[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 58.047922][ T26] audit: type=1800 audit(1572036863.597:25): pid=8620 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 58.078689][ T26] audit: type=1800 audit(1572036863.607:26): pid=8620 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 58.107287][ T26] audit: type=1800 audit(1572036863.607:27): pid=8620 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.21' (ECDSA) to the list of known hosts. 2019/10/25 20:54:33 fuzzer started 2019/10/25 20:54:34 dialing manager at 10.128.0.26:45165 2019/10/25 20:54:35 syscalls: 2534 2019/10/25 20:54:35 code coverage: enabled 2019/10/25 20:54:35 comparison tracing: enabled 2019/10/25 20:54:35 extra coverage: extra coverage is not supported by the kernel 2019/10/25 20:54:35 setuid sandbox: enabled 2019/10/25 20:54:35 namespace sandbox: enabled 2019/10/25 20:54:35 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/25 20:54:35 fault injection: enabled 2019/10/25 20:54:35 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/25 20:54:35 net packet injection: enabled 2019/10/25 20:54:35 net device setup: enabled 2019/10/25 20:54:35 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 20:56:55 executing program 0: 20:56:55 executing program 1: syzkaller login: [ 210.229955][ T8791] IPVS: ftp: loaded support on port[0] = 21 [ 210.363410][ T8793] IPVS: ftp: loaded support on port[0] = 21 20:56:56 executing program 2: [ 210.455282][ T8791] chnl_net:caif_netlink_parms(): no params data found [ 210.566231][ T8791] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.574575][ T8791] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.583139][ T8791] device bridge_slave_0 entered promiscuous mode [ 210.604315][ T8791] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.619528][ T8791] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.648487][ T8791] device bridge_slave_1 entered promiscuous mode [ 210.666231][ T8793] chnl_net:caif_netlink_parms(): no params data found [ 210.687887][ T8791] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 210.712781][ T8798] IPVS: ftp: loaded support on port[0] = 21 [ 210.727523][ T8791] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 20:56:56 executing program 3: [ 210.788932][ T8793] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.796019][ T8793] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.819422][ T8793] device bridge_slave_0 entered promiscuous mode [ 210.836376][ T8791] team0: Port device team_slave_0 added [ 210.863528][ T8793] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.878836][ T8793] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.886819][ T8793] device bridge_slave_1 entered promiscuous mode [ 210.910185][ T8791] team0: Port device team_slave_1 added [ 210.963022][ T8793] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 20:56:56 executing program 4: [ 211.041377][ T8791] device hsr_slave_0 entered promiscuous mode [ 211.078871][ T8791] device hsr_slave_1 entered promiscuous mode [ 211.130949][ T8793] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 211.143320][ T8800] IPVS: ftp: loaded support on port[0] = 21 [ 211.299242][ T8793] team0: Port device team_slave_0 added [ 211.311896][ T8793] team0: Port device team_slave_1 added [ 211.334386][ T8802] IPVS: ftp: loaded support on port[0] = 21 20:56:56 executing program 5: [ 211.393646][ T8798] chnl_net:caif_netlink_parms(): no params data found [ 211.443180][ T8793] device hsr_slave_0 entered promiscuous mode [ 211.528789][ T8793] device hsr_slave_1 entered promiscuous mode [ 211.579435][ T8793] debugfs: Directory 'hsr0' with parent '/' already present! [ 211.657976][ T8805] IPVS: ftp: loaded support on port[0] = 21 [ 211.667117][ T8800] chnl_net:caif_netlink_parms(): no params data found [ 211.783357][ T8798] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.791310][ T8798] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.799617][ T8798] device bridge_slave_0 entered promiscuous mode [ 211.807104][ T8798] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.816222][ T8798] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.823977][ T8798] device bridge_slave_1 entered promiscuous mode [ 211.857805][ T8800] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.865447][ T8800] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.873657][ T8800] device bridge_slave_0 entered promiscuous mode [ 211.883512][ T8800] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.890934][ T8800] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.898977][ T8800] device bridge_slave_1 entered promiscuous mode [ 211.907493][ T8802] chnl_net:caif_netlink_parms(): no params data found [ 211.926040][ T8798] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 211.938636][ T8798] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 212.006597][ T8800] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 212.019362][ T8800] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 212.053712][ T8798] team0: Port device team_slave_0 added [ 212.074421][ T8791] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.090297][ T8798] team0: Port device team_slave_1 added [ 212.096968][ T8800] team0: Port device team_slave_0 added [ 212.117085][ T8802] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.125765][ T8802] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.134908][ T8802] device bridge_slave_0 entered promiscuous mode [ 212.143367][ T8802] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.150478][ T8802] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.158170][ T8802] device bridge_slave_1 entered promiscuous mode [ 212.166563][ T8800] team0: Port device team_slave_1 added [ 212.206091][ T8802] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 212.291841][ T8798] device hsr_slave_0 entered promiscuous mode [ 212.328821][ T8798] device hsr_slave_1 entered promiscuous mode [ 212.368774][ T8798] debugfs: Directory 'hsr0' with parent '/' already present! [ 212.383471][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 212.392237][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.401791][ T8802] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 212.460273][ T8800] device hsr_slave_0 entered promiscuous mode [ 212.498882][ T8800] device hsr_slave_1 entered promiscuous mode [ 212.548548][ T8800] debugfs: Directory 'hsr0' with parent '/' already