[info] Using makefile-style concurrent boot in runlevel 2. [ 26.918071] audit: type=1800 audit(1544681925.164:21): pid=5866 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2419 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] startpar: service(s) returned failure: ssh ...[?25l[?1c7[FAIL8[?25h[?0c failed! Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.28' (ECDSA) to the list of known hosts. 2018/12/13 06:18:55 fuzzer started 2018/12/13 06:18:57 dialing manager at 10.128.0.26:45075 2018/12/13 06:18:57 syscalls: 1 2018/12/13 06:18:57 code coverage: enabled 2018/12/13 06:18:57 comparison tracing: enabled 2018/12/13 06:18:57 setuid sandbox: enabled 2018/12/13 06:18:57 namespace sandbox: enabled 2018/12/13 06:18:57 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/13 06:18:57 fault injection: enabled 2018/12/13 06:18:57 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/13 06:18:57 net packet injection: enabled 2018/12/13 06:18:57 net device setup: enabled 06:21:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000280), 0x108) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x141001, 0x0) write$UHID_CREATE2(r1, &(0x7f00000003c0)={0xb, 'syz1\x00', 'syz0\x00', 'syz0\x00', 0x8e, 0x101, 0x101, 0x10000, 0x101, 0xab5c, "4250d57da0ff6e19a90eccd2abcc47f549707b605fa72cb3f81814140bbd5c75d160a810bd3e65ac8913d4b744add79be8b565d01201f938a76d7d7833a3f64714f66f8de0b94175f911e1c46c61aa937b7a51619de31e8008652de72e193d9bb9d12d27f66e20fe079ac6b748b01b84fa5da3e21422fb81c747c72484320ddb6678ab8d75e1962fcd5f9e3fbf3c"}, 0x1a6) mremap(&(0x7f00007c0000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000054000/0x2000)=nil) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_G_PRIORITY(r4, 0x80045643, 0x3) socket$nl_route(0x10, 0x3, 0x0) geteuid() openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f00009b2000/0x18000)=nil, 0x0, 0x0, 0x0, &(0x7f0000001500), 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0xffff}) syzkaller login: [ 197.295536] IPVS: ftp: loaded support on port[0] = 21 06:21:35 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x20e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x6, 0x7fffffff) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x141080, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000480)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000005c0)={'bond0\x00\x00\x00\x00\x00\x00\x00!\x00', @ifru_names='bond_slave_1\x00'}) ioctl$VIDIOC_ENCODER_CMD(r2, 0xc028564d, &(0x7f0000000680)={0x1, 0x1, [0xfff, 0x101, 0x3ff, 0x40, 0x0, 0xfffffffffffffffb, 0x8, 0x4f]}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x80045400, &(0x7f00000004c0)) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x20a800, 0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000740)="e2da5cdea423495c8b5663b2d9e462f4e65c25cc8b2ba5e1349cd9ae758d94c045f53f48860fd0b3d8013a69034f6ac0d6e1e98dfe38d2d9e2e2c54d473c67bfa22bbf07fadb6002cda4dd466bf8b4ac1fd7837039b702b9d0fa204a8e5df87c3de67d40844e3ddd3c120aee61b90f3b98210922d8d4271c6df39457ffa88a8a1c33837414408c58e56e3fc11ec40ec466928864d45fe30bbdca4189941c975bc6fe8fb0e6bf8e2a58131d1b5d088066c68b8a6ee0c4e1fea78983de57627ebf6f449a310f966c64391d936f99802fb9320ae1cc") r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/sequencer2\x00', 0x40042, 0x0) sendto$inet(r1, &(0x7f00000000c0)="8dec431bb44aff53a310b4eabef65b9ca28574570c8753d962784ce7563c1f448215fd237bf4c9159a98e9205a38a1fef116825d2a67dccc355557378e26b4e71c9ead8245ce8f8727e4d5e348d6b048462955248e97e362bb149adcd5ad849873b82111c2ecfa383140f9d4c99f525041a886277a6592dbc6b9108911e88a440b93f5c0fae544676b44a19bf06aa255a549db9cb0a9221a90f33fec43b1d074bf", 0xa1, 0x1, 0x0, 0x0) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000580)='fou\x00') sendmsg$FOU_CMD_DEL(r5, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000600)={&(0x7f00000006c0)=ANY=[@ANYBLOB="24e8576a", @ANYRES16=r6, @ANYRESHEX=r1], 0x3}, 0x1, 0x0, 0x0, 0x20044000}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="520f020000000000000020fb00000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x8050}, 0x40) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$session_to_parent(0x12) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0xc81, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = syz_open_dev$midi(&(0x7f0000000440)='/dev/midi#\x00', 0x1, 0x40100) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000300)={0x0, @remote, @loopback}, &(0x7f0000000340)=0xc) sendmsg$nl_route(r8, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f00000008c0)=ANY=[@ANYBLOB="080001000000003094a6b55411b84bf77ac75b808e4b0a32be1f12aa61bed6445ba18694254fbe0da548be108d2128a6b9bacb28d0eea75ed61ae3ec9893fdc909058a9ad36882664a8bbb0c07d1a5b7c64b86fda2d159dda13309760c4557349fc9fe563c7b85aa8e522970da943093f8be0a87c42c45abd795a686a302db69208e9d2c719fc1e516ec2e01b256e8ce02680677a45df5276f1f0868e298eeaf4cb6567de0b42ffeb222f33744d0a44ac3a1dbd7c5c806662f82d6e774f9516855fe6e4186bace85a5fec91089b98c02ebfc2a3120d0569125f2d7c114affa8d59525981e901a54e39fd5f109975bbd8cb991bb5007d2330fa8d2ff1e9026933595c3852000000000000000000000000"], 0x1}}, 0x4008000) ioctl$sock_proto_private(r7, 0x80089ec, &(0x7f0000000140)="039625617620978a4df541244054545eefb285b44d2198c37642636f3bd6084339c6e79154e7a4e1e8a3a316d5a4d756fa828508c3eaae4df2759d4d16de576413772f248c74aae160e44749d604a7af5290efc74ba837ec71ff4bfb5f9a2d51403ecc6b5a4bb2dab710e3367549b45cd0b3fed1c251372400872f340ee3b348964d022f3224519d06adad720a5650c9b04292955ae6fd364adebee641bc911bcdd907f409e8200d95b946789c69b1d8876c") r9 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0xff, 0x80000) syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x4080) ioctl$VT_GETMODE(r9, 0x5601, &(0x7f0000000240)) [ 197.591455] IPVS: ftp: loaded support on port[0] = 21 06:21:35 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) acct(&(0x7f0000000340)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000200), &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000002c0), &(0x7f0000000300)=0x20) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000100), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x40000000000001) recvfrom$inet6(r1, &(0x7f0000000040)=""/31, 0x1f, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) r2 = accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) sendto$inet6(r2, &(0x7f00000000c0)='A', 0x1, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f00000005c0)=ANY=[], 0x0) dup2(r0, r1) [ 197.947115] IPVS: ftp: loaded support on port[0] = 21 06:21:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="b7859cb8eec705f2288a933d6e593ae164c990a016726640c522b60bdfedb810", 0x20) r1 = accept$alg(r0, 0x0, 0x0) read(r1, &(0x7f0000000bc0)=""/93, 0x5d) recvmsg(r1, &(0x7f0000d43000)={&(0x7f00000002c0)=@hci, 0x80, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0x6}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) [ 198.338543] IPVS: ftp: loaded support on port[0] = 21 06:21:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000000104fffffd3b54c007110000f30501000b000300000010d10200cf", 0x1f) sendmsg$nl_generic(r0, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x20, 0x2f, 0x119, 0x0, 0x0, {0x3}, [@nested={0xc, 0x0, [@typed={0x8, 0x1, @binary="04"}]}]}, 0x20}}, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x18) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000001c0)={r1}, &(0x7f0000000200)=0x8) [ 198.737012] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.765342] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.782643] device bridge_slave_0 entered promiscuous mode [ 198.878137] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.892348] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.911519] device