[ OK ] Started OpenBSD Secure Shell server. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.78' (ECDSA) to the list of known hosts. 2020/07/27 09:59:19 fuzzer started 2020/07/27 09:59:19 dialing manager at 10.128.0.105:34955 2020/07/27 09:59:19 syscalls: 3224 2020/07/27 09:59:19 code coverage: enabled 2020/07/27 09:59:19 comparison tracing: enabled 2020/07/27 09:59:19 extra coverage: enabled 2020/07/27 09:59:19 setuid sandbox: enabled 2020/07/27 09:59:19 namespace sandbox: enabled 2020/07/27 09:59:19 Android sandbox: /sys/fs/selinux/policy does not exist 2020/07/27 09:59:19 fault injection: enabled 2020/07/27 09:59:19 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/07/27 09:59:19 net packet injection: enabled 2020/07/27 09:59:19 net device setup: enabled 2020/07/27 09:59:19 concurrency sanitizer: enabled 2020/07/27 09:59:19 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/07/27 09:59:19 USB emulation: enabled 2020/07/27 09:59:22 suppressing KCSAN reports in functions: 'ext4_setattr' 'do_epoll_wait' 'expire_timers' 'exit_mm' 'xas_clear_mark' 'get_signal' 'blk_mq_sched_dispatch_requests' '__add_to_page_cache_locked' 'do_sys_poll' 'audit_log_start' 'shmem_mknod' 'ext4_sync_file' '__send_signal' 'ext4_writepages' 'blk_mq_rq_ctx_init' 'ext4_mb_regular_allocator' 'ext4_set_iomap' 'xas_find_marked' 'n_tty_receive_char_inline' '__ext4_new_inode' 'generic_write_end' '__filemap_fdatawrite_range' 'find_get_pages_range_tag' 'do_signal_stop' '__xa_clear_mark' 'do_nanosleep' 'ext4_free_inodes_count' 'page_counter_charge' 'tick_sched_timer' 'wbt_issue' '__get_user_pages' 'ext4_free_inode' 'ext4_mark_iloc_dirty' 'do_select' 'n_tty_receive_buf_common' 'alloc_pid' 'dd_has_work' 'filemap_map_pages' 'blk_mq_dispatch_rq_list' 'lookup_fast' 'kauditd_thread' 'futex_wait_queue_me' '__delayacct_blkio_end' '__ext4_update_other_inode_time' 'ext4_mb_good_group' 10:00:51 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="895b74e2ed7a32ea79b7f5bb42c33a565d019abadd5a3d871dbb9181001518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882a0c98dd9b45cdafcfbbe1e3d7c2974d348d2e528d360381c5353709d09745856c834a2f89345d3661461aa6e78cb13a981f84d2051adce96831954f6b65dc368efb91a1d9990410e17fbdd62d381b2b4455aa9ee0562637936d82f0f98133a60609575fbfb8249732924213f0263505aa7765ae621a57070537625ec8d02f8d6ecbc7abfef408165ff3348dee6e55308f1", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) syzkaller login: [ 126.560258][ T8650] IPVS: ftp: loaded support on port[0] = 21 10:00:52 executing program 1: socket$inet_sctp(0x2, 0x800000000000001, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="6c00000010003f08000000000000000000180000", @ANYRES32=0x0, @ANYBLOB="000000000000000044001a80080002800400018038000280340001800800190000000000080016000000000008001a000000000041fd0000000000000800000000000000080000000000000008001b"], 0x6c}}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x1) accept(0xffffffffffffffff, &(0x7f0000000380)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = openat$cgroup_int(r1, 0x0, 0x2, 0x0) writev(r2, 0x0, 0x0) [ 126.631365][ T8650] chnl_net:caif_netlink_parms(): no params data found [ 126.693504][ T8650] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.714677][ T8650] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.734499][ T8650] device bridge_slave_0 entered promiscuous mode [ 126.745321][ T8650] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.752362][ T8650] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.760236][ T8650] device bridge_slave_1 entered promiscuous mode [ 126.771172][ T8780] IPVS: ftp: loaded support on port[0] = 21 [ 126.788580][ T8650] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 126.811902][ T8650] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 10:00:52 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) utimes(&(0x7f0000000440)='./file0\x00', 0x0) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', 0x0, 0x0, 0x0) close(r0) [ 126.852731][ T8650] team0: Port device team_slave_0 added [ 126.870745][ T8650] team0: Port device team_slave_1 added [ 126.881226][ T8780] chnl_net:caif_netlink_parms(): no params data found [ 126.902603][ T8650] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 126.914577][ T8650] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 126.974329][ T8650] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 127.004123][ T8650] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 127.024417][ T8650] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 127.051346][ T8650] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 127.067433][ T8911] IPVS: ftp: loaded support on port[0] = 21 [ 127.071469][ T8780] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.083435][ T8780] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.091142][ T8780] device bridge_slave_0 entered promiscuous mode [ 127.105050][ T8780] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.112101][ T8780] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.120348][ T8780] device bridge_slave_1 entered promiscuous mode 10:00:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) [ 127.195921][ T8650] device hsr_slave_0 entered promiscuous mode [ 127.274482][ T8650] device hsr_slave_1 entered promiscuous mode 10:00:52 executing program 4: accept$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000900)=@raw={'raw\x00', 0x3c1, 0x3, 0x458, 0x0, 0x150, 0x150, 0x250, 0x0, 0x388, 0x238, 0x238, 0x388, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0x228, 0x250, 0x0, {}, [@common=@inet=@policy={{0x158, 'policy\x00'}, {[{@ipv6=@private1, [], @ipv4=@loopback}, {@ipv4=@empty, [], @ipv4=@remote}, {@ipv6=@loopback, [], @ipv4=@loopback}, {@ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, [], @ipv6=@dev}]}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00'}}, {{@uncond, 0x0, 0xd0, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4b8) [ 127.340769][ T8950] IPVS: ftp: loaded support on port[0] = 21 [ 127.351421][ T8780] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 127.407134][ T8780] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 127.488733][ T8780] team0: Port device team_slave_0 added [ 127.506789][ T8950] chnl_net:caif_netlink_parms(): no params data found [ 127.519683][ T8780] team0: Port device team_slave_1 added [ 127.528215][ T8650] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 127.580779][ T8780] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 127.595050][ T8780] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 127.624823][ T8780] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 127.636892][ T8911] chnl_net:caif_netlink_parms(): no params data found 10:00:53 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r1, r0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x600004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) [ 127.696986][ T8650] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 127.766425][ T8650] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 127.805872][ T8780] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 127.812885][ T8780] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 127.838821][ T8780] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 127.861802][ T9167] IPVS: ftp: loaded support on port[0] = 21 [ 127.868039][ T8650] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 127.985991][ T8780] device hsr_slave_0 entered promiscuous mode [ 128.024780][ T8780] device hsr_slave_1 entered promiscuous mode [ 128.074331][ T8780] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 128.081904][ T8780] Cannot create hsr debugfs directory [ 128.090811][ T9232] IPVS: ftp: loaded support on port[0] = 21 [ 128.128196][ T8950] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.136626][ T8950] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.144028][ T8950] device bridge_slave_0 entered promiscuous mode [ 128.164765][ T8911] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.172376][ T8911] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.181558][ T8911] device bridge_slave_0 entered promiscuous mode [ 128.189408][ T8911] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.196995][ T8911] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.204970][ T8911] device bridge_slave_1 entered promiscuous mode [ 128.226955][ T8950] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.234111][ T8950] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.242040][ T8950] device bridge_slave_1 entered promiscuous mode [ 128.268933][ T8911] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 128.286488][ T8950] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 128.297628][ T8911] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 128.327149][ T8950] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 128.336618][ T8780] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 128.368506][ T8780] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 128.447573][ T8780] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 128.506265][ T8780] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 128.559406][ T9232] chnl_net:caif_netlink_parms(): no params data found [ 128.576164][ T8911] team0: Port device team_slave_0 added [ 128.586094][ T8911] team0: Port device team_slave_1 added [ 128.600132][ T8911] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 128.608816][ T8911] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 128.635589][ T8911] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 128.662777][ T8911] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 128.670968][ T8911] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 128.698785][ T8911] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 128.712993][ T8950] team0: Port device team_slave_0 added [ 128.722312][ T8950] team0: Port device team_slave_1 added [ 128.816417][ T8911] device hsr_slave_0 entered promiscuous mode [ 128.844549][ T8911] device hsr_slave_1 entered promiscuous mode [ 128.884270][ T8911] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 128.891934][ T8911] Cannot create hsr debugfs directory [ 128.899888][ T9167] chnl_net:caif_netlink_parms(): no params data found [ 128.908987][ T8950] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 128.916464][ T8950] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 128.942923][ T8950] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 128.960634][ T8650] 8021q: adding VLAN 0 to HW filter on device bond0 [ 128.968899][ T9232] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.976215][ T9232] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.983751][ T9232] device bridge_slave_0 entered promiscuous mode [ 128.991424][ T9232] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.998517][ T9232] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.006209][ T9232] device bridge_slave_1 entered promiscuous mode [ 129.027711][ T8950] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 129.034764][ T8950] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 129.061670][ T8950] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 129.105956][ T8950] device hsr_slave_0 entered promiscuous mode [ 129.154556][ T8950] device hsr_slave_1 entered promiscuous mode [ 129.214294][ T8950] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 129.222325][ T8950] Cannot create hsr debugfs directory [ 129.245943][ T9232] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 129.261865][ T8650] 8021q: adding VLAN 0 to HW filter on device team0 [ 129.274790][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 129.282324][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 129.297813][ T9232] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 129.315802][ T9232] team0: Port device team_slave_0 added [ 129.322768][ T9232] team0: Port device team_slave_1 added [ 129.346659][ T3940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 129.355342][ T3940] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 129.363668][ T3940] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.370760][ T3940] bridge0: port 1(bridge_slave_0) entered forwarding state [ 129.378855][ T3940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 129.387400][ T3940] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 129.395938][ T3940] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.403507][ T3940] bridge0: port 2(bridge_slave_1) entered forwarding state [ 129.411779][ T3940] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 129.420823][ T9167] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.428956][ T9167] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.436684][ T9167] device bridge_slave_0 entered promiscuous mode [ 129.444636][ T9167] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.451662][ T9167] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.459255][ T9167] device bridge_slave_1 entered promiscuous mode [ 129.484187][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 129.484971][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 129.501092][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 129.509671][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 129.518376][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 129.527268][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 129.536356][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 129.548404][ T9232] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 129.556889][ T9232] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 129.584992][ T9232] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 129.596256][ T8911] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 129.637135][ T8911] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 129.686281][ T8911] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 129.728068][ T8911] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 129.779811][ T9232] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 129.788226][ T9232] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 129.815769][ T9232] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 129.831460][ T8780] 8021q: adding VLAN 0 to HW filter on device bond0 [ 129.843480][ T9167] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 129.866320][ T5047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 129.875951][ T5047] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 129.886886][ T8650] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 129.897937][ T8650] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 129.909325][ T9167] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 129.925913][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 129.934999][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 129.944647][ T8950] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 130.006385][ T8950] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 130.105702][ T9232] device hsr_slave_0 entered promiscuous mode [ 130.164563][ T9232] device hsr_slave_1 entered promiscuous mode [ 130.204258][ T9232] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 130.211858][ T9232] Cannot create hsr debugfs directory [ 130.227920][ T8780] 8021q: adding VLAN 0 to HW filter on device team0 [ 130.235715][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 130.243319][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 130.252321][ T9167] team0: Port device team_slave_0 added [ 130.258357][ T8950] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 130.306859][ T8950] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 130.395137][ T3940] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 130.402620][ T3940] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 130.418196][ T9167] team0: Port device team_slave_1 added [ 130.433634][ T9167] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 130.440818][ T9167] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 130.467603][ T9167] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 130.484209][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 130.493322][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 130.502154][ T9360] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.509228][ T9360] bridge0: port 1(bridge_slave_0) entered forwarding state [ 130.517628][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 130.531869][ T8650] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 130.539828][ T9167] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 130.547145][ T9167] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 130.573676][ T9167] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 130.595995][ T9232] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 130.647768][ T9232] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 130.698184][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 130.706810][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 130.715479][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.722669][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 130.731071][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 130.740079][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 130.749037][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 130.758516][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 130.773038][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 130.781193][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 130.789812][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 130.805405][ T9232] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 130.905446][ T9167] device hsr_slave_0 entered promiscuous mode [ 130.944335][ T9167] device hsr_slave_1 entered promiscuous mode [ 130.994137][ T9167] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 131.002209][ T9167] Cannot create hsr debugfs directory [ 131.017746][ T8780] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 131.028947][ T8780] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 131.041577][ T9232] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 131.082938][ T5047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 131.091234][ T5047] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 131.099731][ T5047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 131.108329][ T5047] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 131.116903][ T5047] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 131.145057][ T8950] 8021q: adding VLAN 0 to HW filter on device bond0 [ 131.171000][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 131.180125][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 131.195271][ T8911] 8021q: adding VLAN 0 to HW filter on device bond0 [ 131.205239][ T8650] device veth0_vlan entered promiscuous mode [ 131.220345][ T8950] 8021q: adding VLAN 0 to HW filter on device team0 [ 131.229676][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 131.238469][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 131.246412][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 131.254567][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 131.262938][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 131.270718][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 131.278407][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 131.286250][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 131.296959][ T8650] device veth1_vlan entered promiscuous mode [ 131.306957][ T8911] 8021q: adding VLAN 0 to HW filter on device team0 [ 131.314153][ T9167] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 131.367551][ T8780] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 131.374878][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 131.382456][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 131.390479][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 131.416899][ T8650] device veth0_macvtap entered promiscuous mode [ 131.423624][ T9167] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 131.476468][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 131.484884][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 131.494876][ T48] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.501966][ T48] bridge0: port 1(bridge_slave_0) entered forwarding state [ 131.509883][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 131.518656][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 131.527475][ T48] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.534517][ T48] bridge0: port 2(bridge_slave_1) entered forwarding state [ 131.542121][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 131.550695][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 