[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.41' (ECDSA) to the list of known hosts. 2020/05/18 16:44:38 fuzzer started 2020/05/18 16:44:38 dialing manager at 10.128.0.26:37933 2020/05/18 16:44:38 syscalls: 3035 2020/05/18 16:44:38 code coverage: enabled 2020/05/18 16:44:38 comparison tracing: enabled 2020/05/18 16:44:38 extra coverage: enabled 2020/05/18 16:44:38 setuid sandbox: enabled 2020/05/18 16:44:38 namespace sandbox: enabled 2020/05/18 16:44:38 Android sandbox: /sys/fs/selinux/policy does not exist 2020/05/18 16:44:38 fault injection: enabled 2020/05/18 16:44:38 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/05/18 16:44:38 net packet injection: enabled 2020/05/18 16:44:38 net device setup: enabled 2020/05/18 16:44:38 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/05/18 16:44:38 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/05/18 16:44:38 USB emulation: /dev/raw-gadget does not exist 16:46:36 executing program 0: getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x4000000) syzkaller login: [ 164.045637][ T7023] IPVS: ftp: loaded support on port[0] = 21 16:46:37 executing program 1: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) fallocate(r0, 0x100000010, 0x0, 0x6) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') [ 164.166859][ T7023] chnl_net:caif_netlink_parms(): no params data found [ 164.257982][ T7023] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.265982][ T7023] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.275380][ T7023] device bridge_slave_0 entered promiscuous mode [ 164.285196][ T7023] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.293510][ T7023] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.303592][ T7023] device bridge_slave_1 entered promiscuous mode [ 164.336804][ T7023] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 164.355937][ T7153] IPVS: ftp: loaded support on port[0] = 21 [ 164.365585][ T7023] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 164.414350][ T7023] team0: Port device team_slave_0 added [ 164.440717][ T7023] team0: Port device team_slave_1 added [ 164.483293][ T7023] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 164.499226][ T7023] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 16:46:37 executing program 2: fallocate(0xffffffffffffffff, 0x100000010, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f00000000c0)="0f01b4070066b9a50b000066b80600000066ba000000000f3065f3af0f090f01c8362e0f71d7072626f30fc772b366b9800000c00f326635010000000f30c40266b9590900000f32", 0x48}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0xff, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='threaded\x00', 0x9) [ 164.526783][ T7023] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 164.540662][ T7023] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 164.547608][ T7023] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 164.581302][ T7023] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 164.644980][ T7023] device hsr_slave_0 entered promiscuous mode [ 164.719353][ T7023] device hsr_slave_1 entered promiscuous mode 16:46:37 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000140)={0x20}) pwritev(r0, &(0x7f0000000500)=[{&(0x7f0000001340)='+', 0x1}], 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x2880008, r0}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6874e56cbabfc45a, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) [ 164.833784][ T7211] IPVS: ftp: loaded support on port[0] = 21 [ 164.918934][ T7153] chnl_net:caif_netlink_parms(): no params data found [ 165.103283][ T7338] IPVS: ftp: loaded support on port[0] = 21 [ 165.109615][ T7153] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.116689][ T7153] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.140359][ T7153] device bridge_slave_0 entered promiscuous mode [ 165.186215][ T7153] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.199209][ T7153] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.207072][ T7153] device bridge_slave_1 entered promiscuous mode 16:46:38 executing program 4: statfs(0x0, &(0x7f0000000080)=""/218) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(r0, 0x0, 0x200002, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0x9, 0x9f1, 0x6620, 0x9, 0x0, 0xffffffffffffffff, 0x9, [], 0x0, 0xffffffffffffffff, 0x2, 0x1}, 0x40) ioctl$SNDRV_TIMER_IOCTL_STATUS64(0xffffffffffffffff, 0x80605414, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x77) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f0000000380)) lsetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="c295000041318f6bf000000000000000"], &(0x7f0000000300)='systemem0md5sum$\x00', 0x11, 0x3) memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x5) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000240)=0x2) [ 165.251801][ T7023] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 165.366776][ T7023] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 165.422041][ T7023] netdevsim netdevsim0 netdevsim2: renamed from eth2 16:46:38 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000140)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) [ 165.522870][ T7023] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 165.588504][ T7153] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 165.607273][ T7211] chnl_net:caif_netlink_parms(): no params data found [ 165.616317][ T7469] IPVS: ftp: loaded support on port[0] = 21 [ 165.633181][ T7153] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 165.721878][ T7153] team0: Port device team_slave_0 added [ 165.760892][ T7153] team0: Port device team_slave_1 added [ 165.804686][ T7513] IPVS: ftp: loaded support on port[0] = 21 [ 165.815638][ T7153] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 165.823771][ T7153] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 165.850409][ T7153] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 165.881938][ T7153] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 165.888920][ T7153] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 165.915345][ T7153] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 165.966437][ T7211] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.973947][ T7211] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.982048][ T7211] device bridge_slave_0 entered promiscuous mode [ 166.038533][ T7211] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.045836][ T7211] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.054396][ T7211] device bridge_slave_1 entered promiscuous mode [ 166.079651][ T7211] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 166.094864][ T7211] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 166.152760][ T7153] device hsr_slave_0 entered promiscuous mode [ 166.209951][ T7153] device hsr_slave_1 entered promiscuous mode [ 166.269493][ T7153] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 166.277275][ T7153] Cannot create hsr debugfs directory [ 166.325877][ T7338] chnl_net:caif_netlink_parms(): no params data found [ 166.343803][ T7023] 8021q: adding VLAN 0 to HW filter on device bond0 [ 166.375652][ T7211] team0: Port device team_slave_0 added [ 166.404361][ T7469] chnl_net:caif_netlink_parms(): no params data found [ 166.429880][ T7211] team0: Port device team_slave_1 added [ 166.447055][ T7023] 8021q: adding VLAN 0 to HW filter on device team0 [ 166.491210][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 166.501260][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 166.541199][ T7211] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 166.548176][ T7211] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 166.578541][ T7211] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 166.592833][ T3470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 166.602639][ T3470] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.611333][ T3470] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.618520][ T3470] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.626632][ T3470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 166.635714][ T3470] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.644142][ T3470] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.651296][ T3470] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.658775][ T3470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 166.671321][ T3470] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 166.679309][ T3470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 166.705803][ T7211] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 166.713254][ T7211] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 166.739961][ T7211] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 166.823925][ T7338] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.833425][ T7338] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.842627][ T7338] device bridge_slave_0 entered promiscuous mode [ 166.866103][ T3470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 166.876349][ T3470] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 166.885941][ T3470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 166.895617][ T3470] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 166.906125][ T3470] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 166.971550][ T7211] device hsr_slave_0 entered promiscuous mode [ 167.009601][ T7211] device hsr_slave_1 entered promiscuous mode [ 167.049246][ T7211] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 167.056970][ T7211] Cannot create hsr debugfs directory [ 167.067250][ T7338] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.074921][ T7338] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.084056][ T7338] device bridge_slave_1 entered promiscuous mode [ 167.110156][ T3471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 167.118940][ T3471] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 167.130832][ T3471] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 167.139824][ T3471] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 167.163946][ T7513] chnl_net:caif_netlink_parms(): no params data found [ 167.178979][ T7469] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.192189][ T7469] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.200704][ T7469] device bridge_slave_0 entered promiscuous mode [ 167.212406][ T7469] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.221715][ T7469] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.231531][ T7469] device bridge_slave_1 entered promiscuous mode [ 167.254448][ T7023] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 167.269757][ T7338] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 167.278906][ T7153] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 167.358495][ T7338] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 167.376368][ T7153] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 167.434420][ T7469] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 167.467591][ T7153] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 167.503406][ T7153] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 167.565146][ T7469] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 167.579112][ T7338] team0: Port device team_slave_0 added [ 167.590394][ T7338] team0: Port device team_slave_1 added [ 167.641739][ T7469] team0: Port device team_slave_0 added [ 167.651040][ T7469] team0: Port device team_slave_1 added [ 167.657792][ T7338] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 167.665487][ T7338] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 167.695496][ T7338] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 167.717082][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 167.725109][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 167.736358][ T7023] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 167.766340][ T7338] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 167.774231][ T7338] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 167.801584][ T7338] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 167.850523][ T7469] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 167.857510][ T7469] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 167.886119][ T7469] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 167.911648][ T7513] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.919595][ T7513] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.927349][ T7513] device bridge_slave_0 entered promiscuous mode [ 167.943175][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 167.952628][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 167.974982][ T7469] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 167.982081][ T7469] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 168.010194][ T7469] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 168.021848][ T7513] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.028965][ T7513] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.038366][ T7513] device bridge_slave_1 entered promiscuous mode [ 168.114244][ T7338] device hsr_slave_0 entered promiscuous mode [ 168.159594][ T7338] device hsr_slave_1 entered promiscuous mode [ 168.200036][ T7338] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 168.207673][ T7338] Cannot create hsr debugfs directory [ 168.283099][ T7469] device hsr_slave_0 entered promiscuous mode [ 168.339672][ T7469] device hsr_slave_1 entered promiscuous mode [ 168.379264][ T7469] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 168.386868][ T7469] Cannot create hsr debugfs directory [ 168.411869][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 168.420806][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 168.434813][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 168.443085][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 168.479034][ T7211] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 168.522811][ T7023] device veth0_vlan entered promiscuous mode [ 168.538461][ T7513] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 168.553454][ T7211] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 168.591893][ T7211] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 168.652753][ T7211] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 168.724993][ T7513] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 168.746408][ T7023] device veth1_vlan entered promiscuous mode [ 168.778916][ T7513] team0: Port device team_slave_0 added [ 168.815946][ T7513] team0: Port device team_slave_1 added [ 168.886333][ T7513] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 168.895151][ T7513] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 168.924590][ T7513] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 168.940049][ T7153] 8021q: adding VLAN 0 to HW filter on device bond0 [ 168.977576][ T7513] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 168.990346][ T7513] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 169.017563][ T7513] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 169.030176][ T7469] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 169.093355][ T7469] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 169.186770][ T7469] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 169.253488][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 169.261436][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 169.270640][ T7469] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 169.329951][ T3471] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 169.338439][ T3471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 169.415685][ T7513] device hsr_slave_0 entered promiscuous mode [ 169.469661][ T7513] device hsr_slave_1 entered promiscuous mode [ 169.519273][ T7513] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 169.526856][ T7513] Cannot create hsr debugfs directory [ 169.538731][ T7153] 8021q: adding VLAN 0 to HW filter on device team0 [ 169.548790][ T7023] device veth0_macvtap entered promiscuous mode [ 169.565954][ T3471] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 169.615177][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 169.624324][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 169.633194][ T2797] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.640357][ T2797] bridge0: port 1(bridge_slave_0) entered forwarding state [ 169.648372][ T7023] device veth1_macvtap entered promiscuous mode [ 169.687080][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 169.695431][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 169.705065][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 169.714635][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.721768][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 169.759217][ T3471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 169.767798][ T3471] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 169.780165][ T3471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 169.788792][ T3471] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 169.802604][ T7338] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 169.888139][ T7338] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 169.963432][ T3471] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 169.971824][ T3471] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 169.982171][ T3471] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 169.991270][ T3471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 170.000273][ T3471] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 170.009057][ T7338] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 170.072066][ T7338] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 170.178508][ T7023] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 170.191789][ T3476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 170.200396][ T3476] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 170.208496][ T3476] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 170.218859][ T3476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 170.230040][ T7153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 170.243984][ T7211] 8021q: adding VLAN 0 to HW filter on device bond0 [ 170.264694][ T7023] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 170.277857][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 170.287850][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 170.318197][ T7211] 8021q: adding VLAN 0 to HW filter on device team0 [ 170.333080][ T7513] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 170.371761][ T3476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 170.380835][ T3476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 170.396610][ T3471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 170.405703][ T3471] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 170.414793][ T3471] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.421931][ T3471] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.430771][ T7513] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 170.473805][ T7513] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 170.532551][ T7513] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 170.650247][ T3470] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 170.709929][ T7469] 8021q: adding VLAN 0 to HW filter on device bond0 [ 170.733613][ T3470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 170.742645][ T3470] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 170.753557][ T3470] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.760684][ T3470] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.768519][ T3470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 170.777826][ T3470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 170.787289][ T3470] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 170.795655][ T3470] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 170.803986][ T3470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 170.813273][ T3470] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 170.822436][ T3470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 170.832961][ T3470] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 170.845491][ T3470] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 170.920561][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 170.929085][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 170.947221][ T7153] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 170.992170][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 171.008057][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 171.027107][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 16:46:44 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mount$9p_tcp(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x18a8001, &(0x7f00000004c0)=ANY=[@ANYRESHEX, @ANYBLOB=',nodevmap,fo', @ANYRESHEX=r0, @ANYRESDEC=0x0, @ANYBLOB=',context=staff_u,eu']) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r1 = open(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = creat(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @rand_addr=0x64010102}}, 0x7fffffff, 0x2d, 0xfffffffe, 0x7, 0x2aa}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f00000001c0)={r4, 0x844a}, 0x8) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) [ 171.037392][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 171.054910][ T7211] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 171.079191][ T7469] 8021q: adding VLAN 0 to HW filter on device team0 [ 171.149657][ T3470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 171.158417][ T3470] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 171.168870][ T3470] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.176455][ T3470] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.203029][ T8284] new mount options do not match the existing superblock, will be ignored [ 171.243922][ T3476] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 171.253014][ T3476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 171.263909][ T3476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 171.273444][ T3476] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 171.277308][ T8284] new mount options do not match the existing superblock, will be ignored 16:46:44 executing program 0: pipe2$9p(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) splice(r1, 0x0, r0, 0x0, 0x20004ffe1, 0x0) [ 171.281979][ T3476] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 171.298119][ T3476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 171.307912][ T3476] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 171.317091][ T3476] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.324975][ T3476] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.334146][ T3476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 171.364140][ T7338] 8021q: adding VLAN 0 to HW filter on device bond0 [ 171.394289][ T7211] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 171.415138][ T3471] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 171.425029][ T3471] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 171.440249][ T3471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 171.448718][ T3471] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 171.460572][ T3471] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 171.482670][ T7153] device veth0_vlan entered promiscuous mode [ 171.495138][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 171.507709][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 171.517541][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 171.535253][ T7153] device veth1_vlan entered promiscuous mode [ 171.555201][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 171.563776][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 171.577806][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 