bridge_slave_1 entered promiscuous mode [ 198.965453] IPVS: ftp: loaded support on port[0] = 21 [ 199.036264] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 199.126791] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 06:21:37 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) gettid() ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000580)={'sit0\x00', 0x0}) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000040)=r2) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) getpeername(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f00000000c0)=0x80) bind$netlink(r3, &(0x7f0000000240)={0x10, 0x0, 0x25dfdbfc, 0x200000}, 0xc) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x1}) [ 199.567155] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 199.617732] IPVS: ftp: loaded support on port[0] = 21 [ 199.627987] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.662767] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.670167] device bridge_slave_0 entered promiscuous mode [ 199.737021] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 199.785631] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.792437] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.799793] device bridge_slave_1 entered promiscuous mode [ 199.935363] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.948563] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.963015] device bridge_slave_0 entered promiscuous mode [ 199.995924] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 200.110818] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.132248] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.144442] device bridge_slave_1 entered promiscuous mode [ 200.214230] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 200.273906] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 200.376525] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 200.388742] team0: Port device team_slave_0 added [ 200.396279] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 200.535562] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 200.544958] team0: Port device team_slave_1 added [ 200.618881] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 200.648932] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 200.664521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 200.674603] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 200.709431] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.729164] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.737139] device bridge_slave_0 entered promiscuous mode [ 200.793156] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 200.800051] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 200.808861] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 200.833654] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 200.853011] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.861687] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.869047] device bridge_slave_1 entered promiscuous mode [ 200.900032] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 200.941154] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 200.971826] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 200.979805] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 201.024394] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 201.062974] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 201.105470] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 201.121752] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 201.140671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 201.177494] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 201.323906] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 201.351592] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 201.381628] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.388009] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.422411] device bridge_slave_0 entered promiscuous mode [ 201.506719] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 201.529169] team0: Port device team_slave_0 added [ 201.538598] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.548188] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.571636] device bridge_slave_1 entered promiscuous mode [ 201.599040] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 201.649956] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 201.672462] team0: Port device team_slave_1 added [ 201.679799] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 201.779116] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 201.786753] team0: Port device team_slave_0 added [ 201.797866] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 201.821237] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 201.834781] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 201.907096] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 201.927447] team0: Port device team_slave_1 added [ 201.978069] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 201.999800] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.012556] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.036777] device bridge_slave_0 entered promiscuous mode [ 202.053676] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 202.064828] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 202.086706] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 202.121992] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 202.166049] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 202.205222] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.220855] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.230385] device bridge_slave_1 entered promiscuous mode [ 202.240117] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 202.260730] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 202.270976] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 202.294408] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 202.325817] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 202.338680] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 202.361828] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 202.370149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 202.451483] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 202.458736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 202.472052] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 202.497300] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 202.512411] team0: Port device team_slave_0 added [ 202.520597] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 202.554669] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 202.664603] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 202.682513] team0: Port device team_slave_1 added [ 202.690482] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.697025] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.704148] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.710533] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.724802] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 202.733607] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 202.764902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 202.806732] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 202.845031] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 202.863474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 202.917035] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 203.007089] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 203.041637] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 203.049255] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 