present! [ 212.581046][ T8805] chnl_net:caif_netlink_parms(): no params data found [ 212.593144][ T8791] 8021q: adding VLAN 0 to HW filter on device team0 [ 212.610396][ T8802] team0: Port device team_slave_0 added [ 212.646216][ T8802] team0: Port device team_slave_1 added [ 212.669087][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 212.677707][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.686475][ T8797] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.693645][ T8797] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.747241][ T96] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 212.757403][ T96] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 212.766296][ T96] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 212.775228][ T96] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.782325][ T96] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.791035][ T96] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 212.851545][ T8802] device hsr_slave_0 entered promiscuous mode [ 212.889066][ T8802] device hsr_slave_1 entered promiscuous mode [ 212.928721][ T8802] debugfs: Directory 'hsr0' with parent '/' already present! [ 212.943298][ T8793] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.950759][ T8805] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.957815][ T8805] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.966464][ T8805] device bridge_slave_0 entered promiscuous mode [ 212.975551][ T8805] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.982731][ T8805] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.990722][ T8805] device bridge_slave_1 entered promiscuous mode [ 213.005295][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 213.066502][ T8805] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 213.077201][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 213.089990][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 213.099774][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 213.124556][ T8805] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 213.136012][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 213.143801][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.152828][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 213.162036][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 213.171325][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 213.179938][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 213.188294][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 213.196856][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 213.210266][ T8793] 8021q: adding VLAN 0 to HW filter on device team0 [ 213.245366][ T8805] team0: Port device team_slave_0 added [ 213.253920][ T8791] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 213.263069][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 213.273160][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 213.283243][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.290331][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.298066][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 213.320329][ T8805] team0: Port device team_slave_1 added [ 213.332635][ T8808] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 213.341251][ T8808] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 213.350172][ T8808] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.357210][ T8808] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.370908][ T8800] 8021q: adding VLAN 0 to HW filter on device bond0 [ 213.401847][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 213.411615][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 213.420528][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 213.429618][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 213.446760][ T8800] 8021q: adding VLAN 0 to HW filter on device team0 [ 213.510424][ T8805] device hsr_slave_0 entered promiscuous mode [ 213.548929][ T8805] device hsr_slave_1 entered promiscuous mode [ 213.588603][ T8805] debugfs: Directory 'hsr0' with parent '/' already present! [ 213.599816][ T8791] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 213.606905][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 213.622085][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 213.630577][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.638304][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 213.647429][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 213.667627][ T8793] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 213.679246][ T8793] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 213.716059][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 213.732350][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 213.744888][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 213.753810][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 213.762850][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 213.771613][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 213.780484][ T8797] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.787521][ T8797] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.795189][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 213.804096][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 213.812668][ T8797] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.819756][ T8797] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.827379][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 213.836449][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 213.845093][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 213.852975][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 213.874907][ T8808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 213.884808][ T8808] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 213.894688][ T8808] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 213.909163][ T8793] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 213.940355][ T8802] 8021q: adding VLAN 0 to HW filter on device bond0 [ 213.961207][ T8798] 8021q: adding VLAN 0 to HW filter on device bond0 [ 213.975535][ T8809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 213.991333][ T8809] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 214.023120][ T8802] 8021q: adding VLAN 0 to HW filter on device team0 [ 214.030383][ T8808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 214.039152][ T8808] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.047316][ T8808] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 214.056194][ T8808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.064208][ T8808] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 214.075475][ T8808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.085550][ T8798] 8021q: adding VLAN 0 to HW filter on device team0 [ 214.105911][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 214.114750][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 214.123686][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 214.139714][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 214.148014][ T8797] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.155096][ T8797] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.165791][ T8797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 214.194476][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 20:56:59 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000008c0)=ANY=[@ANYPTR], 0x1}], 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r0], 0x14}, 0x0) recvmmsg(r1, &(0x7f0000009100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=""/16, 0x10}}], 0x1, 0x0, 0x0) [ 214.240697][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 214.257963][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 20:56:59 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x0) read$char_usb(r0, &(0x7f00000003c0)=""/102400, 0xfffffe5a) read$alg(r0, &(0x7f00000193c0)=""/143, 0x8f) [ 214.314749][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.321900][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.341490][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 214.350418][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 20:56:59 executing program 1: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKGETSIZE(r0, 0x1260, 0x0) 20:56:59 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000180)=0x5) [ 214.371185][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.378275][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.398986][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 214.407849][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 214.421304][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 214.431475][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 214.440265][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.447309][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state 20:57:00 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, &(0x7f0000000040)=[{&(0x7f0000000180)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) [ 214.479794][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 214.503535][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 214.533980][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 214.545705][ C1] hrtimer: interrupt took 26482 ns [ 214.614863][ T8843] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 214.646450][ T8802] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network 20:57:00 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x95b7, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) prctl$PR_SET_THP_DISABLE(0x29, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x0) read$char_usb(0xffffffffffffffff, &(0x7f0000000040)=""/3, 0x3) ftruncate(r3, 0xee72) sendfile(r2, r3, 0x0, 0x8000fffffffe) [ 214.663647][ T8802] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 214.701391][ T8800] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 214.710310][ T8808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 214.733847][ T8808] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 214.775798][ T8808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 214.784895][ T8808] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 214.800799][ T8808] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 20:57:00 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x95b7, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) prctl$PR_SET_THP_DISABLE(0x29, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x0) read$char_usb(0xffffffffffffffff, &(0x7f0000000040)=""/3, 0x3) ftruncate(r3, 0xee72) sendfile(r2, r3, 0x0, 0x8000fffffffe) [ 214.820001][ T8808] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 214.833903][ T8808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 214.843606][ T8808] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.861906][ T8808] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 214.874928][ T8808] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 214.887259][ T8808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 214.902558][ T8808] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.916205][ T8808] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 214.928004][ T8808] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 214.943667][ T8808] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 214.952916][ T8808] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 214.966003][ T8808] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 214.979103][ T8798] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 214.990897][ T8798] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 20:57:00 executing program 1: mknod(&(0x7f00000001c0)='./file0\x00', 0x200001040, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x3e) recvfrom$unix(r2, 0x0, 0xfffffffffffffe45, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) creat(&(0x7f0000000040)='./file0\x00', 0x0) [ 215.030957][ T8809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 215.050449][ T8809] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 215.118166][ T8802] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 215.136392][ T8805] 8021q: adding VLAN 0 to HW filter on device bond0 [ 215.186211][ T8798] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 215.205908][ T8805] 8021q: adding VLAN 0 to HW filter on device team0 [ 215.214306][ T8809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.233927][ T8809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.294762][ T8809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.310281][ T8809] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.323106][ T8809] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.330227][ T8809] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.354327][ T8809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.363625][ T8809] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.374242][ T8809] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.381351][ T8809] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.389978][ T8809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 215.404560][ T8809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 215.436120][ T8809] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 215.445619][ T8809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 215.464152][ T8809] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 215.475834][ T8809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 215.484678][ T8809] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 215.493012][ T8809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 215.501448][ T8809] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 215.509846][ T8809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 215.517989][ T8809] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 215.527747][ T8805] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 215.549330][ T8809] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 215.609995][ T8805] 8021q: adding VLAN 0 to HW filter on device batadv0 20:57:01 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) syz_open_pts(r0, 0x0) close(r0) 20:57:01 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x95b7, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) prctl$PR_SET_THP_DISABLE(0x29, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x0) read$char_usb(0xffffffffffffffff, &(0x7f0000000040)=""/3, 0x3) ftruncate(r3, 0xee72) sendfile(r2, r3, 0x0, 0x8000fffffffe) 20:57:01 executing program 3: 20:57:01 executing program 1: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) read$char_usb(0xffffffffffffffff, 0x0, 0x0) read$char_usb(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ftruncate(r2, 0xee72) sendfile(r1, r2, 0x0, 0x8000fffffffe) dup(0xffffffffffffffff) 20:57:01 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r0, 0x0) close(r0) 20:57:01 executing program 5: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) read$char_usb(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x0) read$char_usb(r3, &(0x7f0000000040)=""/3, 0x3) ftruncate(r2, 0xee72) sendfile(r1, r2, 0x0, 0x8000fffffffe) 20:57:01 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x60001) writev(r0, &(0x7f0000000a80)=[{&(0x7f0000000080)='\x00', 0x1}], 0x1) 20:57:01 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x95b7, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) prctl$PR_SET_THP_DISABLE(0x29, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x0) read$char_usb(0xffffffffffffffff, &(0x7f0000000040)=""/3, 0x3) ftruncate(r3, 0xee72) sendfile(r2, r3, 0x0, 0x8000fffffffe) 20:57:01 executing program 5: 20:57:01 executing program 4: 20:57:01 executing program 3: 20:57:01 executing program 1: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) read$char_usb(0xffffffffffffffff, 0x0, 0x0) read$char_usb(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ftruncate(r2, 0xee72) sendfile(r1, r2, 0x0, 0x8000fffffffe) dup(0xffffffffffffffff) 20:57:01 executing program 2: 20:57:01 executing program 5: 20:57:01 executing program 4: 20:57:01 executing program 3: r0 = socket(0x10, 0x802, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b400000002e4ff19730a20ff000000009500000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0xfffffffffffffef3}, 0x15) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000002c0)=r1, 0x4) write(r0, &(0x7f0000000100)="fc0000001c000705ab092506090007000aab08000600000002002593210001c000000000000e00000000b6db29e99815fa2c1e75c28656aaa79bb9d95662070000bc000c00f0036c6c256f1a272fdf0d110600d633d6406a007a01007a8934d07302ade01720d3d5bbc91a3e2e80772c05defc83ab82f605f70cec18444eb29d20f3d92c834fdc5bba4a46143ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dffff8407372e883661f545304dc30083df150cb2880f7f0000000000b4d57155870258a1000052c52d00000000000080000041f0d48f6f0000180548deac270e33429fd31101350000000000", 0xfc) 20:57:01 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(0x0, &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) clock_gettime(0x6, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x800000) syz_open_dev$loop(&(0x7f0000001340)='/dev/loop#\x00', 0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000002c0)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}]}, 0x2c, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) [ 216.439605][ T8945] BPF:hdr_len not found 20:57:02 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x95b7, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) prctl$PR_SET_THP_DISABLE(0x29, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x0) read$char_usb(0xffffffffffffffff, &(0x7f0000000040)=""/3, 0x3) sendfile(r2, r3, 0x0, 0x8000fffffffe) 20:57:02 executing program 5: 20:57:02 executing program 4: [ 216.484318][ T8945] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.3'. 20:57:02 executing program 3: 20:57:02 executing program 4: 20:57:02 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000008c0)=ANY=[@ANYPTR], 0x1}], 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r0], 0x14}, 0x0) 20:57:02 executing program 1: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) read$char_usb(0xffffffffffffffff, 0x0, 0x0) read$char_usb(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ftruncate(r2, 0xee72) sendfile(r1, r2, 0x0, 0x8000fffffffe) dup(0xffffffffffffffff) 20:57:02 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = timerfd_create(0x0, 0x0) dup3(r1, r0, 0x0) 20:57:02 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x95b7, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) prctl$PR_SET_THP_DISABLE(0x29, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x0) read$char_usb(0xffffffffffffffff, &(0x7f0000000040)=""/3, 0x3) sendfile(r2, r3, 0x0, 0x8000fffffffe) 20:57:02 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) clock_gettime(0x6, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffff60, 0x0, 0x0, 0x2f95a3c3cb55ab4b) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x800000) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000002c0)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}]}, 0x2c, 0x0) 20:57:02 