171.587779][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 171.601085][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 171.610700][ T7338] 8021q: adding VLAN 0 to HW filter on device team0 [ 171.644618][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 171.652848][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 171.663084][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 171.673180][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 171.682394][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 171.720851][ T7469] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 171.732758][ T7469] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 171.747422][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 171.757352][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 171.766178][ T2694] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.773350][ T2694] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.783014][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 171.792124][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 171.801047][ T2694] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.808108][ T2694] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.816327][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 171.825521][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 171.834039][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 171.842542][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 171.851396][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 171.860104][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 171.878757][ T7513] 8021q: adding VLAN 0 to HW filter on device bond0 [ 171.890556][ T7153] device veth0_macvtap entered promiscuous mode [ 171.905517][ T7211] device veth0_vlan entered promiscuous mode [ 171.917726][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 171.926216][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 171.934408][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 171.942914][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 171.951800][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 171.976960][ T7513] 8021q: adding VLAN 0 to HW filter on device team0 [ 171.987766][ T7153] device veth1_macvtap entered promiscuous mode [ 172.011980][ T7211] device veth1_vlan entered promiscuous mode [ 172.021195][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 172.031328][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 172.044072][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 172.054198][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 172.063367][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 172.073153][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 172.081513][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 172.090031][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 172.097529][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 172.113881][ T7469] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 172.142599][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 172.151514][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 172.162692][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 172.172104][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 172.182183][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 172.191482][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.198572][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 172.207747][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 172.217537][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 172.226458][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.233585][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 172.244987][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 172.254224][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 172.273848][ T7338] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 172.290798][ T7338] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 172.303775][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 172.312352][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 172.322235][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 172.334273][ T7153] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 172.346337][ T7153] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.358161][ T7153] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 172.388892][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 172.397772][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 172.420360][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 172.430367][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 172.442944][ T7153] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 172.462079][ T7153] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.504714][ T7153] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 172.566079][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 172.585754][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 172.596165][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 172.605549][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 172.617891][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 172.626829][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 172.635814][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 172.649025][ T7211] device veth0_macvtap entered promiscuous mode [ 172.661264][ T7211] device veth1_macvtap entered promiscuous mode [ 172.672398][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 172.682407][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 172.692832][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 172.703946][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 172.712326][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 172.720756][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 172.748565][ T7338] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 172.760483][ T3471] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 172.769078][ T3471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 172.778849][ T3471] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 172.789468][ T3471] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 172.798039][ T7211] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 172.813311][ T7211] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.823272][ T7211] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 172.836958][ T7211] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.854726][ T7211] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 172.879634][ T7513] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 172.894524][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 172.903901][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 172.913218][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 172.922545][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 172.934838][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 172.943174][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 172.955058][ T7469] device veth0_vlan entered promiscuous mode [ 172.964760][ T7211] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 172.976058][ T7211] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.987576][ T7211] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 172.998609][ T7211] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 173.012133][ T7211] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 173.038659][ T3471] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 173.047863][ T3471] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 173.114940][ T7469] device veth1_vlan entered promiscuous mode [ 173.174840][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 173.185960][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 173.195199][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 173.204417][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 173.212364][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 173.282171][ T7338] device veth0_vlan entered promiscuous mode [ 173.339549][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 173.348188][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 173.360449][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 173.369721][ T2707] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 173.377470][ T2707] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 173.519648][ T2707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 173.528344][ T2707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 173.550721][ T7469] device veth0_macvtap entered promiscuous mode [ 173.558718][ T7338] device veth1_vlan entered promiscuous mode 16:46:46 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x37cb1133) socket$inet(0x2, 0x3, 0x33) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000080), 0x4) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3f}}, 0x10) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0xfffffffffffffffd) [ 173.619691][ T7513] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 173.643434][ T7469] device veth1_macvtap entered promiscuous mode [ 173.709953][ C1] hrtimer: interrupt took 43426 ns [ 173.724820][ T7469] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 173.745533][ T8317] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 173.833614][ T7469] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 173.879606][ T7469] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 173.903393][ T7469] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 173.917675][ T7469] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 173.928425][ T7469] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 173.943604][ T7469] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 173.958950][ T7469] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 173.980935][ T7469] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 173.997634][ T7469] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 174.010934][ T7469] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 174.022577][ T7469] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 174.033876][ T7469] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 174.047464][ T7469] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 174.068772][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 174.080469][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 174.088693][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 174.098909][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 174.107839][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 174.133473][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 174.147090][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 174.158481][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 174.255816][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 174.271470][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 174.283787][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 174.293392][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 16:46:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="7400000024000705000000000000000000010000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100736671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=@newtfilter={0x24, 0x2a, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x24}}, 0x0) [ 174.397661][ T7338] device veth0_macvtap entered promiscuous mode 16:46:47 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x37cb1133) socket$inet(0x2, 0x3, 0x33) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000080), 0x4) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3f}}, 0x10) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0xfffffffffffffffd) [ 174.444511][ T8338] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 174.512717][ T7338] device veth1_macvtap entered promiscuous mode [ 174.540712][ T8340] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.2'. [ 174.575035][ T7513] device veth0_vlan entered promiscuous mode [ 174.633164][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 174.654731][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 174.715490][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 174.773462][ T8347] IPVS: ftp: loaded support on port[0] = 21 [ 174.777275][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 174.795481][ T8340] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 174.835469][ T7513] device veth1_vlan entered promiscuous mode [ 174.852931][ T8338] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.2'. 