203.058585] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 203.159409] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 203.190571] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 203.212271] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 203.229639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 203.252722] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 203.297261] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 203.322719] team0: Port device team_slave_0 added [ 203.363649] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 203.374702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 203.404902] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 203.422338] team0: Port device team_slave_1 added [ 203.531771] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 203.538658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 203.580895] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 203.605392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 203.625986] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 203.722117] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 203.728983] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 203.742267] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 203.777002] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.783449] bridge0: port 2(bridge_slave_1) entered forwarding state [ 203.790111] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.796524] bridge0: port 1(bridge_slave_0) entered forwarding state [ 203.804776] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 203.904934] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 203.918957] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 203.927528] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 203.938877] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 203.953669] team0: Port device team_slave_0 added [ 203.965531] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.971950] bridge0: port 2(bridge_slave_1) entered forwarding state [ 203.978609] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.985039] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.040998] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 204.054161] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 204.061808] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 204.082007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 204.126120] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 204.142551] team0: Port device team_slave_1 added [ 204.271144] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 204.283406] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 204.315416] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 204.330648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 204.342625] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 204.446283] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 204.461963] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 204.469876] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 204.552331] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 204.559575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 204.582248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 204.714521] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 204.722035] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 204.731103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 204.745396] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.751806] bridge0: port 2(bridge_slave_1) entered forwarding state [ 204.758466] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.764902] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.774189] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 205.271891] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 205.470883] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.477321] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.484070] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.490439] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.526213] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 206.021154] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.027632] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.034380] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.040751] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.074782] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 206.334333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 206.347169] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 208.248587] 8021q: adding VLAN 0 to HW filter on device bond0 [ 208.716123] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 208.976208] 8021q: adding VLAN 0 to HW filter on device bond0 [ 209.146507] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 209.167600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 209.182887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 209.207128] 8021q: adding VLAN 0 to HW filter on device bond0 [ 209.487539] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 209.628514] 8021q: adding VLAN 0 to HW filter on device team0 [ 209.770193] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 209.793961] 8021q: adding VLAN 0 to HW filter on device bond0 [ 210.056598] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 210.070868] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 210.086495] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 210.257588] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 210.271081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 210.278955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 210.294931] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 210.393798] 8021q: adding VLAN 0 to HW filter on device team0 [ 210.660908] 8021q: adding VLAN 0 to HW filter on device bond0 [ 210.712887] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 210.719052] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 210.728975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 210.771504] 8021q: adding VLAN 0 to HW filter on device team0 [ 211.078367] 8021q: adding VLAN 0 to HW filter on device bond0 [ 211.119978] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 211.229917] 8021q: adding VLAN 0 to HW filter on device team0 [ 211.553038] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 211.602633] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 211.608780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 211.621968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 211.954429] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 211.960615] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 211.972545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.026054] 8021q: adding VLAN 0 to HW filter on device team0 [ 212.419619] 8021q: adding VLAN 0 to HW filter on device team0 [ 212.752984] hrtimer: interrupt took 33849 ns [ 212.863973] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 06:21:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000280), 0x108) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x141001, 0x0) write$UHID_CREATE2(r1, &(0x7f00000003c0)={0xb, 'syz1\x00', 'syz0\x00', 'syz0\x00', 0x8e, 0x101, 0x101, 0x10000, 0x101, 0xab5c, "4250d57da0ff6e19a90eccd2abcc47f549707b605fa72cb3f81814140bbd5c75d160a810bd3e65ac8913d4b744add79be8b565d01201f938a76d7d7833a3f64714f66f8de0b94175f911e1c46c61aa937b7a51619de31e8008652de72e193d9bb9d12d27f66e20fe079ac6b748b01b84fa5da3e21422fb81c747c72484320ddb6678ab8d75e1962fcd5f9e3fbf3c"}, 