641173] device bridge_slave_0 left promiscuous mode [ 401.646668] bridge0: port 1(bridge_slave_0) entered disabled state [ 401.702383] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 401.709458] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 401.717658] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 401.724850] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 401.732689] device bridge_slave_1 left promiscuous mode [ 401.738618] bridge0: port 2(bridge_slave_1) entered disabled state [ 401.771260] device bridge_slave_0 left promiscuous mode [ 401.776727] bridge0: port 1(bridge_slave_0) entered disabled state [ 401.832208] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 401.839063] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 401.846699] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 401.853975] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 401.861304] device bridge_slave_1 left promiscuous mode [ 401.866768] bridge0: port 2(bridge_slave_1) entered disabled state [ 401.921467] device bridge_slave_0 left promiscuous mode [ 401.927159] bridge0: port 1(bridge_slave_0) entered disabled state [ 401.984071] device veth1_macvtap left promiscuous mode [ 401.989583] device veth0_macvtap left promiscuous mode [ 401.995406] device veth1_vlan left promiscuous mode [ 402.000700] device veth0_vlan left promiscuous mode [ 402.006684] device veth1_macvtap left promiscuous mode [ 402.012274] device veth0_macvtap left promiscuous mode [ 402.017952] device veth1_vlan left promiscuous mode [ 402.023987] device veth0_vlan left promiscuous mode [ 402.029265] device veth1_macvtap left promiscuous mode [ 402.035155] device veth0_macvtap left promiscuous mode [ 402.041663] device veth1_vlan left promiscuous mode [ 402.046790] device veth0_vlan left promiscuous mode [ 402.052844] device veth1_macvtap left promiscuous mode [ 402.058752] device veth0_macvtap left promiscuous mode [ 402.064985] device veth1_vlan left promiscuous mode [ 402.070130] device veth0_vlan left promiscuous mode [ 402.075759] device veth1_macvtap left promiscuous mode [ 402.082129] device veth0_macvtap left promiscuous mode [ 402.087496] device veth1_vlan left promiscuous mode [ 402.092772] device veth0_vlan left promiscuous mode [ 402.256158] device hsr_slave_1 left promiscuous mode [ 402.282108] device hsr_slave_0 left promiscuous mode [ 402.354908] team0 (unregistering): Port device team_slave_1 removed [ 402.362746] team0 (unregistering): Port device team_slave_0 removed [ 402.370476] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 402.393459] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 402.439909] bond0 (unregistering): Released all slaves [ 402.513135] device hsr_slave_1 left promiscuous mode [ 402.552142] device hsr_slave_0 left promiscuous mode [ 402.595517] team0 (unregistering): Port device team_slave_1 removed [ 402.603710] team0 (unregistering): Port device team_slave_0 removed [ 402.611989] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 402.643746] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 402.700583] bond0 (unregistering): Released all slaves [ 402.792388] device hsr_slave_1 left promiscuous mode [ 402.832506] device hsr_slave_0 left promiscuous mode [ 402.914767] team0 (unregistering): Port device team_slave_1 removed [ 402.923293] team0 (unregistering): Port device team_slave_0 removed [ 402.931688] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 403.002902] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 403.060486] bond0 (unregistering): Released all slaves [ 403.152333] device hsr_slave_1 left promiscuous mode [ 403.202572] device hsr_slave_0 left promiscuous mode [ 403.254904] team0 (unregistering): Port device team_slave_1 removed [ 403.262848] team0 (unregistering): Port device team_slave_0 removed [ 403.270869] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 403.312499] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 403.359767] bond0 (unregistering): Released all slaves [ 403.433320] device hsr_slave_1 left promiscuous mode [ 403.472342] device hsr_slave_0 left promiscuous mode [ 403.514621] team0 (unregistering): Port device team_slave_1 removed [ 403.522556] team0 (unregistering): Port device team_slave_0 removed [ 403.530607] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 403.572466] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 403.620722] bond0 (unregistering): Released all slaves [ 404.190830] nla_parse: 267 callbacks suppressed [ 404.190833] netlink: 32 bytes leftover after parsing attributes in process `syz-executor273'. [ 404.204526] netlink: 32 bytes leftover after parsing attributes in process `syz-executor273'. [ 404.213417] netlink: 32 bytes leftover after parsing attributes in process `syz-executor273'. [ 404.281112] netlink: 32 bytes leftover after parsing attributes in process `syz-executor273'. [ 404.290031] netlink: 32 bytes leftover after parsing attributes in process `syz-executor273'. [ 404.299479] netlink: 32 bytes leftover after parsing attributes in process `syz-executor273'. [ 404.315366] netlink: 32 bytes leftover after parsing attributes in process `syz-executor273'. [ 404.326384] netlink: 32 bytes leftover after parsing attributes in process `syz-executor273'. [ 404.336405] netlink: 32 bytes leftover after parsing attributes in process `syz-executor273'. [ 404.346380] netlink: 32 bytes leftover after parsing attributes in process `syz-executor273'. [ 409.204925] nla_parse: 1654 callbacks suppressed [ 409.204929] netlink: 32 bytes leftover after parsing attributes in process `syz-executor273'. [ 409.220085] netlink: 32 bytes leftover after parsing attributes in process `syz-executor273'. [ 409.229128] netlink: 32 bytes leftover after parsing attributes in process `syz-executor273'. [ 409.239171] netlink: 32 bytes leftover after parsing attributes in process `syz-executor273'. [ 409.249063] netlink: 32 bytes leftover after parsing attributes in process `syz-executor273'. [ 409.264694] netlink: 32 bytes leftover after parsing attributes in process `syz-executor273'. [ 409.274198] netlink: 32 bytes leftover after parsing attributes in process `syz-executor273'. [ 409.283442] netlink: 32 bytes leftover after parsing attributes in process `syz-executor273'. [ 409.292721] netlink: 32 bytes leftover after parsing attributes in process `syz-executor273'.