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = fcntl$getown(r0, 0x9) fcntl$lock(r0, 0x24, &(0x7f0000000080)={0x0, 0xe, 0x0, 0x9, r2}) sendto$inet(r1, 0x0, 0xffffffffffffff60, 0x0, 0x0, 0x2f95a3c3cb55ab4b) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r3, &(0x7f00000017c0), 0x315, 0x800000) syz_open_dev$loop(&(0x7f0000001340)='/dev/loop#\x00', 0x0, 0x0) 20:57:02 executing program 2: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="40543e75e5bb03000000148c0f34"], 0xe}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0)={0xe6, 0x0, 0x5, 0x0, 0x6}, &(0x7f0000000180), 0x0, 0x0) tkill(r0, 0x40020000000c) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @cond=[{}, {0x0, 0x0, 0x0, 0x40}]}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:57:02 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x95b7, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) prctl$PR_SET_THP_DISABLE(0x29, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x0) read$char_usb(0xffffffffffffffff, &(0x7f0000000040)=""/3, 0x3) sendfile(r2, r3, 0x0, 0x8000fffffffe) 20:57:02 executing program 5: r0 = socket(0x10, 0x800000000000803, 0x0) sendto(r0, &(0x7f0000000140)="120000001600e70d017b00000000008e1584", 0x28f, 0x0, 0x0, 0x3d4) recvmmsg(r0, &(0x7f0000002c40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 20:57:02 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000300)=0x2000000000005ea, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000140)=0x1) sendto$inet(r0, 0x0, 0x0, 0x200007fb, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0xfe20) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x8) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x5, &(0x7f0000000380)=[{&(0x7f0000000400)=""/199, 0xfffffe80}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000340)=""/42, 0x2a}], 0x2, 0x0, 0x181, 0x200f00}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0xf43185f1) [ 217.192409][ T8996] ptrace attach of "/root/syz-executor.2"[8995] was attempted by "/root/syz-executor.2"[8996] 20:57:02 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) clock_gettime(0x6, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffff60, 0x0, 0x0, 0x2f95a3c3cb55ab4b) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x800000) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000002c0)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}]}, 0x2c, 0x0) 20:57:02 executing program 5: r0 = socket(0x10, 0x800000000000803, 0x0) sendto(r0, &(0x7f0000000140)="120000001600e70d017b00000000008e1584", 0x28f, 0x0, 0x0, 0x3d4) recvmmsg(r0, &(0x7f0000002c40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 20:57:03 executing program 1: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) read$char_usb(0xffffffffffffffff, 0x0, 0x0) read$char_usb(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ftruncate(r2, 0xee72) sendfile(r1, r2, 0x0, 0x8000fffffffe) dup(0xffffffffffffffff) 20:57:03 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = fcntl$getown(r0, 0x9) fcntl$lock(r0, 0x24, &(0x7f0000000080)={0x0, 0xe, 0x0, 0x9, r2}) sendto$inet(r1, 0x0, 0xffffffffffffff60, 0x0, 0x0, 0x2f95a3c3cb55ab4b) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r3, &(0x7f00000017c0), 0x315, 0x800000) syz_open_dev$loop(&(0x7f0000001340)='/dev/loop#\x00', 0x0, 0x0) 20:57:03 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x95b7, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) prctl$PR_SET_THP_DISABLE(0x29, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x0) ftruncate(r3, 0xee72) sendfile(r2, r3, 0x0, 0x8000fffffffe) 20:57:03 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = fcntl$getown(r0, 0x9) fcntl$lock(r0, 0x24, &(0x7f0000000080)={0x0, 0xe, 0x0, 0x9, r2}) sendto$inet(r1, 0x0, 0xffffffffffffff60, 0x0, 0x0, 0x2f95a3c3cb55ab4b) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r3, &(0x7f00000017c0), 0x315, 0x800000) syz_open_dev$loop(&(0x7f0000001340)='/dev/loop#\x00', 0x0, 0x0) 20:57:03 executing program 1: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) read$char_usb(0xffffffffffffffff, 0x0, 0x0) read$char_usb(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ftruncate(r2, 0xee72) sendfile(r1, r2, 0x0, 0x8000fffffffe) 20:57:03 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x95b7, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) prctl$PR_SET_THP_DISABLE(0x29, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x0) ftruncate(r3, 0xee72) sendfile(r2, r3, 0x0, 0x8000fffffffe) 20:57:03 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0xf000000, 0x0, 0x0, 0x0, 0x78}}], 0x371, 0x10002, 0x0) 20:57:03 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = fcntl$getown(r0, 0x9) fcntl$lock(r0, 0x24, &(0x7f0000000080)={0x0, 0xe, 0x0, 0x9, r2}) sendto$inet(r1, 0x0, 0xffffffffffffff60, 0x0, 0x0, 0x2f95a3c3cb55ab4b) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r3, &(0x7f00000017c0), 0x315, 0x800000) syz_open_dev$loop(&(0x7f0000001340)='/dev/loop#\x00', 0x0, 0x0) 20:57:03 executing program 5: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000010010000010000007700000000000000f41b25e406d58937e7e899e0524843c9577f89f71ebddf077798b47ab4a76907477a209522adca7e5454b7dec9d9a67305c04a8ccffca56ccbcabfb25cc94628348a24593c5dbdf200796a8fd217367c017f76f131c8693ac43b77471be914707d2c3545b812f7f58f436706f17b26aebac8e1ae913379902436610c52b724993141a5cb7a0a9c3dca0a16787a4d0c82e2d9829219e3d981d196f1b7256c49aacd6b000000002150a4058a8e4347e13f94be6d87fc7ecdafb88b1a5cde17a53552e6797c056103b8d9e4eac3f0076580f6e76aec101fc935e5c25fac970f73d3fe7d1f036c1e5b40464269b3a1071a96f3d5fdf7a8e7b907d236e91a85b6e2a13b6b5eb5b800000000"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0xf000000, 0x0, 0x0, 0x0, 0x78}}], 0x371, 0x10002, 0x0) 20:57:04 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000300)=0x2000000000005ea, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000140)=0x1) sendto$inet(r0, 0x0, 0x0, 0x200007fb, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0xfe20) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x8) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x5, &(0x7f0000000380)=[{&(0x7f0000000400)=""/199, 0xfffffe80}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000340)=""/42, 0x2a}], 0x2, 0x0, 0x181, 0x200f00}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0xf43185f1) 20:57:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0xa9}], 0x1, 0x0) 20:57:04 