0x1a6) mremap(&(0x7f00007c0000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000054000/0x2000)=nil) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_G_PRIORITY(r4, 0x80045643, 0x3) socket$nl_route(0x10, 0x3, 0x0) geteuid() openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f00009b2000/0x18000)=nil, 0x0, 0x0, 0x0, &(0x7f0000001500), 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0xffff}) [ 213.529929] bond0: Releasing backup interface bond_slave_1 06:21:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000280), 0x108) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x141001, 0x0) write$UHID_CREATE2(r1, &(0x7f00000003c0)={0xb, 'syz1\x00', 'syz0\x00', 'syz0\x00', 0x8e, 0x101, 0x101, 0x10000, 0x101, 0xab5c, "4250d57da0ff6e19a90eccd2abcc47f549707b605fa72cb3f81814140bbd5c75d160a810bd3e65ac8913d4b744add79be8b565d01201f938a76d7d7833a3f64714f66f8de0b94175f911e1c46c61aa937b7a51619de31e8008652de72e193d9bb9d12d27f66e20fe079ac6b748b01b84fa5da3e21422fb81c747c72484320ddb6678ab8d75e1962fcd5f9e3fbf3c"}, 0x1a6) mremap(&(0x7f00007c0000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000054000/0x2000)=nil) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_G_PRIORITY(r4, 0x80045643, 0x3) socket$nl_route(0x10, 0x3, 0x0) geteuid() openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f00009b2000/0x18000)=nil, 0x0, 0x0, 0x0, &(0x7f0000001500), 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0xffff}) [ 213.705440] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 06:21:52 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) acct(&(0x7f0000000340)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000200), &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000002c0), &(0x7f0000000300)=0x20) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000100), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x40000000000001) recvfrom$inet6(r1, &(0x7f0000000040)=""/31, 0x1f, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) r2 = accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) sendto$inet6(r2, &(0x7f00000000c0)='A', 0x1, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f00000005c0)=ANY=[], 0x0) dup2(r0, r1) 06:21:52 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x20e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x6, 0x7fffffff) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x141080, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000480)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000005c0)={'bond0\x00\x00\x00\x00\x00\x00\x00!\x00', @ifru_names='bond_slave_1\x00'}) ioctl$VIDIOC_ENCODER_CMD(r2, 0xc028564d, &(0x7f0000000680)={0x1, 0x1, [0xfff, 0x101, 0x3ff, 0x40, 0x0, 0xfffffffffffffffb, 0x8, 0x4f]}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x80045400, &(0x7f00000004c0)) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x20a800, 0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000740)="e2da5cdea423495c8b5663b2d9e462f4e65c25cc8b2ba5e1349cd9ae758d94c045f53f48860fd0b3d8013a69034f6ac0d6e1e98dfe38d2d9e2e2c54d473c67bfa22bbf07fadb6002cda4dd466bf8b4ac1fd7837039b702b9d0fa204a8e5df87c3de67d40844e3ddd3c120aee61b90f3b98210922d8d4271c6df39457ffa88a8a1c33837414408c58e56e3fc11ec40ec466928864d45fe30bbdca4189941c975bc6fe8fb0e6bf8e2a58131d1b5d088066c68b8a6ee0c4e1fea78983de57627ebf6f449a310f966c64391d936f99802fb9320ae1cc") r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/sequencer2\x00', 0x40042, 0x0) sendto$inet(r1, &(0x7f00000000c0)="8dec431bb44aff53a310b4eabef65b9ca28574570c8753d962784ce7563c1f448215fd237bf4c9159a98e9205a38a1fef116825d2a67dccc355557378e26b4e71c9ead8245ce8f8727e4d5e348d6b048462955248e97e362bb149adcd5ad849873b82111c2ecfa383140f9d4c99f525041a886277a6592dbc6b9108911e88a440b93f5c0fae544676b44a19bf06aa255a549db9cb0a9221a90f33fec43b1d074bf", 0xa1, 0x1, 0x0, 0x0) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000580)='fou\x00') sendmsg$FOU_CMD_DEL(r5, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000600)={&(0x7f00000006c0)=ANY=[@ANYBLOB="24e8576a", @ANYRES16=r6, @ANYRESHEX=r1], 0x3}, 0x1, 0x0, 0x0, 0x20044000}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="520f020000000000000020fb00000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x8050}, 0x40) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$session_to_parent(0x12) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0xc81, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = syz_open_dev$midi(&(0x7f0000000440)='/dev/midi#\x00', 0x1, 0x40100) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000300)={0x0, @remote, @loopback}, &(0x7f0000000340)=0xc) sendmsg$nl_route(r8, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4008000) ioctl$sock_proto_private(r7, 0x80089ec, &(0x7f0000000140)="039625617620978a4df541244054545eefb285b44d2198c37642636f3bd6084339c6e79154e7a4e1e8a3a316d5a4d756fa828508c3eaae4df2759d4d16de576413772f248c74aae160e44749d604a7af5290efc74ba837ec71ff4bfb5f9a2d51403ecc6b5a4bb2dab710e3367549b45cd0b3fed1c251372400872f340ee3b348964d022f3224519d06adad720a5650c9b04292955ae6fd364adebee641bc911bcdd907f409e8200d95b946789c69b1d8876c") r9 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0xff, 0x80000) syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x4080) ioctl$VT_GETMODE(r9, 0x5601, &(0x7f0000000240)) [ 213.979145] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 06:21:52 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x20e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x6, 0x7fffffff) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x141080, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000480)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000005c0)={'bond0\x00\x00\x00\x00\x00\x00\x00!\x00', @ifru_names='bond_slave_1\x00'}) ioctl$VIDIOC_ENCODER_CMD(r2, 0xc028564d, &(0x7f0000000680)={0x1, 0x1, [0xfff, 0x101, 0x3ff, 0x40, 0x0, 0xfffffffffffffffb, 0x8, 0x4f]}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x80045400, &(0x7f00000004c0)) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x20a800, 0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000740)="e2da5cdea423495c8b5663b2d9e462f4e65c25cc8b2ba5e1349cd9ae758d94c045f53f48860fd0b3d8013a69034f6ac0d6e1e98dfe38d2d9e2e2c54d473c67bfa22bbf07fadb6002cda4dd466bf8b4ac1fd7837039b702b9d0fa204a8e5df87c3de67d40844e3ddd3c120aee61b90f3b98210922d8d4271c6df39457ffa88a8a1c33837414408c58e56e3fc11ec40ec466928864d45fe30bbdca4189941c975bc6fe8fb0e6bf8e2a58131d1b5d088066c68b8a6ee0c4e1fea78983de57627ebf6f449a310f966c64391d936f99802fb9320ae1cc") r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/sequencer2\x00', 0x40042, 0x0) sendto$inet(r1, &(0x7f00000000c0)="8dec431bb44aff53a310b4eabef65b9ca28574570c8753d962784ce7563c1f448215fd237bf4c9159a98e9205a38a1fef116825d2a67dccc355557378e26b4e71c9ead8245ce8f8727e4d5e348d6b048462955248e97e362bb149adcd5ad849873b82111c2ecfa383140f9d4c99f525041a886277a6592dbc6b9108911e88a440b93f5c0fae544676b44a19bf06aa255a549db9cb0a9221a90f33fec43b1d074bf", 0xa1, 0x1, 0x0, 0x0) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000580)='fou\x00') sendmsg$FOU_CMD_DEL(r5, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000600)={&(0x7f00000006c0)=ANY=[@ANYBLOB="24e8576a", @ANYRES16=r6, @ANYRESHEX=r1], 0x3}, 0x1, 0x0, 0x0, 0x20044000}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="520f020000000000000020fb00000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x8050}, 0x40) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$session_to_parent(0x12) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0xc81, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = syz_open_dev$midi(&(0x7f0000000440)='/dev/midi#\x00', 0x1, 