131.559181][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 131.567739][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 131.575992][ T48] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.583415][ T48] bridge0: port 1(bridge_slave_0) entered forwarding state [ 131.591820][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 131.599671][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 131.607936][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 131.620037][ T8650] device veth1_macvtap entered promiscuous mode [ 131.628907][ T9167] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 131.706032][ T9167] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 131.754637][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 131.763625][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 131.772666][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 131.782339][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 131.790967][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.798004][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 131.805852][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 131.814586][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 131.844861][ T9232] 8021q: adding VLAN 0 to HW filter on device bond0 [ 131.857508][ T8650] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 131.866242][ T5047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 131.875217][ T5047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 131.883779][ T5047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 131.893798][ T5047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 131.902528][ T5047] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 131.911386][ T5047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 131.919847][ T5047] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 131.928189][ T5047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 131.937037][ T5047] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 131.945568][ T5047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 131.953610][ T5047] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 131.961821][ T5047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 131.970024][ T5047] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 131.978449][ T5047] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 131.987064][ T5047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 131.995791][ T5047] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 132.003671][ T5047] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 132.016129][ T8911] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 132.030509][ T9232] 8021q: adding VLAN 0 to HW filter on device team0 [ 132.043798][ T8650] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 132.053275][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 132.062147][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 132.069879][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 132.078435][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 132.088432][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 132.097146][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 132.106376][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.114799][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.122617][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 132.131221][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 132.147289][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 132.154894][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 132.163254][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 132.171113][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 132.179685][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 132.188096][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.195133][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 132.206763][ T8780] device veth0_vlan entered promiscuous mode [ 132.263330][ T8911] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 132.273899][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 132.283181][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 132.293060][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 132.302004][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 132.311092][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 132.319846][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 132.329478][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 132.337804][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 132.346347][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 132.448123][ T8950] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 132.462247][ T8780] device veth1_vlan entered promiscuous mode [ 132.480080][ T5047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 132.494535][ T5047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 132.503058][ T5047] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 132.525667][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 132.533498][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 132.554503][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 132.563754][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 132.572718][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 132.581905][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 132.590728][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 132.614942][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 132.622332][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 132.632509][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 132.641186][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 132.651062][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 132.659624][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 132.668360][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 132.676093][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 132.685370][ T9232] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 132.696788][ T8780] device veth0_macvtap entered promiscuous mode [ 132.706111][ T9167] 8021q: adding VLAN 0 to HW filter on device bond0 [ 132.713865][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 132.722334][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 132.730855][ T8911] device veth0_vlan entered promiscuous mode [ 132.745467][ T8950] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 132.758802][ T8780] device veth1_macvtap entered promiscuous mode [ 132.767929][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 132.775981][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 132.786302][ T8911] device veth1_vlan entered promiscuous mode [ 132.798457][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 132.806469][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 