16:46:47 executing program 2: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x40140921, &(0x7f00000000c0)={0x0, 0xfe, 0x2, 0x0}) [ 174.882524][ T7338] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 174.903005][ T7338] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 174.927027][ T7338] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 174.945512][ T7338] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 174.964606][ T8355] md: could not open device unknown-block(254,2). [ 174.979468][ T7338] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 174.979504][ T7338] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 174.979520][ T7338] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 175.018108][ T8355] md: md_import_device returned -6 [ 175.023011][ T7338] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 16:46:48 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@loopback, 0x800, 0x0, 0x2000000000903, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@loopback, 0x800, 0x0, 0x2, 0x2}, 0x20) [ 175.038226][ T7338] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 175.059614][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 175.076729][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 16:46:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013ac4c18d72d68366baa100ed", 0x4e}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000007, 0xfffffffffffffffd, 0x0, 0x0, 0x4cb]}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00') perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NLBL_UNLABEL_C_LIST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0x0}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 175.104129][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 175.124819][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 175.134431][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 175.194080][ T8371] kvm [8370]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000086 data 0xfffffffd000000a0 [ 175.218615][ T7338] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 175.218823][ T8371] kvm [8370]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000062 data 0xfffffffd000000bc [ 175.237865][ T7338] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 175.245249][ T8371] kvm [8370]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000024 data 0xfffffffd000000de [ 175.262690][ T8371] kvm [8370]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000027 data 0xfffffffd00000093 [ 175.262854][ T7338] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 175.274981][ T8371] kvm [8370]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000041 data 0xfffffffd00000026 [ 175.291766][ T7338] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 175.297885][ T8371] kvm [8370]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x4000000c data 0xfffffffd00000085 [ 175.311683][ T7338] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 175.317286][ T8371] kvm [8370]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x4000008f data 0xfffffffd0000009e [ 175.335438][ T7338] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 175.338592][ T8371] kvm [8370]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x4000008e data 0xfffffffd000000fc [ 175.352471][ T7338] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 175.359490][ T8371] kvm [8370]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000079 data 0xfffffffd0000008f [ 175.373523][ T7338] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 175.379986][ T8371] kvm [8370]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000014 data 0xfffffffd000000de 16:46:48 executing program 1: [ 175.441340][ T7338] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 175.500830][ T3470] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 175.536191][ T3470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 175.547277][ T8351] IPVS: ftp: loaded support on port[0] = 21 [ 175.574825][ T3470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 175.607459][ T3470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 175.628957][ T7513] device veth0_macvtap entered promiscuous mode [ 175.667624][ T7513] device veth1_macvtap entered promiscuous mode [ 175.762480][ T7513] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 175.774723][ T7513] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 175.785032][ T7513] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 175.796599][ T7513] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 175.811818][ T7513] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 175.822692][ T7513] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 175.832607][ T7513] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 175.843131][ T7513] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 175.854590][ T7513] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 175.865225][ T7513] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 175.876730][ T7513] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 175.887739][ T0] NOHZ: local_softirq_pending 08 [ 175.902413][ T3470] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 175.914675][ T3470] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 175.923378][ T3470] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 175.932508][ T3470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 175.944602][ T7513] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 175.956414][ T7513] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 175.968781][ T7513] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 175.980069][ T7513] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 175.990214][ T7513] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 176.001172][ T7513] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 176.011656][ T7513] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 176.022706][ T7513] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 176.033208][ T7513] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 176.045225][ T7513] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 176.057182][ T7513] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 176.186463][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 176.200878][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 16:46:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sysfs$1(0x1, &(0x7f0000000000)='vboxnet0\\\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RWALK(r3, 0x0, 0x8) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, 0xffffffffffffffff) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 176.332548][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:46:51 executing program 4: statfs(0x0, &(0x7f0000000080)=""/218) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(r0, 0x0, 0x200002, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0x9, 0x9f1, 0x6620, 0x9, 0x0, 0xffffffffffffffff, 0x9, [], 0x0, 0xffffffffffffffff, 0x2, 0x1}, 0x40) ioctl$SNDRV_TIMER_IOCTL_STATUS64(0xffffffffffffffff, 0x80605414, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x77) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f0000000380)) lsetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="c295000041318f6bf000000000000000"], &(0x7f0000000300)='systemem0md5sum$\x00', 0x11, 0x3) memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x5) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000240)=0x2) 16:46:51 executing program 1: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x42}}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0)={0x2, 0xd820}, 0x10) 16:46:51 executing program 2: [ 178.864069][ T8445] IPVS: ftp: loaded support on port[0] = 21 [ 179.289563][ T21] tipc: TX() has been purged, node left! 16:46:57 executing program 0: 16:46:57 executing program 5: lsetxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x4f5d79266d86500d, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) unlink(0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8020001) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280), 0x1033b) fdatasync(r2) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2, 0x0, 0x0, 0x18}) 16:46:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sysfs$1(0x1, &(0x7f0000000000)='vboxnet0\\\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RWALK(r3, 0x0, 0x8) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, 0xffffffffffffffff) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 16:46:57 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sysfs$1(0x1, &(0x7f0000000000)='vboxnet0\\\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RWALK(r3, 0x0, 0x8) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, 0xffffffffffffffff) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 16:46:57 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xd5, &(0x7f0000000240)="f7f258480aa4ce20e779e77d0076cc03592a160500000032a56f7259e480249950f34c6aa1cef20d94de765aa586d65a3d7f022e4c14f1bdd705d398eef68310ec46b654cd8f9c032f1078c135f1c760ca5232f285d288f2fb01819502f5fa6fa2e990b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2f6a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f78ed02790f26129d6582a377c1fdaaaa135a44e88f785290f970c5b5afb70a741197192c4ea43bed2b6b7"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:46:57 executing program 4: 16:46:57 executing program 4: 16:46:57 executing program 0: [ 184.304466][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 184.348059][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:46:57 executing program 0: 16:46:57 executing program 4: 16:46:57 executing program 4: 16:46:57 executing program 0: [ 184.547349][ T27] audit: type=1800 audit(1589820417.607:2): pid=8500 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=15788 res=0 16:46:57 executing program 5: lsetxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x4f5d79266d86500d, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) unlink(0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8020001) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280), 0x1033b) fdatasync(r2) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2, 0x0, 0x0, 0x18}) 16:46:57 executing program 4: 16:46:58 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sysfs$1(0x1, &(0x7f0000000000)='vboxnet0\\\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RWALK(r3, 0x0, 0x8) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, 0xffffffffffffffff) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 16:46:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sysfs$1(0x1, &(0x7f0000000000)='vboxnet0\\\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RWALK(r3, 0x0, 0x8) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, 0xffffffffffffffff) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 185.096615][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 185.148854][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:47:00 executing program 1: 16:47:00 executing program 0: 16:47:00 executing program 4: 16:47:00 executing program 5: 16:47:00 executing program 3: 16:47:00 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sysfs$1(0x1, &(0x7f0000000000)='vboxnet0\\\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RWALK(r3, 0x0, 0x8) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, 