0x40100) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000300)={0x0, @remote, @loopback}, &(0x7f0000000340)=0xc) sendmsg$nl_route(r8, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f00000008c0)=ANY=[@ANYBLOB="080001000000003094a6b55411b84bf77ac75b808e4b0a32be1f12aa61bed6445ba18694254fbe0da548be108d2128a6b9bacb28d0eea75ed61ae3ec9893fdc909058a9ad36882664a8bbb0c07d1a5b7c64b86fda2d159dda13309760c4557349fc9fe563c7b85aa8e522970da943093f8be0a87c42c45abd795a686a302db69208e9d2c719fc1e516ec2e01b256e8ce02680677a45df5276f1f0868e298eeaf4cb6567de0b42ffeb222f33744d0a44ac3a1dbd7c5c806662f82d6e774f9516855fe6e4186bace85a5fec91089b98c02ebfc2a3120d0569125f2d7c114affa8d59525981e901a54e39fd5f109975bbd8cb991bb5007d2330fa8d2ff1e9026933595c3852000000000000000000000000"], 0x1}}, 0x4008000) ioctl$sock_proto_private(r7, 0x80089ec, &(0x7f0000000140)="039625617620978a4df541244054545eefb285b44d2198c37642636f3bd6084339c6e79154e7a4e1e8a3a316d5a4d756fa828508c3eaae4df2759d4d16de576413772f248c74aae160e44749d604a7af5290efc74ba837ec71ff4bfb5f9a2d51403ecc6b5a4bb2dab710e3367549b45cd0b3fed1c251372400872f340ee3b348964d022f3224519d06adad720a5650c9b04292955ae6fd364adebee641bc911bcdd907f409e8200d95b946789c69b1d8876c") r9 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0xff, 0x80000) syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x4080) ioctl$VT_GETMODE(r9, 0x5601, &(0x7f0000000240)) 06:21:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000280), 0x108) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x141001, 0x0) write$UHID_CREATE2(r1, &(0x7f00000003c0)={0xb, 'syz1\x00', 'syz0\x00', 'syz0\x00', 0x8e, 0x101, 0x101, 0x10000, 0x101, 0xab5c, "4250d57da0ff6e19a90eccd2abcc47f549707b605fa72cb3f81814140bbd5c75d160a810bd3e65ac8913d4b744add79be8b565d01201f938a76d7d7833a3f64714f66f8de0b94175f911e1c46c61aa937b7a51619de31e8008652de72e193d9bb9d12d27f66e20fe079ac6b748b01b84fa5da3e21422fb81c747c72484320ddb6678ab8d75e1962fcd5f9e3fbf3c"}, 0x1a6) mremap(&(0x7f00007c0000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000054000/0x2000)=nil) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_G_PRIORITY(r4, 0x80045643, 0x3) socket$nl_route(0x10, 0x3, 0x0) geteuid() openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f00009b2000/0x18000)=nil, 0x0, 0x0, 0x0, &(0x7f0000001500), 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0xffff}) 06:21:52 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) acct(&(0x7f0000000340)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000200), &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000002c0), &(0x7f0000000300)=0x20) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000100), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x40000000000001) recvfrom$inet6(r1, &(0x7f0000000040)=""/31, 0x1f, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) r2 = accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) sendto$inet6(r2, &(0x7f00000000c0)='A', 0x1, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f00000005c0)=ANY=[], 0x0) dup2(r0, r1) [ 214.250880] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 06:21:52 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x20e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x6, 0x7fffffff) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x141080, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000480)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000005c0)={'bond0\x00\x00\x00\x00\x00\x00\x00!\x00', @ifru_names='bond_slave_1\x00'}) ioctl$VIDIOC_ENCODER_CMD(r2, 0xc028564d, &(0x7f0000000680)={0x1, 0x1, [0xfff, 0x101, 0x3ff, 0x40, 0x0, 0xfffffffffffffffb, 0x8, 0x4f]}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x80045400, &(0x7f00000004c0)) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x20a800, 0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000740)="e2da5cdea423495c8b5663b2d9e462f4e65c25cc8b2ba5e1349cd9ae758d94c045f53f48860fd0b3d8013a69034f6ac0d6e1e98dfe38d2d9e2e2c54d473c67bfa22bbf07fadb6002cda4dd466bf8b4ac1fd7837039b702b9d0fa204a8e5df87c3de67d40844e3ddd3c120aee61b90f3b98210922d8d4271c6df39457ffa88a8a1c33837414408c58e56e3fc11ec40ec466928864d45fe30bbdca4189941c975bc6fe8fb0e6bf8e2a58131d1b5d088066c68b8a6ee0c4e1fea78983de57627ebf6f449a310f966c64391d936f99802fb9320ae1cc") r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/sequencer2\x00', 0x40042, 0x0) sendto$inet(r1, &(0x7f00000000c0)="8dec431bb44aff53a310b4eabef65b9ca28574570c8753d962784ce7563c1f448215fd237bf4c9159a98e9205a38a1fef116825d2a67dccc355557378e26b4e71c9ead8245ce8f8727e4d5e348d6b048462955248e97e362bb149adcd5ad849873b82111c2ecfa383140f9d4c99f525041a886277a6592dbc6b9108911e88a440b93f5c0fae544676b44a19bf06aa255a549db9cb0a9221a90f33fec43b1d074bf", 0xa1, 0x1, 0x0, 0x0) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000580)='fou\x00') sendmsg$FOU_CMD_DEL(r5, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000600)={&(0x7f00000006c0)=ANY=[@ANYBLOB="24e8576a", @ANYRES16=r6, @ANYRESHEX=r1], 0x3}, 0x1, 0x0, 0x0, 0x20044000}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="520f020000000000000020fb00000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x8050}, 0x40) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$session_to_parent(0x12) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0xc81, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = syz_open_dev$midi(&(0x7f0000000440)='/dev/midi#\x00', 0x1, 0x40100) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000300)={0x0, @remote, @loopback}, &(0x7f0000000340)=0xc) sendmsg$nl_route(r8, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f00000008c0)=ANY=[@ANYBLOB="080001000000003094a6b55411b84bf77ac75b808e4b0a32be1f12aa61bed6445ba18694254fbe0da548be108d2128a6b9bacb28d0eea75ed61ae3ec9893fdc909058a9ad36882664a8bbb0c07d1a5b7c64b86fda2d159dda13309760c4557349fc9fe563c7b85aa8e522970da943093f8be0a87c42c45abd795a686a302db69208e9d2c719fc1e516ec2e01b256e8ce02680677a45df5276f1f0868e298eeaf4cb6567de0b42ffeb222f33744d0a44ac3a1dbd7c5c806662f82d6e774f9516855fe6e4186bace85a5fec91089b98c02ebfc2a3120d0569125f2d7c114affa8d59525981e901a54e39fd5f109975bbd8cb991bb5007d2330fa8d2ff1e9026933595c3852000000000000000000000000"], 0x1}}, 0x4008000) ioctl$sock_proto_private(r7, 0x80089ec, &(0x7f0000000140)="039625617620978a4df541244054545eefb285b44d2198c37642636f3bd6084339c6e79154e7a4e1e8a3a316d5a4d756fa828508c3eaae4df2759d4d16de576413772f248c74aae160e44749d604a7af5290efc74ba837ec71ff4bfb5f9a2d51403ecc6b5a4bb2dab710e3367549b45cd0b3fed1c251372400872f340ee3b348964d022f3224519d06adad720a5650c9b04292955ae6fd364adebee641bc911bcdd907f409e8200d95b946789c69b1d8876c") r9 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0xff, 0x80000) syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x4080) ioctl$VT_GETMODE(r9, 0x5601, &(0x7f0000000240)) 06:21:52 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) acct(&(0x7f0000000340)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000200), &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000002c0), &(0x7f0000000300)=0x20) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000100), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x40000000000001) recvfrom$inet6(r1, &(0x7f0000000040)=""/31, 0x1f, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) r2 = accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) sendto$inet6(r2, &(0x7f00000000c0)='A', 0x1, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f00000005c0)=ANY=[], 0x0) dup2(r0, r1) [ 214.487153] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 06:21:52 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) shutdown(r1, 0x0) 06:21:53 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) sendto$inet(r2, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r3, 0xec, 0x10}, 0xc) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002e40)={0x12, 