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x95b7, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) prctl$PR_SET_THP_DISABLE(0x29, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x0) ftruncate(r3, 0xee72) sendfile(r2, r3, 0x0, 0x8000fffffffe) 20:57:04 executing program 1: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) read$char_usb(0xffffffffffffffff, 0x0, 0x0) read$char_usb(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ftruncate(r2, 0xee72) sendfile(r1, r2, 0x0, 0x8000fffffffe) 20:57:04 executing program 5: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0xf000000, 0x0, 0x0, 0x0, 0x78}}], 0x371, 0x10002, 0x0) 20:57:04 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000300)=0x2000000000005ea, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000140)=0x1) sendto$inet(r0, 0x0, 0x0, 0x200007fb, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0xfe20) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x8) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x5, &(0x7f0000000380)=[{&(0x7f0000000400)=""/199, 0xfffffe80}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000340)=""/42, 0x2a}], 0x2, 0x0, 0x181, 0x200f00}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0xf43185f1) [ 218.884767][ T9086] ================================================================== [ 218.893041][ T9086] BUG: KASAN: use-after-free in nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 218.901370][ T9086] Read of size 1 at addr ffff8880981f1d04 by task syz-executor.5/9086 [ 218.909514][ T9086] [ 218.911860][ T9086] CPU: 0 PID: 9086 Comm: syz-executor.5 Not tainted 5.4.0-rc4-next-20191025 #0 [ 218.920789][ T9086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 20:57:04 executing program 1: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) read$char_usb(0xffffffffffffffff, 0x0, 0x0) read$char_usb(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ftruncate(r2, 0xee72) sendfile(r1, r2, 0x0, 0x8000fffffffe) [ 218.931502][ T9086] Call Trace: [ 218.931538][ T9086] dump_stack+0x172/0x1f0 [ 218.931559][ T9086] ? nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 218.931585][ T9086] print_address_description.constprop.0.cold+0xd4/0x30b [ 218.931601][ T9086] ? nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 218.931617][ T9086] ? nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 218.931633][ T9086] __kasan_report.cold+0x1b/0x41 [ 218.931650][ T9086] ? nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 218.931668][ T9086] kasan_report+0x12/0x20 [ 218.931684][ T9086] __asan_report_load1_noabort+0x14/0x20 [ 218.931698][ T9086] nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 218.931717][ T9086] ? nf_ct_expect_unregister_notifier+0x140/0x140 [ 218.931735][ T9086] ? nf_confirm+0x22/0x4d0 [ 218.931755][ T9086] nf_confirm+0x3d8/0x4d0 [ 218.931774][ T9086] ipv4_confirm+0x14c/0x240 [ 218.931792][ T9086] nf_hook_slow+0xbc/0x1e0 [ 218.931811][ T9086] ip_output+0x40d/0x670 [ 218.931828][ T9086] ? ip_mc_output+0xf60/0xf60 [ 218.931846][ T9086] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 218.931863][ T9086] ? __ip_finish_output+0xbd0/0xbd0 [ 218.931879][ T9086] ? __this_cpu_preempt_check+0x35/0x190 [ 218.931898][ T9086] ? retint_kernel+0x2b/0x2b [ 218.931922][ T9086] ip_local_out+0xbb/0x1b0 [ 218.931939][ T9086] ip_send_skb+0x42/0xf0 [ 218.931957][ T9086] udp_send_skb.isra.0+0x6d5/0x11b0 [ 218.931973][ T9086] ? xfrm_lookup_route+0x5b/0x1e0 [ 218.931995][ T9086] udp_sendmsg+0x1e8f/0x2810 [ 218.932015][ T9086] ? ip_reply_glue_bits+0xc0/0xc0 [ 218.932034][ T9086] ? udp_unicast_rcv_skb.isra.0+0x360/0x360 [ 218.932052][ T9086] ? tomoyo_unix_entry+0x5d0/0x5d0 [ 218.932086][ T9086] ? ___might_sleep+0x163/0x2c0 [ 218.932110][ T9086] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 218.932124][ T9086] ? aa_sk_perm+0x288/0x870 [ 218.932148][ T9086] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 218.932170][ T9086] inet_sendmsg+0x9e/0xe0 [ 218.932185][ T9086] ? inet_sendmsg+0x9e/0xe0 [ 218.932200][ T9086] ? inet_send_prepare+0x4e0/0x4e0 [ 218.932217][ T9086] sock_sendmsg+0xd7/0x130 [ 218.932233][ T9086] kernel_sendmsg+0x44/0x50 [ 218.932263][ T9086] rxrpc_send_data_packet+0x10cb/0x36b0 [ 218.932282][ T9086] ? mark_lock+0xc2/0x1220 [ 218.932304][ T9086] ? rxrpc_send_abort_packet+0xe70/0xe70 [ 218.932319][ T9086] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 218.932332][ T9086] ? lockdep_hardirqs_on+0x421/0x5e0 [ 218.932358][ T9086] ? __this_cpu_preempt_check+0x35/0x190 [ 218.932373][ T9086] ? retint_kernel+0x2b/0x2b [ 218.932401][ T9086] rxrpc_send_data+0x1097/0x4130 [ 218.932415][ T9086] ? rxrpc_send_data+0x1097/0x4130 [ 218.932430][ T9086] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 218.932447][ T9086] ? retint_kernel+0x2b/0x2b [ 218.932478][ T9086] ? rxrpc_kernel_abort_call+0x8b0/0x8b0 [ 218.932497][ T9086] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 218.932514][ T9086] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 218.932529][ T9086] ? rxrpc_new_client_call+0xa7a/0x1ad0 [ 218.932549][ T9086] ? __sanitizer_cov_trace_pc+0x1/0x50 [ 218.932567][ T9086] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 218.932582][ T9086] ? rxrpc_new_client_call+0xc31/0x1ad0 [ 218.932602][ T9086] ? rxrpc_put_peer+0x106/0x760 [ 218.932621][ T9086] rxrpc_do_sendmsg+0xb8e/0x1d5f [ 218.932644][ T9086] ? rxrpc_kernel_send_data+0x4e0/0x4e0 [ 218.932657][ T9086] ? mutex_unlock+0xd/0x10 [ 218.932681][ T9086] ? rxrpc_sendmsg+0x2ce/0x5f0 [ 218.932698][ T9086] ? write_comp_data+0x9/0x70 [ 218.932718][ T9086] rxrpc_sendmsg+0x4d6/0x5f0 [ 218.932735][ T9086] ? rxrpc_kernel_probe_life+0x40/0x40 [ 218.932750][ T9086] sock_sendmsg+0xd7/0x130 [ 218.932767][ T9086] ___sys_sendmsg+0x3e2/0x920 [ 218.932784][ T9086] ? copy_msghdr_from_user+0x440/0x440 [ 218.932801][ T9086] ? lock_downgrade+0x920/0x920 [ 218.932818][ T9086] ? rcu_read_lock_held+0x9c/0xb0 [ 218.932835][ T9086] ? __kasan_check_read+0x11/0x20 [ 218.932853][ T9086] ? __fget+0x37f/0x550 [ 218.932873][ T9086] ? ksys_dup3+0x3e0/0x3e0 [ 218.932889][ T9086] ? __lock_acquire+0x16f2/0x4a00 [ 218.932902][ T9086] ? __kasan_check_read+0x11/0x20 [ 218.932915][ T9086] ? mark_lock+0xc2/0x1220 [ 218.932933][ T9086] ? __fget_light+0x1a9/0x230 [ 218.932948][ T9086] ? __fdget+0x1b/0x20 [ 218.932961][ T9086] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 218.932974][ T9086] ? sockfd_lookup_light+0xcb/0x180 [ 218.932993][ T9086] __sys_sendmmsg+0x1bf/0x4d0 [ 218.933014][ T9086] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 218.933043][ T9086] ? _copy_to_user+0x118/0x160 [ 218.933061][ T9086] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 218.933078][ T9086] ? put_timespec64+0xda/0x140 [ 218.933095][ T9086] ? nsecs_to_jiffies+0x30/0x30 [ 218.933120][ T9086] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 218.933136][ T9086] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 218.933149][ T9086] ? do_syscall_64+0x26/0x760 [ 218.933163][ T9086] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 218.933176][ T9086] ? do_syscall_64+0x26/0x760 [ 218.933194][ T9086] __x64_sys_sendmmsg+0x9d/0x100 [ 218.933212][ T9086] do_syscall_64+0xfa/0x760 [ 218.933229][ T9086] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 218.933242][ T9086] RIP: 0033:0x459f39 [ 218.933263][ T9086] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 218.933271][ T9086] RSP: 002b:00007f3de886dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 218.933285][ T9086] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459f39 [ 218.933294][ T9086] RDX: 0000000000000001 RSI: 0000000020005c00 RDI: 0000000000000004 [ 218.933302][ T9086] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 218.933311][ T9086] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3de886e6d4 [ 218.933320][ T9086] R13: 00000000004c7b70 R14: 00000000004ddaa8 R15: 00000000ffffffff [ 218.933341][ T9086] [ 218.933348][ T9086] Allocated by task 9086: [ 218.933362][ T9086] save_stack+0x23/0x90 [ 218.933375][ T9086] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 218.933386][ T9086] kasan_krealloc+0x84/0xc0 [ 218.933402][ T9086] krealloc+0xa6/0xd0 [ 218.933417][ T9086] nf_ct_ext_add+0x2c7/0x630 [ 218.933426][ T9086] init_conntrack.isra.0+0x5ed/0x11a0 [ 218.933436][ T9086] nf_conntrack_in+0xd94/0x1460 [ 218.933448][ T9086] ipv4_conntrack_local+0x127/0x220 [ 218.933461][ T9086] nf_hook_slow+0xbc/0x1e0 [ 218.933473][ T9086] __ip_local_out+0x403/0x870 [ 218.933484][ T9086] ip_local_out+0x2d/0x1b0 [ 218.933495][ T9086] ip_send_skb+0x42/0xf0 [ 218.933507][ T9086] udp_send_skb.isra.0+0x6d5/0x11b0 [ 218.933518][ T9086] udp_sendmsg+0x1e8f/0x2810 [ 218.933527][ T9086] inet_sendmsg+0x9e/0xe0 [ 218.933535][ T9086] sock_sendmsg+0xd7/0x130 [ 218.933544][ T9086] kernel_sendmsg+0x44/0x50 [ 218.933556][ T9086] rxrpc_send_data_packet+0x10cb/0x36b0 [ 218.933568][ T9086] rxrpc_send_data+0x1097/0x4130 [ 218.933580][ T9086] rxrpc_do_sendmsg+0xb8e/0x1d5f [ 218.933591][ T9086] rxrpc_sendmsg+0x4d6/0x5f0 [ 218.933601][ T9086] sock_sendmsg+0xd7/0x130 [ 218.933612][ T9086] ___sys_sendmsg+0x3e2/0x920 [ 218.933624][ T9086] __sys_sendmmsg+0x1bf/0x4d0 [ 218.933637][ T9086] __x64_sys_sendmmsg+0x9d/0x100 [ 218.933650][ T9086] do_syscall_64+0xfa/0x760 [ 218.933662][ T9086] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 218.933666][ T9086] [ 218.933671][ T9086] Freed by task 9086: [ 218.933682][ T9086] save_stack+0x23/0x90 [ 218.933694][ T9086] __kasan_slab_free+0x102/0x150 [ 218.933706][ T9086] kasan_slab_free+0xe/0x10 [ 218.933716][ T9086] kfree+0x10a/0x2c0 [ 218.933729][ T9086] nf_ct_ext_destroy+0x2ab/0x2e0 [ 218.933740][ T9086] nf_conntrack_free+0x8f/0xe0 [ 218.933751][ T9086] destroy_conntrack+0x1a2/0x270 [ 218.933764][ T9086] nf_conntrack_destroy+0xed/0x230 [ 218.933776][ T9086] __nf_conntrack_confirm+0x21ca/0x2830 [ 218.933789][ T9086] nf_confirm+0x3e7/0x4d0 [ 218.933801][ T9086] ipv4_confirm+0x14c/0x240 [ 218.933812][ T9086] nf_hook_slow+0xbc/0x1e0 [ 218.933821][ T9086] ip_output+0x40d/0x670 [ 218.933832][ T9086] ip_local_out+0xbb/0x1b0 [ 218.933843][ T9086] ip_send_skb+0x42/0xf0 [ 218.933855][ T9086] udp_send_skb.isra.0+0x6d5/0x11b0 [ 218.933866][ T9086] udp_sendmsg+0x1e8f/0x2810 [ 218.933879][ T9086] inet_sendmsg+0x9e/0xe0 [ 218.933889][ T9086] sock_sendmsg+0xd7/0x130 [ 218.933901][ T9086] kernel_sendmsg+0x44/0x50 [ 218.933913][ T9086] rxrpc_send_data_packet+0x10cb/0x36b0 [ 218.933925][ T9086] rxrpc_send_data+0x1097/0x4130 [ 218.933937][ T9086] rxrpc_do_sendmsg+0xb8e/0x1d5f [ 218.933949][ T9086] rxrpc_sendmsg+0x4d6/0x5f0 [ 218.933961][ T9086] sock_sendmsg+0xd7/0x130 [ 218.933972][ T9086] ___sys_sendmsg+0x3e2/0x920 [ 218.933984][ T9086] __sys_sendmmsg+0x1bf/0x4d0 [ 218.933997][ T9086] __x64_sys_sendmmsg+0x9d/0x100 [ 218.934011][ T9086] do_syscall_64+0xfa/0x760 [ 218.934024][ T9086] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 218.934028][ T9086] [ 218.934040][ T9086] The buggy address belongs to the object at ffff8880981f1d00 [ 218.934040][ T9086] which belongs to the cache kmalloc-128 of size 128 [ 218.934052][ T9086] The buggy address is located 4 bytes inside of [ 218.934052][ T9086] 128-byte region [ffff8880981f1d00, ffff8880981f1d80) [ 218.934057][ T9086] The buggy address belongs to the page: [ 218.934070][ T9086] page:ffffea0002607c40 refcount:1 mapcount:0 mapping:ffff8880aa400700 index:0x0 [ 218.934082][ T9086] flags: 0x1fffc0000000200(slab) [ 218.934102][ T9086] raw: 01fffc0000000200 ffffea000238ba88 ffff8880aa401548 ffff8880aa400700 [ 218.934118][ T9086] raw: 0000000000000000 ffff8880981f1000 0000000100000010 0000000000000000 [ 218.934124][ T9086] page dumped because: kasan: bad access detected [ 218.934128][ T9086] [ 218.934133][ T9086] Memory state around the buggy address: [ 218.934145][ T9086] ffff8880981f1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 218.934156][ T9086] ffff8880981f1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 218.934167][ T9086] >ffff8880981f1d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 218.934172][ T9086] ^ [ 218.934183][ T9086] ffff8880981f1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 218.934194][ T9086] ffff8880981f1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 218.934199][ T9086] ================================================================== [ 218.934204][ T9086] Disabling lock debugging due to kernel taint [ 218.937305][ T3920] kobject: 'loop4' (000000004e00d8ec): kobject_uevent_env [ 218.937340][ T3920] kobject: 'loop4' (000000004e00d8ec): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 218.961949][ T3920] kobject: 'loop1' (00000000a9dbcca6): kobject_uevent_env [ 218.961985][ T3920] kobject: 'loop1' (00000000a9dbcca6): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 219.048454][ T9086] Kernel panic - not syncing: panic_on_warn