0xffffffffffffffff) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 16:47:00 executing program 0: 16:47:00 executing program 5: 16:47:00 executing program 1: [ 187.328214][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:47:00 executing program 5: 16:47:00 executing program 4: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x105000) 16:47:00 executing program 3: 16:47:00 executing program 0: 16:47:00 executing program 3: 16:47:00 executing program 1: 16:47:00 executing program 5: 16:47:00 executing program 0: 16:47:01 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) sysfs$1(0x1, &(0x7f0000000000)='vboxnet0\\\x00') r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RWALK(r2, 0x0, 0x8) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, 0xffffffffffffffff) 16:47:01 executing program 3: 16:47:01 executing program 4: 16:47:01 executing program 1: 16:47:01 executing program 5: 16:47:01 executing program 0: 16:47:01 executing program 3: 16:47:01 executing program 0: 16:47:01 executing program 1: 16:47:01 executing program 5: 16:47:01 executing program 4: [ 188.175249][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:47:01 executing program 0: 16:47:02 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) sysfs$1(0x1, &(0x7f0000000000)='vboxnet0\\\x00') r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RWALK(r2, 0x0, 0x8) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, 0xffffffffffffffff) 16:47:02 executing program 4: 16:47:02 executing program 5: 16:47:02 executing program 1: 16:47:02 executing program 3: 16:47:02 executing program 0: 16:47:02 executing program 5: 16:47:02 executing program 3: 16:47:02 executing program 4: 16:47:02 executing program 1: 16:47:02 executing program 0: [ 189.039765][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:47:02 executing program 4: 16:47:02 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) sysfs$1(0x1, &(0x7f0000000000)='vboxnet0\\\x00') r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RWALK(r2, 0x0, 0x8) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, 0xffffffffffffffff) 16:47:02 executing program 3: 16:47:02 executing program 0: 16:47:02 executing program 1: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='dctcp\x00', 0x6) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf93a1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) 16:47:02 executing program 5: 16:47:02 executing program 4: 16:47:02 executing program 3: 16:47:02 executing program 0: 16:47:02 executing program 5: 16:47:02 executing program 4: [ 189.893922][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:47:03 executing program 5: 16:47:03 executing program 3: 16:47:03 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sysfs$1(0x1, &(0x7f0000000000)='vboxnet0\\\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RWALK(r3, 0x0, 0x8) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 16:47:03 executing program 0: 16:47:03 executing program 4: 16:47:03 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f008001fffffff00004000636c77fbac14140fe934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 16:47:03 executing program 1: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_netdev_private(r1, 0x89a2, &(0x7f0000000040)="a082bb11b43a") 16:47:03 executing program 3: unshare(0x0) clock_gettime(0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xb1d, 0x0, 0x0, 0x0, 0x8, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NLBL_MGMT_C_REMOVEDEF(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF(r0, 0x5453, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) io_setup(0x5, &(0x7f0000000200)) io_pgetevents(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1c9c380}, 0x0) unshare(0x40000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600)='nl80211\x00') 16:47:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=ANY=[@ANYBLOB="480000001000390400"/20, @ANYRES32=r4, @ANYBLOB="03000000000000002000128008000100736974001400028008000100", @ANYRES32], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x3, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 16:47:03 executing program 4: [ 190.781967][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:47:03 executing program 4: [ 190.824218][ T8648] IPVS: ftp: loaded support on port[0] = 21 [ 190.850606][ T8664] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 16:47:04 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$TIOCSTI(r2, 0x5412, 0xffffffffffff64f8) [ 190.910668][ T8664] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 16:47:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000180)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000140)=[{&(0x7f00000001c0)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000380)=ANY=[], 0x801) truncate(&(0x7f00000000c0)='./bus\x00', 0x6) 16:47:04 executing program 4: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000180)) write$P9_RREADLINK(r1, &(0x7f0000000840)=ANY=[@ANYBLOB], 0xc) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 190.987544][ T8672] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 191.022343][ T8672] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 191.450477][ T8653] IPVS: ftp: loaded support on port[0] = 21 16:47:04 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sysfs$1(0x1, &(0x7f0000000000)='vboxnet0\\\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RWALK(r3, 0x0, 0x8) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r4) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 16:47:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) sendfile(r4, r2, &(0x7f0000000180)=0xa, 0x6fe7) 16:47:04 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x2a0}, 0x1, 0x0, 0x0, 0x2c896}, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) write(r2, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) symlink(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0/file0\x00', &(0x7f0000000340)='./file0\x00') creat(&(0x7f0000000240)='./file0\x00', 0x1fb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1102c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffd}, 0x0, 0x80800, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000100)='./file0\x00', 0x0) open(0x0, 0x3fd, 0x0) 16:47:04 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$sock_netdev_private(r3, 0x8948, &(0x7f0000000040)) 16:47:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) mount(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x40000, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x80000, 0x0) 16:47:04 executing program 3: unshare(0x0) clock_gettime(0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xb1d, 0x0, 0x0, 0x0, 0x8, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NLBL_MGMT_C_REMOVEDEF(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF(r0, 0x5453, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) io_setup(0x5, &(0x7f0000000200)) io_pgetevents(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1c9c380}, 0x0) unshare(0x40000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600)='nl80211\x00') 16:47:04 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$sock_netdev_private(r3, 0x89a3, &(0x7f0000000040)) 16:47:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500faff000000008aa1210bb5030b3388b0409a814343f1ae341b74efa745a12f5c0685e52614c5c386e0c1931c6658fc013482e31e0cacc902c97e6145201b062261ef48004d26342c94f56a39359ba56724e4535d80ffbd6848d53382c262867d922ead3c9ba15d8f0c2211a2b975eb2b9d08501c56ab5aa0d110c5d197e50ff28b4a3b05489d1d1245cb774879b0871dd61703eefe87d7919c5ea2a361b18cca1a363b2b28add653b82b89ef27e62559fbc6fb5e403930efe40194cdd5337ee3edfa1f78e4d7f4f30dc5cc1800a6405eff616ebfdcff76c08ae36a75"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=ANY=[@ANYBLOB="480000001000390400"/20, @ANYRES32=r4, @ANYBLOB="03000000000000002000128008000100736974001400028008000100", @ANYRES32=r3, @ANYBLOB="08000300e0"], 0x48}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r6, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=ANY=[@ANYBLOB="480000001000390400"/20, @ANYRES32=r7, @ANYBLOB="03000000000000002000128008000100736974001400028008000100", @ANYRES32, @ANYBLOB="08000300e0"], 0x48}}, 0x0) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) [ 191.699118][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:47:04 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0xc0f85403, &(0x7f0000000040)={{0x1, 0x0, 0x0, 0x0, 0x2}}) [ 191.755852][ T8760] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 191.770161][ T356] tipc: TX() has been purged, node left! 16:47:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 191.846506][ T8756] IPVS: ftp: loaded support on port[0] = 21 [ 191.860535][ T8772] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 16:47:05 executing program 4: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000180)="455098547c2cefb0bcb53b81a5b8679651fe97792a6db9006e543d7c43d6f619626ac859dbf41ca8ccbdca217273e9153cd6f764f2d5940784e567491db4be5079", 0x0}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 191.989603][ T8782] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 192.060626][ T8760] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 192.079649][ T8780] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 192.111146][ T8782] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 16:47:05 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_netdev_private(r1, 0x891e, &(0x7f0000000040)="a082bb11b43a") [ 192.205623][ T8786] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 192.217064][ T8786] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 192.228339][ T8786] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 192.250615][ T8786] EXT4-fs (loop4): corrupt root inode, run e2fsck [ 192.257366][ T8786] EXT4-fs (loop4): mount failed 16:47:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sysfs$1(0x1, &(0x7f0000000000)='vboxnet0\\\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RWALK(r3, 0x0, 0x8) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r4) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 16:47:05 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x54600, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x8, 0x3, 0x228, 0x98, 0x0, 0xd0e0000, 0x98, 0x100, 0x190, 0x1d8, 0x1d8, 0x190, 0x1d8, 0x3, 0x0, {[{{@ip={@dev={0xac, 0x14, 0x14, 0x28}, @remote, 0x0, 0xff, 'veth0_macvtap\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x0, 0x2}}}, {{@uncond, 0x0, 0x90, 0xf8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x2, 0x0, 0x0, 0x0, 'snmp\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 16:47:05 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="bbbbbbbbbbbbaaaaaaaaaaaa8100000086dd25f954f7001506"], 0x4f) splice(r0, 0x0, r2, 0x0, 0x10008, 0x0) 16:47:05 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) 16:47:05 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$overlay(0x400019, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@metacopy_on='metacopy=on'}]}) [ 192.560227][ T8837] x_tables: ip_tables: socket match: used from hooks OUTPUT, but only valid from PREROUTING/INPUT 16:47:05 executing program 3: futex(0x0, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x40000001, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r2 = gettid() tkill(r2, 0x1000000000016) 16:47:05 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_netdev_private(r1, 0x89a2, &(0x7f0000000040)) 16:47:05 executing program 1: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000180)="455098547c2cefb0bcb53b81a5b8679651fe97792a6db9006e543d7c43d6f619626ac859dbf41ca8ccbdca217273e9153cd6f764f2d5940784e567491db4be5079", &(0x7f0000000200)=""/234, 0x4}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 16:47:05 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$overlay(0x400019, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@metacopy_on='metacopy=on'}]}) [ 192.665730][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 