0xb9, 0x4, 0x78}, 0x2c) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000340), &(0x7f0000000380)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r4, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000001380)=""/4096) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r4, &(0x7f0000000040), &(0x7f00000000c0)=""/70}, 0x18) socket$packet(0x11, 0x3, 0x300) getpid() semget$private(0x0, 0x2, 0x11) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r5 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$read(0xb, r5, &(0x7f0000000480)=""/112, 0x70) [ 214.989533] openvswitch: netlink: Key type 207 is out of range max 29 [ 215.001591] openvswitch: netlink: Key type 207 is out of range max 29 06:21:53 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='vcan0\x00', 0x10) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000140)=@in={0x2, 0x4e20, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f000079e000)=[{&(0x7f0000000300)="2900000020001980013d7524000a002102000016000000800000000009000600000011e010315aec20", 0x29}], 0x1) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x4e20, @local}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1}, 0x0) 06:21:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000280), 0x108) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x141001, 0x0) write$UHID_CREATE2(r1, &(0x7f00000003c0)={0xb, 'syz1\x00', 'syz0\x00', 'syz0\x00', 0x8e, 0x101, 0x101, 0x10000, 0x101, 0xab5c, "4250d57da0ff6e19a90eccd2abcc47f549707b605fa72cb3f81814140bbd5c75d160a810bd3e65ac8913d4b744add79be8b565d01201f938a76d7d7833a3f64714f66f8de0b94175f911e1c46c61aa937b7a51619de31e8008652de72e193d9bb9d12d27f66e20fe079ac6b748b01b84fa5da3e21422fb81c747c72484320ddb6678ab8d75e1962fcd5f9e3fbf3c"}, 0x1a6) mremap(&(0x7f00007c0000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000054000/0x2000)=nil) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_G_PRIORITY(r4, 0x80045643, 0x3) socket$nl_route(0x10, 0x3, 0x0) geteuid() openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f00009b2000/0x18000)=nil, 0x0, 0x0, 0x0, &(0x7f0000001500), 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0xffff}) 06:21:53 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x100000011, @loopback, 0x1, 0x0, 'lblc\x00'}, 0x2c) r2 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 06:21:53 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) 06:21:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x24, 0x0, 0x2ac) 06:21:53 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f00000001c0)='/dev/usbmon#\x00') r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x4040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000540)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x34, 0x0, 0xc10, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @broadcast}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x44050) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ppp\x00', 0x200000, 0x0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000000)={0x0, 0x0, 0x6, 0x1, &(0x7f00005d8000/0x4000)=nil, 0x707}) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @broadcast}, 0x4}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r4, 0x0) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000340)=0x105, 0x4) write$binfmt_misc(r4, &(0x7f0000000440)={'syz1'}, 0x1200e) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000100)={0x2, 0x9, 0x200, 0x9, 0x7f, 0x80000001, 0xfffffffffffffff8, 0x1f, 0x0}, &(0x7f0000000240)=0x20) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000280)={r5, 0x81, 0x7fffffff, 0x9}, &(0x7f00000002c0)=0x10) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) modify_ldt$read(0x0, &(0x7f0000000380)=""/190, 0xbe) [ 215.163892] kauditd_printk_skb: 9 callbacks suppressed [ 215.163905] audit: type=1800 audit(1544682113.414:31): pid=7666 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor2" name="file0" dev="sda1" ino=16552 res=0 [ 215.190624] netlink: 'syz-executor5': attribute type 6 has an invalid length. [ 215.199922] netlink: 1 bytes leftover after parsing attributes in process `syz-executor5'. 06:21:53 executing program 0: syz_execute_func(&(0x7f00000003c0)="36424f6433ef939d67f2440f34a2ebf717c4dc7518fff30fbcbb0000eb7e96722bc421a1edf7fe7fc0000004ba618f8fb52ba38a4daea2e12226f242d64a5962c422c5aa717ae567996726660fdd62442f") [ 215.213282] audit: type=1804 audit(1544682113.454:32): pid=7666 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir213697679/syzkaller.o7UJEn/4/file0/file0" dev="sda1" ino=16552 res=1 [ 215.243870] sctp: sctp_transport_update_pmtu: Reported pmtu 72 too low, using default minimum of 512 06:21:53 executing program 2: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vcan0\x00'}) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x3, 0x100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000140)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={"ffffff"}, &(0x7f0000000a00)="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", 0x4c1, r0) keyctl$read(0xb, r1, &(0x7f0000005340)=""/4096, 0xd900) 06:21:53 executing program 2: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vcan0\x00'}) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x3, 0x100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000140)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={"ffffff"}, &(0x7f0000000a00)="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", 0x4c1, r0) keyctl$read(0xb, r1, &(0x7f0000005340)=""/4096, 0xd900) 06:21:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000280), 0x108) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x141001, 0x0) write$UHID_CREATE2(r1, &(0x7f00000003c0)={0xb, 'syz1\x00', 'syz0\x00', 'syz0\x00', 0x8e, 0x101, 0x101, 0x10000, 0x101, 0xab5c, "4250d57da0ff6e19a90eccd2abcc47f549707b605fa72cb3f81814140bbd5c75d160a810bd3e65ac8913d4b744add79be8b565d01201f938a76d7d7833a3f64714f66f8de0b94175f911e1c46c61aa937b7a51619de31e8008652de72e193d9bb9d12d27f66e20fe079ac6b748b01b84fa5da3e21422fb81c747c72484320ddb6678ab8d75e1962fcd5f9e3fbf3c"}, 0x1a6) mremap(&(0x7f00007c0000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000054000/0x2000)=nil) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_G_PRIORITY(r4, 0x80045643, 0x3) socket$nl_route(0x10, 0x3, 0x0) geteuid() openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f00009b2000/0x18000)=nil, 0x0, 0x0, 0x0, &(0x7f0000001500), 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0xffff}) 06:21:54 executing program 2: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vcan0\x00'}) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x3, 0x100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000140)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={"ffffff"}, &(0x7f0000000a00)="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", 0x4c1, r0) keyctl$read(0xb, r1, &(0x7f0000005340)=""/4096, 0xd900) 06:21:54 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) sendto$inet(r2, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r3, 0xec, 0x10}, 0xc) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002e40)={0x12, 0xb9, 0x4, 0x78}, 0x2c) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000340), &(0x7f0000000380)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r4, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000001380)=""/4096) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r4, &(0x7f0000000040), &(0x7f00000000c0)=""/70}, 0x18) socket$packet(0x11, 0x3, 0x300) getpid() semget$private(0x0, 0x2, 0x11) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r5 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$read(0xb, r5, &(0x7f0000000480)=""/112, 0x70) [ 215.953884] netlink: 'syz-executor5': attribute type 6 has an invalid length. [ 215.966041] netlink: 1 bytes leftover after parsing attributes in process `syz-executor5'. 