132.814933][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 132.822426][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 132.848883][ T8780] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 132.859601][ T8780] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 132.870799][ T8780] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 132.880377][ T9167] 8021q: adding VLAN 0 to HW filter on device team0 [ 132.891138][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 132.899084][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 132.907969][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 132.917066][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 132.927069][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 132.935942][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 132.950404][ T8950] device veth0_vlan entered promiscuous mode [ 132.958528][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 132.967099][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 132.976632][ T8780] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 132.987148][ T8780] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 132.998072][ T8780] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 133.011283][ T8911] device veth0_macvtap entered promiscuous mode [ 133.021807][ T9232] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 133.029920][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 133.039021][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 133.047173][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 133.056290][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 133.065580][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 133.074551][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 133.086540][ T8950] device veth1_vlan entered promiscuous mode [ 133.096792][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 133.105196][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 133.112987][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 133.121724][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 133.130365][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.137720][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 133.145822][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 133.154293][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 133.162432][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.169475][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 133.179697][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 133.200357][ T8911] device veth1_macvtap entered promiscuous mode [ 133.215482][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 133.223410][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 133.232903][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 133.242566][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 133.252828][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 133.261199][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 133.393341][ T3940] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 133.414924][ T3940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 133.423297][ T3940] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 133.440039][ T8950] device veth0_macvtap entered promiscuous mode [ 133.459372][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 133.468795][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 133.478197][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 133.487445][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 133.496319][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 133.505271][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 133.518509][ T9167] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 133.530787][ T9167] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 133.545156][ T9921] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 133.556820][ T9921] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 133.564836][ T9921] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 133.603504][ T9921] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 133.613762][ T9921] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 133.623515][ T9921] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 10:00:59 executing program 1: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r0, 0x0, 0x31, 0x0, &(0x7f0000000000)) [ 133.663330][ T5047] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 133.675762][ T5047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 133.684517][ T5047] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 133.698673][ T8950] device veth1_macvtap entered promiscuous mode 10:00:59 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffb6, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000000), &(0x7f00000000c0)=0x94) [ 133.720448][ T9232] device veth0_vlan entered promiscuous mode [ 133.734136][ T8911] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 133.754759][ T8911] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 10:00:59 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffb6, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000000), 0x8c) [ 133.767955][ T8911] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 133.779998][ T8911] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 133.802801][ T8911] batman_adv: batadv0: Interface activated: batadv_slave_0 10:00:59 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) r1 = dup2(r0, r0) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r2, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r3 = dup2(r2, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0x100, &(0x7f0000000100)={r4}, &(0x7f0000000040)=0xb8) [ 133.831802][ T3940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 133.841485][ T3940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 133.852772][ T3940] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 133.865239][ T3940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 10:00:59 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffb6, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x4075}, 0x10) [ 133.876428][ T3940] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 133.884375][ T3940] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 133.902267][ T9232] device veth1_vlan entered promiscuous mode [ 133.913772][ T9167] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 133.928841][ T8950] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 133.946988][ T8950] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 133.959904][ T8950] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 133.970854][ T8950] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 10:00:59 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) [ 133.981516][ T8950] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 134.003209][ T8950] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 134.015076][ T8950] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 134.022565][ T3940] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 134.034090][ T3940] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 134.041950][ T3940] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 134.053612][ T3940] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 134.063703][ T3940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 134.085965][ T8911] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 134.102180][ T8911] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 134.123903][ T8911] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 134.136789][ T8911] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 134.148379][ T8911] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 134.160366][ T8950] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 134.172642][ T8950] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 134.187309][ T8950] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 134.199059][ T8950] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 134.209264][ T8950] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 134.220380][ T8950] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 134.232047][ T8950] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 134.245873][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 134.255000][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 134.263697][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 134.273916][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 134.282577][ T9360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 134.313227][ T9232] device veth0_macvtap entered promiscuous mode [ 134.355812][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 134.366933][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 134.375903][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 134.433982][ T5047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 134.443166][ T5047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 134.457123][ T9232] device veth1_macvtap entered promiscuous mode [ 134.537191][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 134.599355][ T9969] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 134.686702][ T9232] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 134.712175][ T9232] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 134.723210][ T9232] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 134.735000][ T9232] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 134.747935][ T9232] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 134.769022][ T9232] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 134.781249][ T9232] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 134.792136][ T9232] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 134.814074][ T9232] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 134.840057][ T9167] device veth0_vlan entered promiscuous mode [ 134.859861][ T9975] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 134.870718][ T9975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 134.879377][ T9975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 134.889381][ T9975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 134.903760][ T9232] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 134.922104][ T9232] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 134.932311][ T9232] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 134.943470][ T9232] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 134.955157][ T9232] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 134.966128][ T9232] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 134.976537][ T9232] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 134.987786][ T9232] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 134.998802][ T9232] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 135.012157][ T3940] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 135.020565][ T3940] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 135.029326][ T3940] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 135.039133][ T3940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 135.049448][ T9167] device veth1_vlan entered promiscuous mode [ 135.218564][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 135.228006][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 135.244867][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 135.264275][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 135.285527][ T28] audit: type=1800 audit(1595844060.767:2): pid=9992 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=15758 res=0 [ 135.286314][ T9167] device veth0_macvtap entered promiscuous mode [ 135.341924][ T9167] device veth1_macvtap entered promiscuous mode [ 135.364848][ T9167] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 135.378631][ T9167] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.378646][ T9167] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 135.378651][ T9167] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.378664][ T9167] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 135.378667][ T9167] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.378680][ T9167] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 135.440099][ T9167] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.450241][ T9167] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 135.461542][ T9167] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.472814][ T9167] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 135.483915][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready 10:01:01 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r1, r0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x600004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 10:01:01 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect(r0, &(0x7f0000000140)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 10:01:01 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendmsg(r0, &(0x7f00000005c0)={&(0x7f0000000140)=@in={0x10, 0x2}, 0x10, &(0x7f00000003c0)=[{&(0x7f00000001c0)="cf", 0x1}], 0x1, &(0x7f0000000400)=[{0xc}, {0xc, 0x84}], 0x18}, 0x0) 10:01:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) utimes(&(0x7f0000000440)='./file0\x00', 0x0) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', 0x0, 0x0, 0x0) close(r0) [ 135.492954][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 135.501528][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 135.514985][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 135.529463][ T9167] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 135.546517][ T9167] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.561763][ T9167] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 