192.696153][ T8854] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 192.913220][ T8861] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 192.955447][ T8861] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 192.968560][ T8861] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 192.990926][ T8861] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 192.997419][ T8861] EXT4-fs (loop1): mount failed 16:47:06 executing program 1: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) sendmmsg$sock(r0, &(0x7f0000000380)=[{{&(0x7f0000000040)=@un=@abs, 0x80, 0x0, 0x0, &(0x7f0000002400)=[@timestamping={{0x14, 0x1, 0x25, 0x800}}], 0x18}}], 0x1, 0x0) 16:47:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8941, 0x0) 16:47:06 executing program 3: futex(0x0, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x80000000000c, 0x0, 0x0, 0x0, 0x0) 16:47:06 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sysfs$1(0x1, &(0x7f0000000000)='vboxnet0\\\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RWALK(r3, 0x0, 0x8) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r4) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 16:47:06 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=@newqdisc={0x30, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb, 0x8, 'clsact\x00'}]}, 0x30}}, 0x0) 16:47:06 executing program 3: futex(0x0, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x80000000000c, 0x0, 0x0, 0x0, 0x0) 16:47:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$sock_netdev_private(r3, 0x8991, &(0x7f0000000040)) 16:47:06 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$sock_netdev_private(r3, 0x891e, &(0x7f0000000040)) 16:47:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_netdev_private(r1, 0x8970, &(0x7f0000000040)="a082bb11b43a") [ 193.506929][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:47:06 executing program 3: futex(0x0, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x80000000000c, 0x0, 0x0, 0x0, 0x0) 16:47:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) write$FUSE_NOTIFY_DELETE(r3, &(0x7f0000000200)=ANY=[], 0x1f) write$FUSE_STATFS(0xffffffffffffffff, 0x0, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x2000, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8935, &(0x7f00000000c0)={'ip6erspan0\x00'}) 16:47:06 executing program 4: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x5, 0x4, 0x8000, 0x35, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x59, 0x2e, 0x400100]}, 0x40) 16:47:06 executing program 3: futex(0x0, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x80000000000c, 0x0, 0x0, 0x0, 0x0) 16:47:06 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$sock_netdev_private(r3, 0x8913, &(0x7f0000000040)) 16:47:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$sock_netdev_private(r3, 0x8994, &(0x7f0000000040)) 16:47:07 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sysfs$1(0x1, &(0x7f0000000000)='vboxnet0\\\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RWALK(r3, 0x0, 0x8) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 16:47:07 executing program 3: futex(&(0x7f000000cffc), 0x80000000000c, 0x0, 0x0, 0x0, 0x0) 16:47:07 executing program 1: syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) r0 = syz_open_dev$binderN(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x1918ffd, 0x0, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x4018620d, 0x0) 16:47:07 executing program 4: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x5, 0x4, 0x8000, 0x35, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x59, 0x2e, 0x400100]}, 0x40) 16:47:07 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000840)='./file0\x00', 0x4863, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execveat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 16:47:07 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_netdev_private(r1, 0x8994, &(0x7f0000000040)="a082bb11b43a") 16:47:07 executing program 0: symlink(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0/file0\x00', &(0x7f0000000340)='./file0\x00') [ 194.387078][ T27] audit: type=1800 audit(1589820427.446:3): pid=8981 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=15857 res=0 [ 194.401210][ T8984] binder: 8975:8984 ioctl 4018620d 0 returned -22 [ 194.418200][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:47:07 executing program 3: futex(&(0x7f000000cffc), 0x80000000000c, 0x0, 0x0, 0x0, 0x0) 16:47:07 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_netdev_private(r1, 0x8929, &(0x7f0000000040)="a082bb11b43a") 16:47:07 executing program 1: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_netdev_private(r1, 0x8971, &(0x7f0000000040)) 16:47:07 executing program 5: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_netdev_private(r1, 0x8994, &(0x7f0000000040)) 16:47:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f008001fffffff00004000632977fbac14140fe934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 16:47:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sysfs$1(0x1, &(0x7f0000000000)='vboxnet0\\\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RWALK(r3, 0x0, 0x8) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 16:47:08 executing program 0: symlink(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0/file0\x00', &(0x7f0000000340)='./file0\x00') 16:47:08 executing program 1: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_netdev_private(r1, 0x8993, &(0x7f0000000040)) 16:47:08 executing program 3: futex(&(0x7f000000cffc), 0x80000000000c, 0x0, 0x0, 0x0, 0x0) 16:47:08 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}]) io_getevents(r3, 0x0, 0x0, 0x0, 0x0) 16:47:08 executing program 4: add_key(&(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) clone(0xf1671405490fc970, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:47:08 executing program 1: socket(0x200000000000011, 0x3, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x3e, &(0x7f0000000040)={@empty=[0x7], @dev, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @multicast1}}}}}}, 0x0) [ 195.308248][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:47:08 executing program 3: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x80000000000c, 0x0, 0x0, 0x0, 0x0) 16:47:08 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_netdev_private(r1, 0x8970, &(0x7f0000000040)="a082bb11b43a") 16:47:08 executing program 0: symlink(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0/file0\x00', &(0x7f0000000340)='./file0\x00') 16:47:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000b00)={0x14, 0x16, 0x101, 0x0, 0x0, {0x7e}}, 0x14}}, 0x0) 16:47:08 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$sock_netdev_private(r3, 0x8970, &(0x7f0000000040)) 16:47:09 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sysfs$1(0x1, &(0x7f0000000000)='vboxnet0\\\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RWALK(r3, 0x0, 0x8) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 16:47:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x3, 0x0, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) timer_gettime(0x0, &(0x7f0000000000)) 16:47:09 executing program 3: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x80000000000c, 0x0, 0x0, 0x0, 0x0) 16:47:09 executing program 1: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) sendmmsg$sock(r0, &(0x7f0000000380)=[{{&(0x7f0000000040)=@un=@abs, 0x80, 0x0, 0x0, &(0x7f0000002400)=[@mark={{0x14}}, @timestamping={{0x14}}], 0x30}}], 0x1, 0x0) 16:47:09 executing program 0: symlink(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0/file0\x00', &(0x7f0000000340)='./file0\x00') 16:47:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x8, 0x3, 0x208, 0x98, 0x0, 0xd0e0000, 0x0, 0x100, 0x170, 0x1d8, 0x1d8, 0x98, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @loopback, 0x0, 0x0, 'veth0_macvtap\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x268) 16:47:09 executing program 3: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x80000000000c, 0x0, 0x0, 0x0, 0x0) 16:47:09 executing program 1: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x42}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000003c40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20, 0x0) [ 196.172033][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:47:09 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_netdev_private(r1, 0x8948, &(0x7f0000000040)) 16:47:09 executing program 0: symlink(0x0, &(0x7f0000000340)='./file0\x00') 16:47:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_uring_setup(0xae5, &(0x7f0000000100)={0x0, 0x0, 0x6, 0x0, 0x80969800}) 16:47:09 executing program 3: futex(0x0, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x80000000000c, 0x0, 0x0, 0x0, 0x0) 16:47:10 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sysfs$1(0x1, &(0x7f0000000000)='vboxnet0\\\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RWALK(r3, 0x0, 0x8) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 16:47:10 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000140)={{0x1, 0x0, 0x0, 0x3, 0x2}}) 16:47:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x24, 0x1a, 0x0, 0x1, [@AF_INET={0x20, 0x2, 0x0, 0x1, {0x1c, 0x1, 0x0, 0x1, [{0x8, 0x1f}, {0x8, 0xa}, {0x8}]}}]}]}, 0x44}}, 0x0) 16:47:10 executing program 5: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='cpu\t_>6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') 16:47:10 executing program 0: symlink(0x0, &(0x7f0000000340)='./file0\x00') 16:47:10 executing program 3: futex(0x0, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x80000000000c, 0x0, 0x0, 0x0, 0x0) 16:47:10 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$sock_netdev_private(r3, 0x8947, &(0x7f0000000040)) 16:47:10 executing program 3: futex(0x0, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x80000000000c, 0x0, 0x0, 0x0, 0x0) 16:47:10 executing program 0: symlink(0x0, &(0x7f0000000340)='./file0\x00') 16:47:10 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000000)={0xb, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(0xffffffffffffffff) accept4$unix(r0, &(0x7f0000000080), &(0x7f0000000100)=0x6e, 0x0) gettid() open(0x0, 0x14103e, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(0xffffffffffffffff, r1) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x10, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x5, 0x4, 0x8000, 0x35, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x59, 0x2e, 0x400100], 0x0, 0xffffffffffffffff, 0x1}, 0x40) [ 197.027064][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:47:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r2, r3, &(0x7f0000000180)=0x7, 0x6fe7) 16:47:10 executing program 5: ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000040)) clock_gettime(0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xb1d, 0x0, 0x0, 0x0, 0x8, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0xb31, 0x0) io_setup(0x5, &(0x7f0000000200)=0x0) io_pgetevents(r0, 0x0, 0x2, &(0x7f0000000400)=[{}, {}], &(0x7f0000000240)={0x0, 0x1c9c380}, 0x0) unshare(0x40000000) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000140)) [ 197.149717][ T356] tipc: TX() has been purged, node left! [ 197.300775][ T356] tipc: TX() has been purged, node left! [ 197.323893][ T9172] IPVS: ftp: loaded support on port[0] = 21 [ 197.711884][ T9175] IPVS: ftp: loaded support on port[0] = 21 16:47:10 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sysfs$1(0x1, &(0x7f0000000000)='vboxnet0\\\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RWALK(r3, 0x0, 0x8) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 16:47:10 executing program 0: symlink(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0/file0\x00', 0x0) 16:47:10 executing program 3: futex(0x0, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) 16:47:10 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000180)=@deltaction={0x18, 0x31, 0x1, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x4}]}, 