set ... [ 219.048476][ T9086] CPU: 0 PID: 9086 Comm: syz-executor.5 Tainted: G B 5.4.0-rc4-next-20191025 #0 [ 219.048484][ T9086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.048489][ T9086] Call Trace: [ 219.048509][ T9086] dump_stack+0x172/0x1f0 [ 219.048525][ T9086] panic+0x2e3/0x75c [ 219.048537][ T9086] ? add_taint.cold+0x16/0x16 [ 219.048555][ T9086] ? nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 219.048568][ T9086] ? preempt_schedule+0x4b/0x60 [ 219.048585][ T9086] ? ___preempt_schedule+0x16/0x18 [ 219.048600][ T9086] ? trace_hardirqs_on+0x5e/0x240 [ 219.048614][ T9086] ? nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 219.048630][ T9086] end_report+0x47/0x4f [ 219.048642][ T9086] ? nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 219.048654][ T9086] __kasan_report.cold+0xe/0x41 [ 219.048668][ T9086] ? nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 219.048682][ T9086] kasan_report+0x12/0x20 [ 219.048696][ T9086] __asan_report_load1_noabort+0x14/0x20 [ 219.048709][ T9086] nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 219.048724][ T9086] ? nf_ct_expect_unregister_notifier+0x140/0x140 [ 219.048740][ T9086] ? nf_confirm+0x22/0x4d0 [ 219.048756][ T9086] nf_confirm+0x3d8/0x4d0 [ 219.048771][ T9086] ipv4_confirm+0x14c/0x240 [ 219.048787][ T9086] nf_hook_slow+0xbc/0x1e0 [ 219.048803][ T9086] ip_output+0x40d/0x670 [ 219.048817][ T9086] ? ip_mc_output+0xf60/0xf60 [ 219.048830][ T9086] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 219.048844][ T9086] ? __ip_finish_output+0xbd0/0xbd0 [ 219.048858][ T9086] ? __this_cpu_preempt_check+0x35/0x190 [ 219.048871][ T9086] ? retint_kernel+0x2b/0x2b [ 219.048886][ T9086] ip_local_out+0xbb/0x1b0 [ 219.048900][ T9086] ip_send_skb+0x42/0xf0 [ 219.048914][ T9086] udp_send_skb.isra.0+0x6d5/0x11b0 [ 219.048928][ T9086] ? xfrm_lookup_route+0x5b/0x1e0 [ 219.048944][ T9086] udp_sendmsg+0x1e8f/0x2810 [ 219.048960][ T9086] ? ip_reply_glue_bits+0xc0/0xc0 [ 219.048976][ T9086] ? udp_unicast_rcv_skb.isra.0+0x360/0x360 [ 219.048992][ T9086] ? tomoyo_unix_entry+0x5d0/0x5d0 [ 219.049017][ T9086] ? ___might_sleep+0x163/0x2c0 [ 219.049037][ T9086] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 219.049052][ T9086] ? aa_sk_perm+0x288/0x870 [ 219.049071][ T9086] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 219.049089][ T9086] inet_sendmsg+0x9e/0xe0 [ 219.049102][ T9086] ? inet_sendmsg+0x9e/0xe0 [ 219.049116][ T9086] ? inet_send_prepare+0x4e0/0x4e0 [ 219.049131][ T9086] sock_sendmsg+0xd7/0x130 [ 219.049144][ T9086] kernel_sendmsg+0x44/0x50 [ 219.049162][ T9086] rxrpc_send_data_packet+0x10cb/0x36b0 [ 219.049178][ T9086] ? mark_lock+0xc2/0x1220 [ 219.049196][ T9086] ? rxrpc_send_abort_packet+0xe70/0xe70 [ 219.049210][ T9086] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 219.049224][ T9086] ? lockdep_hardirqs_on+0x421/0x5e0 [ 219.049249][ T9086] ? __this_cpu_preempt_check+0x35/0x190 [ 219.049262][ T9086] ? retint_kernel+0x2b/0x2b [ 219.049282][ T9086] rxrpc_send_data+0x1097/0x4130 [ 219.049294][ T9086] ? rxrpc_send_data+0x1097/0x4130 [ 219.049308][ T9086] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 219.049322][ T9086] ? retint_kernel+0x2b/0x2b [ 219.049343][ T9086] ? rxrpc_kernel_abort_call+0x8b0/0x8b0 [ 219.049358][ T9086] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 219.049373][ T9086] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 219.049388][ T9086] ? rxrpc_new_client_call+0xa7a/0x1ad0 [ 219.049404][ T9086] ? __sanitizer_cov_trace_pc+0x1/0x50 [ 219.049420][ T9086] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 219.049434][ T9086] ? rxrpc_new_client_call+0xc31/0x1ad0 [ 219.049449][ T9086] ? rxrpc_put_peer+0x106/0x760 [ 219.049464][ T9086] rxrpc_do_sendmsg+0xb8e/0x1d5f [ 219.049482][ T9086] ? rxrpc_kernel_send_data+0x4e0/0x4e0 [ 219.049493][ T9086] ? mutex_unlock+0xd/0x10 [ 219.049510][ T9086] ? rxrpc_sendmsg+0x2ce/0x5f0 [ 219.049525][ T9086] ? write_comp_data+0x9/0x70 [ 219.049540][ T9086] rxrpc_sendmsg+0x4d6/0x5f0 [ 219.049555][ T9086] ? rxrpc_kernel_probe_life+0x40/0x40 [ 219.049567][ T9086] sock_sendmsg+0xd7/0x130 [ 219.049581][ T9086] ___sys_sendmsg+0x3e2/0x920 [ 219.049596][ T9086] ? copy_msghdr_from_user+0x440/0x440 [ 219.049610][ T9086] ? lock_downgrade+0x920/0x920 [ 219.049624][ T9086] ? rcu_read_lock_held+0x9c/0xb0 [ 219.049638][ T9086] ? __kasan_check_read+0x11/0x20 [ 219.049653][ T9086] ? __fget+0x37f/0x550 [ 219.049668][ T9086] ? ksys_dup3+0x3e0/0x3e0 [ 219.049682][ T9086] ? __lock_acquire+0x16f2/0x4a00 [ 219.049694][ T9086] ? __kasan_check_read+0x11/0x20 [ 219.049707][ T9086] ? mark_lock+0xc2/0x1220 [ 219.049721][ T9086] ? __fget_light+0x1a9/0x230 [ 219.049733][ T9086] ? __fdget+0x1b/0x20 [ 219.049746][ T9086] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 219.049758][ T9086] ? sockfd_lookup_light+0xcb/0x180 [ 219.049775][ T9086] __sys_sendmmsg+0x1bf/0x4d0 [ 219.049791][ T9086] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 219.049812][ T9086] ? _copy_to_user+0x118/0x160 [ 219.049826][ T9086] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 219.049840][ T9086] ? put_timespec64+0xda/0x140 [ 219.049854][ T9086] ? nsecs_to_jiffies+0x30/0x30 [ 219.049873][ T9086] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 219.049887][ T9086] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 219.049900][ T9086] ? do_syscall_64+0x26/0x760 [ 219.049914][ T9086] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 219.049927][ T9086] ? do_syscall_64+0x26/0x760 [ 219.049942][ T9086] __x64_sys_sendmmsg+0x9d/0x100 [ 219.049957][ T9086] do_syscall_64+0xfa/0x760 [ 219.049972][ T9086] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 219.049983][ T9086] RIP: 0033:0x459f39 [ 219.049998][ T9086] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 219.050005][ T9086] RSP: 002b:00007f3de886dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 219.050019][ T9086] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459f39 [ 219.050026][ T9086] RDX: 0000000000000001 RSI: 0000000020005c00 RDI: 0000000000000004 [ 219.050034][ T9086] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 219.050042][ T9086] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3de886e6d4 [ 219.050049][ T9086] R13: 00000000004c7b70 R14: 00000000004ddaa8 R15: 00000000ffffffff [ 219.051575][ T9086] Kernel Offset: disabled [ 220.608638][ T9086] Rebooting in 86400 seconds..