06:21:54 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='vcan0\x00', 0x10) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000140)=@in={0x2, 0x4e20, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f000079e000)=[{&(0x7f0000000300)="2900000020001980013d7524000a002102000016000000800000000009000600000011e010315aec20", 0x29}], 0x1) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x4e20, @local}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1}, 0x0) 06:21:54 executing program 2: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vcan0\x00'}) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x3, 0x100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000140)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={"ffffff"}, &(0x7f0000000a00)="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", 0x4c1, r0) keyctl$read(0xb, r1, &(0x7f0000005340)=""/4096, 0xd900) 06:21:54 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f00000001c0)='/dev/usbmon#\x00') r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x4040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000540)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x34, 0x0, 0xc10, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @broadcast}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x44050) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ppp\x00', 0x200000, 0x0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000000)={0x0, 0x0, 0x6, 0x1, &(0x7f00005d8000/0x4000)=nil, 0x707}) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @broadcast}, 0x4}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r4, 0x0) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000340)=0x105, 0x4) write$binfmt_misc(r4, &(0x7f0000000440)={'syz1'}, 0x1200e) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000100)={0x2, 0x9, 0x200, 0x9, 0x7f, 0x80000001, 0xfffffffffffffff8, 0x1f, 0x0}, &(0x7f0000000240)=0x20) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000280)={r5, 0x81, 0x7fffffff, 0x9}, &(0x7f00000002c0)=0x10) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) modify_ldt$read(0x0, &(0x7f0000000380)=""/190, 0xbe) 06:21:54 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) sendto$inet(r2, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r3, 0xec, 0x10}, 0xc) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002e40)={0x12, 0xb9, 0x4, 0x78}, 0x2c) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000340), &(0x7f0000000380)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r4, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000001380)=""/4096) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r4, &(0x7f0000000040), &(0x7f00000000c0)=""/70}, 0x18) socket$packet(0x11, 0x3, 0x300) getpid() semget$private(0x0, 0x2, 0x11) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r5 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$read(0xb, r5, &(0x7f0000000480)=""/112, 0x70) [ 216.223090] netlink: 'syz-executor5': attribute type 6 has an invalid length. [ 216.251450] list_add corruption. next->prev should be prev (ffff8881bbd5f4b0), but was ffff8881bb748bb0. (next=ffffffff8a1dca60). [ 216.263719] ------------[ cut here ]------------ [ 216.268487] kernel BUG at lib/list_debug.c:25! [ 216.273176] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 216.278575] CPU: 0 PID: 7730 Comm: modprobe Not tainted 4.20.0-rc6-next-20181210+ #164 [ 216.279152] netlink: 1 bytes leftover after parsing attributes in process `syz-executor5'. [ 216.286647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.286669] RIP: 0010:__list_add_valid.cold.2+0xf/0x2a [ 216.286683] Code: e5 80 88 e8 11 1f d2 fd 0f 0b 48 89 de 48 c7 c7 60 e5 80 88 e8 00 1f d2 fd 0f 0b 48 89 d9 48 c7 c7 20 e6 80 88 e8 ef 1e d2 fd <0f> 0b 48 89 f1 48 c7 c7 a0 e6 80 88 48 89 de e8 db 1e d2 fd 0f 0b [ 216.286690] RSP: 0018:ffff8881dac06ce0 EFLAGS: 00010286 [ 216.333958] RAX: 0000000000000075 RBX: ffffffff8a1dca60 RCX: 0000000000000000 [ 216.341225] RDX: 0000000000000000 RSI: ffffffff816621c5 RDI: 0000000000000005 [ 216.348490] RBP: ffff8881dac06cf8 R08: ffff8881b6452580 R09: ffffed103b585020 [ 216.355756] R10: ffffed103b585020 R11: ffff8881dac28107 R12: ffff8881d96aebb0 [ 216.363021] R13: ffff8881d96ae940 R14: ffffffff8a1dc820 R15: ffffffff8a1dcab0 [ 216.370743] FS: 0000000000000000(0000) GS:ffff8881dac00000(0000) knlGS:0000000000000000 [ 216.378965] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 216.384846] CR2: 00007f3d29eac638 CR3: 00000001d225e000 CR4: 00000000001426f0 [ 216.392112] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 216.399381] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 216.406643] Call Trace: [ 216.409218] [ 216.411382] ___neigh_create+0x14b7/0x2600 [ 216.415622] ? print_usage_bug+0xc0/0xc0 [ 216.419685] ? print_usage_bug+0xc0/0xc0 [ 216.423749] ? neigh_remove_one+0x5a0/0x5a0 [ 216.428078] ? print_usage_bug+0xc0/0xc0 [ 216.432142] ? __local_bh_enable_ip+0x160/0x260 [ 216.436808] ? __local_bh_enable_ip+0x160/0x260 [ 216.441474] ? lockdep_hardirqs_on+0x296/0x5b0 [ 216.446092] ? mark_held_locks+0x130/0x130 [ 216.450322] ? __local_bh_enable_ip+0x160/0x260 [ 216.454993] ? lockdep_hardirqs_on+0x296/0x5b0 [ 216.459575] ? trace_hardirqs_on+0xbd/0x310 [ 216.463896] ? mark_held_locks+0xc7/0x130 [ 216.468040] ? ip6t_do_table+0xd9e/0x1d30 [ 216.472204] ? trace_hardirqs_off_caller+0x310/0x310 [ 216.477304] ? __local_bh_enable_ip+0x160/0x260 [ 216.481974] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 216.487512] ? lock_acquire+0x1ed/0x520 [ 216.491512] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 216.497077] ? check_preemption_disabled+0x48/0x280 [ 216.502383] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 216.507934] ? rcu_pm_notify+0xc0/0xc0 [ 216.511825] __neigh_create+0x30/0x40 [ 216.515626] ip6_finish_output2+0xa64/0x2940 [ 216.520034] ? find_held_lock+0x36/0x1c0 [ 216.524108] ? ip6_forward_finish+0x560/0x560 [ 216.528601] ? ip6_mtu+0x39c/0x520 [ 216.532171] ? lock_downgrade+0x900/0x900 [ 216.536315] ? check_preemption_disabled+0x48/0x280 [ 216.541333] ? kasan_check_read+0x11/0x20 [ 216.545476] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 216.550751] ? rcu_read_unlock_special+0x370/0x370 [ 216.555684] ? ip6_mtu+0x160/0x520 [ 216.559222] ? find_match+0x10a0/0x10a0 [ 216.563195] ? kasan_check_read+0x11/0x20 [ 216.567340] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 216.572614] ip6_finish_output+0x58c/0xc60 [ 216.576857] ? ip6_finish_output+0x58c/0xc60 [ 216.581281] ip6_output+0x232/0x9d0 [ 216.584907] ? ip6_finish_output+0xc60/0xc60 [ 216.589316] ? ip6_fragment+0x38b0/0x38b0 [ 216.593463] ? __lock_is_held+0xb5/0x140 [ 216.597541] ndisc_send_skb+0x1005/0x1560 [ 216.601690] ? nf_hook.constprop.33+0x860/0x860 [ 216.606369] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 216.611905] ? refcount_sub_and_test_checked+0x203/0x310 [ 216.617352] ? refcount_dec_if_one+0x180/0x180 [ 216.621970] ? memcpy+0x45/0x50 [ 216.625248] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 216.630813] ndisc_send_rs+0x134/0x6e0 [ 216.634731] addrconf_rs_timer+0x314/0x690 [ 216.638965] ? ipv6_get_lladdr+0x5e0/0x5e0 [ 216.643201] call_timer_fn+0x272/0x920 [ 216.647097] ? ipv6_get_lladdr+0x5e0/0x5e0 [ 216.651327] ? process_timeout+0x40/0x40 [ 216.655388] ? mark_held_locks+0xc7/0x130 [ 216.659537] ? _raw_spin_unlock_irq+0x27/0x80 [ 216.664031] ? _raw_spin_unlock_irq+0x27/0x80 [ 216.668542] ? ipv6_get_lladdr+0x5e0/0x5e0 [ 216.672788] ? lockdep_hardirqs_on+0x296/0x5b0 [ 