0x18}}, 0x0) 16:47:10 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/241, 0x20000118) 16:47:10 executing program 5: ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000040)) clock_gettime(0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xb1d, 0x0, 0x0, 0x0, 0x8, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0xb31, 0x0) io_setup(0x5, &(0x7f0000000200)=0x0) io_pgetevents(r0, 0x0, 0x2, &(0x7f0000000400)=[{}, {}], &(0x7f0000000240)={0x0, 0x1c9c380}, 0x0) unshare(0x40000000) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000140)) 16:47:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) mount(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x40000, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x100000, 0x0) 16:47:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r2 = gettid() recvmmsg(r1, &(0x7f0000005600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000005780)={0x77359400}) tkill(r2, 0x1000000000016) 16:47:11 executing program 0: symlink(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0/file0\x00', 0x0) [ 197.972356][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:47:11 executing program 0: symlink(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0/file0\x00', 0x0) [ 198.056351][ T9237] IPVS: ftp: loaded support on port[0] = 21 16:47:11 executing program 4: getpid() sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8, 0x0, 0x2}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) r2 = socket$inet6(0xa, 0x2, 0x0) dup(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000200)={@loopback, @mcast1, @dev={0xfe, 0x80, [], 0x3}, 0x7f, 0x0, 0x0, 0x100, 0x3, 0x40280}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) gettid() sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x3ff, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9c74, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000001fee)='R\trus\xac\x84cusgrVex:De', 0x0) 16:47:11 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_netdev_private(r1, 0x8929, &(0x7f0000000040)) 16:47:11 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sysfs$1(0x1, &(0x7f0000000000)='vboxnet0\\\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RWALK(r3, 0x0, 0x8) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 16:47:11 executing program 4: r0 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, r0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r1 = creat(0x0, 0x0) socket$inet6(0xa, 0x0, 0x3) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x66, &(0x7f00000002c0), 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, 0x0) write$P9_RXATTRCREATE(r1, &(0x7f0000000140)={0x7}, 0x7) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000280)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') r2 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r2, 0x6, &(0x7f0000000040)={0x1}) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000180)=0x4) write$P9_RREADLINK(r4, &(0x7f0000000840)=ANY=[@ANYBLOB="2e0d9a6d80f0f4b2a338e18064900000c5020a000092bc04a55e021cf33c776f78f1e66b6ce694bfa68feb8466344a429eecfc75f6d270f4fcef4806b3fcc933d49e65b3a0b307aa5524b87e05c88e29ad04927b56e38d883823baabfb625c11bf528302ed8336c73c08899d3cfcfc2309d91ea806191792507c6da64c3a4be7e0becafc7ff02f1c8b17ae8e45c499afbcf346cec9979fb6f8784ade111d6387730eba7a3773cb5d57ea6fb14f94f685fba69a6cc7c732cde6b002e67a966713c5ce008991bf917c050096760b887123fb5c66701dd735c5d88734f60cbdbbb59544c9e0fd0df9b198f24ca94982107c1354379710b9b7d87463ee45562c03aea280d56cd1cc76ca6d2f9ad007df9f4c5e2a8ac073f7da048bc89a75923d28bcfdb1b912f01cffbcd764ab8b8f4dc7550183ee29bb1ad149e1ee07f5d0fe64362f2571d9e5f30852be5bdc35b7cf315cddb1d224c24cdb9ff1c99127deb80550362b209b90268c7dfa029501c51e917883700e26859681a484d8aa40a419cd990f518e18c20000003506e17296fd06e8080c9df8c304cce7f45a562024ea3d7f1faa8b21655ad94c5768d9a48ff4f6f9208244ffcbd3ac557da787fbfc60962bb7f1f8ef395be44bee940fc9e188a7f02bf568e4028a722688b47d67a754813c8c7e41554aa91d3c6b11be719c54d04d69002e79d829ebf88bdc19d3766243fcfb5d62"], 0xc) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) 16:47:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=ANY=[@ANYBLOB="480000001000390400"/20, @ANYRES32=r4, @ANYBLOB="03000000000000002000128008000100736974001400028008000100", @ANYRES32=r3, @ANYBLOB="08000300"], 0x48}}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 16:47:11 executing program 3: futex(0x0, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) 16:47:11 executing program 5: r0 = io_uring_setup(0xf1, &(0x7f0000000580)={0x0, 0x0, 0x7}) prlimit64(0x0, 0xe, &(0x7f0000000000)={0xb, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) close(r0) [ 198.780064][ T9301] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 198.828210][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 199.042047][ T9306] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 16:47:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x3}]}, 0x10) sendmmsg(r0, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 16:47:12 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000600000000000800120000ffff00000000000000000006000000000000000000800000000000e00000010b00000000000000000035000000000000000000000000ff00000000030006000000000002000004000000bb0000000000000000030005000000000002"], 0x80}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmmsg(r2, &(0x7f0000000180), 0x400000000000117, 0x0) 16:47:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') sendfile(r0, r1, 0x0, 0x100000080000000) 16:47:12 executing program 3: futex(0x0, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) 16:47:12 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sysfs$1(0x1, &(0x7f0000000000)='vboxnet0\\\x00') open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 16:47:12 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$sock_netdev_private(r3, 0x8992, &(0x7f0000000040)) 16:47:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8935, &(0x7f00000000c0)={'ip6erspan0\x00'}) [ 199.873128][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:47:13 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x100000) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) [ 217.482098][ T0] NOHZ: local_softirq_pending 08 [ 298.744681][ T0] NOHZ: local_softirq_pending 08 [ 340.342077][ T0] NOHZ: local_softirq_pending 08 [ 341.620800][ T0] NOHZ: local_softirq_pending 08 [ 350.579144][ T1140] INFO: task kworker/u4:4:356 blocked for more than 143 seconds. [ 350.587048][ T1140] Not tainted 5.7.0-rc6-syzkaller #0 [ 350.612828][ T1140] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 350.624328][ T1140] kworker/u4:4 D27504 356 2 0x80004000 [ 350.635426][ T1140] Workqueue: netns cleanup_net [ 350.643853][ T1140] Call Trace: [ 350.647286][ T1140] ? __schedule+0x805/0xc90 [ 350.658437][ T1140] ? schedule+0x188/0x220 [ 350.666798][ T1140] ? schedule_timeout+0x43/0x250 [ 350.676367][ T1140] ? lockdep_hardirqs_on+0x4a4/0x8a0 [ 350.684346][ T1140] ? _raw_spin_unlock_irq+0x1f/0x80 [ 350.694025][ T1140] ? do_wait_for_common+0x232/0x370 [ 350.701888][ T1140] ? console_conditional_schedule+0x30/0x30 [ 350.707785][ T1140] ? wait_for_completion+0x43/0x50 [ 350.718982][ T1140] ? __flush_work+0xca/0x120 [ 350.726219][ T1140] ? start_flush_work+0x730/0x730 [ 350.735940][ T1140] ? rollback_registered_many+0x6ac/0x1450 [ 350.744572][ T1140] ? unregister_netdevice_many+0x46/0x260 [ 350.755438][ T1140] ? ip_tunnel_delete_nets+0x2d4/0x310 [ 350.765348][ T1140] ? ip_tunnel_delete_nets+0x2e5/0x310 [ 350.776059][ T1140] ? vti_init_net+0xf0/0xf0 [ 350.783252][ T1140] ? cleanup_net+0x78c/0xb80 [ 350.787860][ T1140] ? process_one_work+0x76e/0xfd0 [ 350.797897][ T1140] ? worker_thread+0xa7f/0x1450 [ 350.805423][ T1140] ? kthread+0x353/0x380 [ 350.814137][ T1140] ? rcu_lock_release+0x20/0x20 [ 350.821812][ T1140] ? kthread_blkcg+0xd0/0xd0 [ 350.826432][ T1140] ? ret_from_fork+0x24/0x30 [ 350.836132][ T1140] INFO: task kworker/1:4:3470 blocked for more than 143 seconds. [ 350.846802][ T1140] Not tainted 5.7.0-rc6-syzkaller #0 [ 350.857451][ T1140] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 350.869356][ T1140] kworker/1:4 D27344 3470 2 0x80004000 [ 350.875786][ T1140] Workqueue: ipv6_addrconf addrconf_dad_work [ 350.891244][ T1140] Call Trace: [ 350.894600][ T1140] ? __schedule+0x805/0xc90 [ 350.906929][ T1140] ? schedule+0x188/0x220 [ 350.913149][ T1140] ? schedule_preempt_disabled+0xf/0x20 [ 350.918719][ T1140] ? __mutex_lock_common+0x129f/0x2fc0 [ 350.931288][ T1140] ? addrconf_dad_work+0x61/0x1d00 [ 350.936434][ T1140] ? mutex_lock_nested+0x1a/0x20 [ 350.945336][ T1140] ? addrconf_dad_work+0x61/0x1d00 [ 350.954868][ T1140] ? rcu_read_lock_sched_held+0x106/0x170 [ 350.964305][ T1140] ? process_one_work+0x76e/0xfd0 [ 350.973033][ T1140] ? worker_thread+0xa7f/0x1450 [ 350.977915][ T1140] ? kthread+0x353/0x380 [ 350.986472][ T1140] ? rcu_lock_release+0x20/0x20 [ 350.994951][ T1140] ? kthread_blkcg+0xd0/0xd0 [ 351.005276][ T1140] ? ret_from_fork+0x24/0x30 [ 351.013732][ T1140] INFO: task syz-executor.0:9329 blocked for more than 143 seconds. [ 351.025429][ T1140] Not tainted 5.7.0-rc6-syzkaller #0 [ 351.034828][ T1140] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 351.047495][ T1140] syz-executor.0 D28464 9329 7023 0x00004004 [ 351.057505][ T1140] Call Trace: [ 351.066982][ T1140] ? __schedule+0x805/0xc90 [ 351.075184][ T1140] ? schedule+0x188/0x220 [ 351.083057][ T1140] ? schedule_preempt_disabled+0xf/0x20 [ 351.088623][ T1140] ? __mutex_lock_common+0x129f/0x2fc0 [ 351.098126][ T1140] ? sock_do_ioctl+0x11e/0x260 [ 351.106554][ T1140] ? mutex_lock_nested+0x1a/0x20 [ 351.116865][ T1140] ? sock_do_ioctl+0x11e/0x260 [ 351.126281][ T1140] ? do_vfs_ioctl+0x6ea/0x1a00 [ 351.134660][ T1140] ? sock_ioctl+0x4aa/0x690 [ 351.147523][ T1140] ? sock_poll+0x2f0/0x2f0 [ 351.155527][ T1140] ? __se_sys_ioctl+0xf9/0x160 [ 351.163888][ T1140] ? do_syscall_64+0xf3/0x1b0 [ 351.168599][ T1140] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 351.178712][ T1140] INFO: task syz-executor.0:9366 blocked for more than 143 seconds. [ 351.190381][ T1140] Not tainted 5.7.0-rc6-syzkaller #0 [ 351.196203][ T1140] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 351.212161][ T1140] syz-executor.0 D29136 9366 7023 0x00004004 [ 351.218533][ T1140] Call Trace: [ 351.233568][ T1140] ? __schedule+0x805/0xc90 [ 351.238107][ T1140] ? schedule+0x188/0x220 [ 351.244593][ T1140] ? schedule_preempt_disabled+0xf/0x20 [ 351.256077][ T1140] ? __mutex_lock_common+0x129f/0x2fc0 [ 351.263456][ T1140] ? sock_do_ioctl+0x11e/0x260 [ 351.268381][ T1140] ? mutex_lock_nested+0x1a/0x20 [ 351.280505][ T1140] ? sock_do_ioctl+0x11e/0x260 [ 351.285311][ T1140] ? do_vfs_ioctl+0x6ea/0x1a00 [ 351.295225][ T1140] ? sock_ioctl+0x4aa/0x690 [ 351.304266][ T1140] ? sock_poll+0x2f0/0x2f0 [ 351.308705][ T1140] ? __se_sys_ioctl+0xf9/0x160 [ 351.318451][ T1140] ? do_syscall_64+0xf3/0x1b0 [ 351.325876][ T1140] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 351.338251][ T1140] INFO: task syz-executor.2:9353 blocked for more than 144 seconds. [ 351.352686][ T1140] Not tainted 5.7.0-rc6-syzkaller #0 [ 351.358517][ T1140] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 351.371034][ T1140] syz-executor.2 D29120 9353 7211 0x00004004 [ 351.377397][ T1140] Call Trace: [ 351.389113][ T1140] ? __schedule+0x805/0xc90 [ 351.393667][ T1140] ? schedule+0x188/0x220 [ 351.397990][ T1140] ? schedule_preempt_disabled+0xf/0x20 [ 351.410888][ T1140] ? __mutex_lock_common+0x129f/0x2fc0 [ 351.416401][ T1140] ? sock_do_ioctl+0x11e/0x260 [ 351.425747][ T1140] ? mutex_lock_nested+0x1a/0x20 [ 351.434438][ T1140] ? sock_do_ioctl+0x11e/0x260 [ 351.444999][ T1140] ? do_vfs_ioctl+0x6ea/0x1a00 [ 351.454029][ T1140] ? sock_ioctl+0x4aa/0x690 [ 351.458646][ T1140] ? sock_poll+0x2f0/0x2f0 [ 351.467161][ T1140] ? __se_sys_ioctl+0xf9/0x160 [ 351.475503][ T1140] ? do_syscall_64+0xf3/0x1b0 [ 351.483901][ T1140] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 351.493667][ T1140] INFO: task syz-executor.1:9352 blocked for more than 144 seconds. [ 351.506012][ T1140] Not tainted 5.7.0-rc6-syzkaller #0 [ 351.515436][ T1140] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 351.528072][ T1140] syz-executor.1 D29136 9352 7153 0x00004004 [ 351.538171][ T1140] Call Trace: [ 351.551989][ T1140] ? __schedule+0x805/0xc90 [ 351.556573][ T1140] ? schedule+0x188/0x220 [ 351.566790][ T1140] ? schedule_preempt_disabled+0xf/0x20 [ 351.576624][ T1140] ? __mutex_lock_common+0x129f/0x2fc0 [ 351.585687][ T1140] ? sock_do_ioctl+0x11e/0x260 [ 351.593982][ T1140] ? mutex_lock_nested+0x1a/0x20 [ 351.602472][ T1140] ? sock_do_ioctl+0x11e/0x260 [ 351.607241][ T1140] ? do_vfs_ioctl+0x6ea/0x1a00 [ 351.615846][ T1140] ? sock_ioctl+0x4aa/0x690 [ 351.625601][ T1140] ? sock_poll+0x2f0/0x2f0 [ 351.634257][ T1140] ? __se_sys_ioctl+0xf9/0x160 [ 351.642738][ T1140] ? do_syscall_64+0xf3/0x1b0 [ 351.647433][ T1140] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 351.658155][ T1140] INFO: task syz-executor.1:9355 blocked for more than 144 seconds. [ 351.670198][ T1140] Not tainted 5.7.0-rc6-syzkaller #0 [ 351.676205][ T1140] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 351.694465][ T1140] syz-executor.1 D28896 9355 7153 0x00004004 [ 351.705298][ T1140] Call Trace: [ 351.708636][ T1140] ? __schedule+0x805/0xc90 [ 351.718724][ T1140] ? schedule+0x188/0x220 [ 351.726201][ T1140] ? schedule_preempt_disabled+0xf/0x20 [ 351.736374][ T1140] ? __mutex_lock_common+0x129f/0x2fc0 [ 351.745476][ T1140] ? dev_ioctl+0x4c3/0xc70 [ 351.754866][ T1140] ? mutex_lock_nested+0x1a/0x20 [ 351.762723][ T1140] ? dev_ioctl+0x4c3/0xc70 [ 351.767198][ T1140] ? sock_do_ioctl+0x169/0x260 [ 351.778367][ T1140] ? sock_ioctl+0x4aa/0x690 [ 351.785806][ T1140] ? sock_poll+0x2f0/0x2f0 [ 351.795216][ T1140] ? __se_sys_ioctl+0xf9/0x160 [ 351.804864][ T1140] ? do_syscall_64+0xf3/0x1b0 [ 351.814519][ T1140] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 351.823579][ T1140] INFO: task syz-executor.1:9373 blocked for more than 144 seconds. [ 351.836581][ T1140] Not tainted 5.7.0-rc6-syzkaller #0 [ 351.845253][ T1140] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 351.863507][ T1140] syz-executor.1 D29136 9373 7153 0x00004004 [ 351.872645][ T1140] Call Trace: [ 351.875953][ T1140] ? __schedule+0x805/0xc90 [ 351.885433][ T1140] ? schedule+0x188/0x220 [ 351.892519][ T1140] ? schedule_preempt_disabled+0xf/0x20 [ 351.898081][ T1140] ? __mutex_lock_common+0x129f/0x2fc0 [ 351.908610][ T1140] ? sock_do_ioctl+0x11e/0x260 [ 351.923188][ T1140] ? mutex_lock_nested+0x1a/0x20 [ 351.928154][ T1140] ? sock_do_ioctl+0x11e/0x260 [ 351.936252][ T1140] ? do_vfs_ioctl+0x6ea/0x1a00 [ 351.945805][ T1140] ? sock_ioctl+0x4aa/0x690 [ 351.953432][ T1140] ? sock_poll+0x2f0/0x2f0 [ 351.957868][ T1140] ? __se_sys_ioctl+0xf9/0x160 [ 351.967632][ T1140] ? do_syscall_64+0xf3/0x1b0 [ 351.975023][ T1140] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 351.985736][ T1140] INFO: task syz-executor.1:9377 blocked for more than 144 seconds. [ 351.997583][ T1140] Not tainted 5.7.0-rc6-syzkaller #0 [ 352.007959][ T1140] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 352.025102][ T1140] syz-executor.1 D29136 9377 7153 0x00004004 [ 352.033309][ T1140] Call Trace: [ 352.036658][ T1140] ? __schedule+0x805/0xc90 [ 352.047106][ T1140] ? schedule+0x188/0x220 [ 352.053294][ T1140] ? schedule_preempt_disabled+0xf/0x20 [ 352.058871][ T1140] ? __mutex_lock_common+0x129f/0x2fc0 [ 352.071522][ T1140] ? dev_ioctl+0x4c3/0xc70 [ 352.075951][ T1140] ? mutex_lock_nested+0x1a/0x20 [ 352.086753][ T1140] ? dev_ioctl+0x4c3/0xc70 [ 352.092935][ T1140] ? sock_do_ioctl+0x169/0x260 [ 352.097712][ T1140] ? sock_ioctl+0x4aa/0x690 [ 352.114045][ T1140] ? sock_poll+0x2f0/0x2f0 [ 352.118492][ T1140] ? __se_sys_ioctl+0xf9/0x160 [ 352.124462][ T1140] ? do_syscall_64+0xf3/0x1b0 [ 352.137131][ T1140] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 352.144249][ T1140] INFO: task syz-executor.4:9359 blocked for more than 144 seconds. [ 352.158619][ T1140] Not tainted 5.7.0-rc6-syzkaller #0 [ 352.165254][ T1140] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 352.180736][ T1140] syz-executor.4 D29136 9359 7469 0x00004004 [ 352.187086][ T1140] Call Trace: [ 352.199168][ T1140] ? __schedule+0x805/0xc90 [ 352.203787][ T1140] ? schedule+0x188/0x220 [ 352.208104][ T1140] ? schedule_preempt_disabled+0xf/0x20 [ 352.220172][ T1140] ? __mutex_lock_common+0x129f/0x2fc0 [ 352.225676][ T1140] ? sock_do_ioctl+0x11e/0x260 [ 352.235346][ T1140] ? mutex_lock_nested+0x1a/0x20 [ 352.244772][ T1140] ? sock_do_ioctl+0x11e/0x260 [ 352.255170][ T1140] ? do_vfs_ioctl+0x6ea/0x1a00 [ 352.266637][ T1140] ? sock_ioctl+0x4aa/0x690 [ 352.275822][ T1140] ? sock_poll+0x2f0/0x2f0 [ 352.283137][ T1140] ? __se_sys_ioctl+0xf9/0x160 [ 352.288282][ T1140] ? do_syscall_64+0xf3/0x1b0 [ 352.298387][ T1140] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 352.307316][ T1140] [ 352.307316][ T1140] Showing all locks held in the system: [ 352.319802][ T1140] 5 locks held by kworker/u4:4/356: [ 352.325009][ T1140] #0: ffff8880a9bb4938 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x6df/0xfd0 [ 352.344635][ T1140] #1: ffffc90002067d80 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x71e/0xfd0 [ 352.363848][ T1140] #2: ffffffff895ac530 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xac/0xb80 [ 352.376057][ T1140] #3: ffffffff895ae218 (rtnl_mutex){+.+.}-{3:3}, at: ip_tunnel_delete_nets+0x7b/0x310 [ 352.392414][ T1140] #4: ffffffff892d86d8 (cpu_hotplug_lock){++++}-{0:0}, at: rollback_registered_many+0x4dd/0x1450 [ 352.405829][ T1140] 1 lock held by khungtaskd/1140: [ 352.415431][ T1140] #0: ffffffff892e85d0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30 [ 352.428465][ T1140] 3 locks held by kworker/1:4/3470: [ 352.438839][ T1140] #0: ffff888214cd6938 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x6df/0xfd0 [ 352.455395][ T1140] #1: ffffc900032afd80 ((work_completion)(&(&ifa->dad_work)->work)){+.+.}-{0:0}, at: process_one_work+0x71e/0xfd0 [ 352.476822][ T1140] #2: ffffffff895ae218 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_dad_work+0x61/0x1d00 [ 352.488325][ T1140] 1 lock held by in:imklog/6704: [ 352.501936][ T1140] #0: ffff8880999e7bb0 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0x25d/0x2f0 [ 352.517011][ T1140] 1 lock held by syz-executor.1/8939: [ 352.524504][ T1140] #0: ffffffff895ae218 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3c/0x130 [ 352.540413][ T1140] 1 lock held by syz-executor.0/9329: [ 352.546667][ T1140] #0: ffffffff895ae218 (rtnl_mutex){+.+.}-{3:3}, at: sock_do_ioctl+0x11e/0x260 [ 352.562956][ T1140] 1 lock held by syz-executor.0/9366: [ 352.568345][ T1140] #0: ffffffff895ae218 (rtnl_mutex){+.+.}-{3:3}, at: sock_do_ioctl+0x11e/0x260 [ 352.592706][ T1140] 1 lock held by syz-executor.2/9353: [ 352.598118][ T1140] #0: ffffffff895ae218 (rtnl_mutex){+.+.}-{3:3}, at: sock_do_ioctl+0x11e/0x260 [ 352.614728][ T1140] 1 lock held by syz-executor.1/9352: [ 352.620964][ T1140] #0: ffffffff895ae218 (rtnl_mutex){+.+.}-{3:3}, at: sock_do_ioctl+0x11e/0x260 [ 352.636504][ T1140] 1 lock held by syz-executor.1/9355: [ 352.643104][ T1140] #0: ffffffff895ae218 (rtnl_mutex){+.+.}-{3:3}, at: dev_ioctl+0x4c3/0xc70 [ 352.658335][ T1140] 1 lock held by syz-executor.1/9373: [ 352.665605][ T1140] #0: ffffffff895ae218 (rtnl_mutex){+.+.}-{3:3}, at: sock_do_ioctl+0x11e/0x260 [ 352.681225][ T1140] 1 lock held by syz-executor.1/9377: [ 352.686606][ T1140] #0: ffffffff895ae218 (rtnl_mutex){+.+.}-{3:3}, at: dev_ioctl+0x4c3/0xc70 [ 352.704041][ T1140] 1 lock held by syz-executor.4/9359: [ 352.712372][ T1140] #0: ffffffff895ae218 (rtnl_mutex){+.+.}-{3:3}, at: sock_do_ioctl+0x11e/0x260 [ 352.725945][ T1140] 1 lock held by syz-executor.3/9380: [ 352.734190][ T1140] #0: ffffffff895ae218 (rtnl_mutex){+.+.}-{3:3}, at: sock_do_ioctl+0x11e/0x260 [ 352.751533][ T1140] [ 352.753877][ T1140] ============================================= [ 352.753877][ T1140] [ 352.766408][ T1140] NMI backtrace for cpu 1 [ 352.770916][ T1140] CPU: 1 PID: 1140 Comm: khungtaskd Not tainted 5.7.0-rc6-syzkaller #0 [ 352.779135][ T1140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 352.789176][ T1140] Call Trace: [ 352.792566][ T1140] dump_stack+0x1e9/0x30e [ 352.796892][ T1140] nmi_cpu_backtrace+0x9f/0x180 [ 352.801792][ T1140] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 352.808209][ T1140] nmi_trigger_cpumask_backtrace+0x16a/0x280 [ 352.814255][ T1140] watchdog+0xd2a/0xd40 [ 352.818409][ T1140] kthread+0x353/0x380 [ 352.822476][ T1140] ? hungtask_pm_notify+0x50/0x50 [ 352.827502][ T1140] ? kthread_blkcg+0xd0/0xd0 [ 352.832078][ T1140] ret_from_fork+0x24/0x30 [ 352.836691][ T1140] Sending NMI from CPU 1 to CPUs 0: [ 352.842237][ C0] NMI backtrace for cpu 0 [ 352.842241][ C0] CPU: 0 PID: 9309 Comm: syz-executor.5 Not tainted 5.7.0-rc6-syzkaller #0 [ 352.842245][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 352.842247][ C0] RIP: 0010:debug_lockdep_rcu_enabled+0x2/0xe0 [ 352.842253][ C0] Code: 74 2c 51 00 eb cf 66 90 8a 05 6a 8b 0b 08 c3 66 0f 1f 84 00 00 00 00 00 e8 eb bc 00 00 e9 e6 bd 00 00 66 0f 1f 44 00 00 41 57 <41> 56 53 48 c7 c0 24 c0 6b 89 48 c1 e8 03 49 bf 00 00 00 00 00 fc [ 352.842255][ C0] RSP: 0018:ffffc90006cdfd18 EFLAGS: 00000286 [ 352.842260][ C0] RAX: ffffffff81d37ef8 RBX: ffff8880a30b1110 RCX: 0000000000040000 [ 352.842263][ C0] RDX: 0000000000000000 RSI: 0000000000001c93 RDI: ffffffff88e934c8 [ 352.842266][ C0] RBP: ffff8880a30b1160 R08: dffffc0000000000 R09: ffffed1014616261 [ 352.842268][ C0] R10: ffffed1014616261 R11: 0000000000000000 R12: dffffc0000000000 [ 352.842271][ C0] R13: ffff888089dca5e8 R14: 0000000000000000 R15: 1ffff1101461622c [ 352.842274][ C0] FS: 00007fd2789d3700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 352.842277][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 352.842279][ C0] CR2: 00007ffcf7eacdd8 CR3: 000000009ee52000 CR4: 00000000001406f0 [ 352.842282][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 352.842285][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 352.842286][ C0] Call Trace: [ 352.842288][ C0] ___might_sleep+0x1f/0x570 [ 352.842291][ C0] io_ring_ctx_wait_and_kill+0xbe/0x820 [ 352.842293][ C0] ? io_uring_flush+0xba0/0xba0 [ 352.842295][ C0] io_uring_release+0x59/0x70 [ 352.842296][ C0] __fput+0x2ed/0x750 [ 352.842298][ C0] task_work_run+0x147/0x1d0 [ 352.842301][ C0] prepare_exit_to_usermode+0x48e/0x600 [ 352.842303][ C0] ? syscall_return_slowpath+0xf9/0x420 [ 352.842305][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 352.842307][ C0] RIP: 0033:0x45ca29 [ 352.842312][ C0] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 352.842315][ C0] RSP: 002b:00007fd2789d2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 352.842320][ C0] RAX: 0000000000000000 RBX: 00000000004dac40 RCX: 000000000045ca29 [ 352.842323][ C0] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 352.842325][ C0] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 352.842328][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 352.842331][ C0] R13: 0000000000000078 R14: 00000000005255f2 R15: 00007fd2789d36d4 [ 352.874758][ T1140] Kernel panic - not syncing: hung_task: blocked tasks [ 353.106491][ T1140] CPU: 1 PID: 1140 Comm: khungtaskd Not tainted 5.7.0-rc6-syzkaller #0 [ 353.114708][ T1140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 353.124745][ T1140] Call Trace: [ 353.128029][ T1140] dump_stack+0x1e9/0x30e [ 353.132426][ T1140] panic+0x264/0x7a0 [ 353.136311][ T1140] ? nmi_trigger_cpumask_backtrace+0x206/0x280 [ 353.142456][ T1140] watchdog+0xd3d/0xd40 [ 353.146608][ T1140] kthread+0x353/0x380 [ 353.150683][ T1140] ? hungtask_pm_notify+0x50/0x50 [ 353.155708][ T1140] ? kthread_blkcg+0xd0/0xd0 [ 353.160305][ T1140] ret_from_fork+0x24/0x30 [ 353.166396][ T1140] Kernel Offset: disabled [ 353.170742][ T1140] Rebooting in 86400 seconds..