216.677368] ? trace_hardirqs_on+0xbd/0x310 [ 216.681690] ? kasan_check_read+0x11/0x20 [ 216.685834] ? __run_timers+0x7da/0xc70 [ 216.689806] ? trace_hardirqs_off_caller+0x310/0x310 [ 216.694913] ? ipv6_get_lladdr+0x5e0/0x5e0 [ 216.699144] __run_timers+0x7e5/0xc70 [ 216.702947] ? timer_fixup_init+0x70/0x70 [ 216.707102] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 216.712117] ? graph_lock+0x270/0x270 [ 216.715934] ? print_usage_bug+0xc0/0xc0 [ 216.719991] ? hrtimer_update_softirq_timer+0xa0/0xa0 [ 216.725183] ? find_held_lock+0x36/0x1c0 [ 216.729242] ? graph_lock+0x270/0x270 [ 216.733042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 216.738589] ? check_preemption_disabled+0x48/0x280 [ 216.743621] ? __lock_is_held+0xb5/0x140 [ 216.747682] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 216.753233] ? check_preemption_disabled+0x48/0x280 [ 216.758247] run_timer_softirq+0x52/0xb0 [ 216.762308] ? rcu_read_lock_sched_held+0x14f/0x180 [ 216.767326] __do_softirq+0x308/0xb7e [ 216.771128] ? ktime_get_raw_ts64+0x4d0/0x4d0 [ 216.775635] ? lock_downgrade+0x900/0x900 [ 216.779786] ? __irqentry_text_end+0x1f9658/0x1f9658 [ 216.784896] ? pvclock_read_flags+0x160/0x160 [ 216.789407] ? lapic_next_event+0x5a/0x90 [ 216.793571] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 216.799109] ? kvm_clock_read+0x18/0x30 [ 216.803096] ? kvm_sched_clock_read+0x9/0x20 [ 216.807503] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 216.813039] ? check_preemption_disabled+0x48/0x280 [ 216.818071] irq_exit+0x17f/0x1c0 [ 216.821528] smp_apic_timer_interrupt+0x1cb/0x760 [ 216.826383] ? smp_reschedule_interrupt+0x109/0x650 [ 216.831396] ? smp_call_function_single_interrupt+0x650/0x650 [ 216.837279] ? interrupt_entry+0xb5/0xc0 [ 216.841339] ? trace_hardirqs_off_caller+0xbb/0x310 [ 216.846356] ? trace_hardirqs_off_caller+0xbb/0x310 [ 216.851381] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 216.856224] ? trace_hardirqs_on_caller+0x310/0x310 [ 216.861239] ? trace_hardirqs_on_caller+0x310/0x310 [ 216.866256] ? task_prio+0x50/0x50 [ 216.869795] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 216.875331] ? check_preemption_disabled+0x48/0x280 [ 216.880351] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 216.885199] apic_timer_interrupt+0xf/0x20 [ 216.889432] [ 216.891681] RIP: 0010:__sanitizer_cov_trace_pc+0x26/0x50 [ 216.897130] Code: 5d c3 66 90 55 48 89 e5 48 8b 75 08 65 48 8b 04 25 40 ee 01 00 65 8b 15 a8 f5 81 7e 81 e2 00 01 1f 00 75 2b 8b 90 d8 12 00 00 <83> fa 02 75 20 48 8b 88 e0 12 00 00 8b 80 dc 12 00 00 48 8b 11 48 [ 216.916028] RSP: 0018:ffff888185aff680 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 216.923761] RAX: ffff8881b6452580 RBX: ffff8881bffda168 RCX: ffff8881bffda168 [ 216.931041] RDX: 0000000000000000 RSI: ffffffff81b655f8 RDI: ffff8881bffda260 [ 216.938318] RBP: ffff888185aff680 R08: ffff8881b6452580 R09: ffff8881cd4c2848 [ 216.945587] R10: 00000000000017f3 R11: ffff8881b6452580 R12: dffffc0000000000 [ 216.952853] R13: ffff8881bffda250 R14: ffff8881bffda178 R15: dffffc0000000000 [ 216.960129] ? __vma_link_rb+0x68/0x370 [ 216.964134] __vma_link_rb+0x68/0x370 [ 216.967951] __vma_adjust+0xd42/0x1810 [ 216.971864] __split_vma+0x48a/0x570 [ 216.975578] __do_munmap+0xd19/0xf80 [ 216.979311] mmap_region+0x6a7/0x1cd0 [ 216.983130] ? __x64_sys_brk+0x8b0/0x8b0 [ 216.987222] ? graph_lock+0x270/0x270 [ 216.991019] ? perf_trace_sched_process_exec+0x860/0x860 [ 216.996472] ? mpx_unmapped_area_check+0xd8/0x108 [ 217.001322] ? arch_get_unmapped_area_topdown+0xc2/0x940 [ 217.006772] ? arch_get_unmapped_area+0x750/0x750 [ 217.011619] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 217.016657] ? cap_mmap_addr+0x52/0x130 [ 217.020664] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 217.026196] ? security_mmap_addr+0x80/0xa0 [ 217.030516] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 217.036050] ? get_unmapped_area+0x292/0x3b0 [ 217.040470] do_mmap+0xa22/0x1230 [ 217.043928] ? mmap_region+0x1cd0/0x1cd0 [ 217.047981] ? vm_mmap_pgoff+0x1b5/0x2c0 [ 217.052042] ? down_read_killable+0x150/0x150 [ 217.056567] ? security_mmap_file+0x174/0x1b0 [ 217.061088] vm_mmap_pgoff+0x213/0x2c0 [ 217.064976] ? vma_is_stack_for_current+0xd0/0xd0 [ 217.069818] ? up_write+0x7b/0x220 [ 217.073354] ? down_write_nested+0x130/0x130 [ 217.077784] ? apparmor_file_mprotect+0xd0/0x110 [ 217.082539] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 217.088090] ksys_mmap_pgoff+0x4da/0x660 [ 217.092154] ? do_syscall_64+0x9a/0x820 [ 217.096130] ? find_mergeable_anon_vma+0xd0/0xd0 [ 217.100883] ? trace_hardirqs_on+0xbd/0x310 [ 217.105204] ? mprotect_fixup+0xc60/0xc60 [ 217.109345] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 217.114707] ? trace_hardirqs_off_caller+0x310/0x310 [ 217.119839] __x64_sys_mmap+0xe9/0x1b0 [ 217.123739] do_syscall_64+0x1b9/0x820 [ 217.127626] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 217.132988] ? syscall_return_slowpath+0x5e0/0x5e0 [ 217.137912] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 217.142757] ? trace_hardirqs_on_caller+0x310/0x310 [ 217.147776] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 217.152790] ? prepare_exit_to_usermode+0x291/0x3b0 [ 217.157804] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 217.162645] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 217.167830] RIP: 0033:0x7f3d2a0d83ea [ 217.171541] Code: 48 8d 3d 81 69 00 00 b2 84 e8 52 ec ff ff f7 d8 89 05 ae ad 20 00 eb c6 90 90 90 90 90 90 90 90 49 89 ca b8 09 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8d 0d 8a ad 20 00 31 d2 48 29 c2 89 [ 217.190440] RSP: 002b:00007ffd93652938 EFLAGS: 00000206 ORIG_RAX: 0000000000000009 [ 217.198143] RAX: ffffffffffffffda RBX: 00007f3d2a2e09a8 RCX: 00007f3d2a0d83ea [ 217.205409] RDX: 0000000000000003 RSI: 0000000000005000 RDI: 00007f3d29ea2000 [ 217.212676] RBP: 00007ffd93652c90 R08: 0000000000000000 R09: 0000000000183000 [ 217.219939] R10: 0000000000000812 R11: 0000000000000206 R12: 00007ffd93652d78 [ 217.227203] R13: 0000000000000002 R14: 00007ffd936529b0 R15: 00007ffd93652980 [ 217.234481] Modules linked in: [ 217.237859] ---[ end trace cdc0d0d4bc03a14b ]--- [ 217.242668] RIP: 0010:__list_add_valid.cold.2+0xf/0x2a [ 217.247954] Code: e5 80 88 e8 11 1f d2 fd 0f 0b 48 89 de 48 c7 c7 60 e5 80 88 e8 00 1f d2 fd 0f 0b 48 89 d9 48 c7 c7 20 e6 80 88 e8 ef 1e d2 fd <0f> 0b 48 89 f1 48 c7 c7 a0 e6 80 88 48 89 de e8 db 1e d2 fd 0f 0b [ 217.248146] sctp: sctp_transport_update_pmtu: Reported pmtu 72 too low, using default minimum of 512 [ 217.266906] RSP: 0018:ffff8881dac06ce0 EFLAGS: 00010286 [ 217.266918] RAX: 0000000000000075 RBX: ffffffff8a1dca60 RCX: 0000000000000000 [ 217.266926] RDX: 0000000000000000 RSI: ffffffff816621c5 RDI: 0000000000000005 [ 217.266941] RBP: ffff8881dac06cf8 R08: ffff8881b6452580 R09: ffffed103b585020 [ 217.303460] R10: ffffed103b585020 R11: ffff8881dac28107 R12: ffff8881d96aebb0 [ 217.310736] R13: ffff8881d96ae940 R14: ffffffff8a1dc820 R15: ffffffff8a1dcab0 [ 217.318068] FS: 0000000000000000(0000) GS:ffff8881dac00000(0000) knlGS:0000000000000000 [ 217.325709] kobject: 'loop2' (000000004e77f09b): kobject_uevent_env [ 217.326335] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 217.326350] CR2: 00007f3d29eac638 CR3: 00000001d225e000 CR4: 00000000001426f0 [ 217.336556] kobject: 'loop2' (000000004e77f09b): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 217.338672] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 217.338681] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 217.338689] Kernel panic - not syncing: Fatal exception in interrupt [ 217.346947] Kernel Offset: disabled [ 217.380973] Rebooting in 86400 seconds..