135.577745][ T9167] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.610837][ T9167] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 135.636942][ T9167] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.662341][ T9167] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 135.693775][ T9167] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.703625][ T9167] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 135.733787][ T9167] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.747008][ T9167] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 135.765501][ T3940] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 135.775256][ T3940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 10:01:01 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffb6, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x19, &(0x7f0000000040), 0x8) 10:01:01 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r1, r0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x600004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 10:01:01 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) utimes(&(0x7f0000000440)='./file0\x00', 0x0) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', 0x0, 0x0, 0x0) close(r0) 10:01:01 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xd, &(0x7f0000000080), 0x4) 10:01:01 executing program 2: r0 = socket$inet_sctp(0x2, 0x8000000000000001, 0x84) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x10, &(0x7f00000000c0)=0x1, 0x4) 10:01:01 executing program 0: r0 = socket$inet_sctp(0x2, 0x8000000000000001, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000340)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f00000002c0)=[@dstaddrv6={0x1c, 0x84, 0xa, @empty}, @sndinfo={0x1c}], 0x38}, 0x0) [ 135.955524][T10025] xt_policy: neither incoming nor outgoing policy selected [ 135.963657][T10026] xt_policy: neither incoming nor outgoing policy selected 10:01:01 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x900, &(0x7f0000000100), 0x8) 10:01:01 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0x100, &(0x7f00000000c0), &(0x7f0000000180)=0xac) 10:01:01 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="9f", 0x1, 0x0, &(0x7f0000001080)={0x1c, 0x1c, 0x2}, 0x1c) 10:01:01 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x1f, &(0x7f0000000780), 0x4) 10:01:01 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x3}, 0x1c) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) sendmsg$inet_sctp(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000001180)=[{&(0x7f00000000c0)="f9", 0x1}], 0x1, &(0x7f00000011c0)=[@sndinfo={0x1c}, @sndinfo={0x1c}], 0x38}, 0x0) 10:01:01 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000200)={0x0, 0x0, 0x0, 0xfff, 0x8000}, 0x14) 10:01:01 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) r1 = dup2(r0, r0) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r2, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r3 = dup2(r2, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x29, &(0x7f0000000100)={r4}, 0x8) 10:01:01 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r1, r0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x600004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 10:01:01 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) 10:01:01 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) r1 = dup2(r0, r0) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r2, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r3 = dup2(r2, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x108, &(0x7f0000000040)={r4}, &(0x7f0000000080)=0x18) 10:01:01 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000200)=ANY=[], 0xa0) 10:01:01 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) dup2(r0, r1) 10:01:01 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101}, 0x14) 10:01:01 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000001080)={0x1c, 0x1c, 0x2}, 0x1c) shutdown(r0, 0x1) close(r0) 10:01:02 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x11, &(0x7f0000000000), 0x1) 10:01:02 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffb6, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f00000002c0), 0xa0) 10:01:02 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect(r0, &(0x7f0000000080)=@in={0x10, 0x2}, 0x10) 10:01:02 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) r1 = dup2(r0, r0) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r2, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r3 = dup2(r2, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f00000016c0)=ANY=[@ANYRES32=0x0], &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x29, &(0x7f0000000080)={r4}, &(0x7f00000000c0)=0x8) 10:01:02 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffb6, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x14) 10:01:02 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r1, r0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x600004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 10:01:02 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffb6, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f0000000000), 0x8) 10:01:02 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffb6, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0xa85, 0x4075, 0x7f}, 0x10) 10:01:02 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffb6, 0x2}, 0x10) listen(r0, 0x0) 10:01:02 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000016c0)=ANY=[], &(0x7f0000001700)=0x8) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x19, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 10:01:02 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendmsg(r0, &(0x7f00000005c0)={&(0x7f0000000140)=@in={0x10, 0x2}, 0x10, &(0x7f00000003c0)=[{&(0x7f00000001c0)="cf", 0x1}], 0x1, &(0x7f0000000400)=[{0xc}, {0xc, 0x84}, {0xc}], 0x24}, 0x0) 10:01:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x10, 0x2}, 0x10) 10:01:02 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x900, &(0x7f0000000000), &(0x7f0000000040)=0x8) 10:01:02 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffb6, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x9, 0x7, 0x2}, 0x10) 10:01:02 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0x101, &(0x7f0000000000), &(0x7f00000000c0)=0x94) 10:01:02 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet6_int(r0, 0x29, 0x39, &(0x7f0000000100), 0x4) 10:01:02 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c}, 0x1c) 10:01:02 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r1, r0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 10:01:02 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000100)={0x1c, 0x1c, 0x3}, 0x1c) 10:01:02 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c}, 0x1c) 10:01:02 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendmsg(r0, &(0x7f00000005c0)={&(0x7f0000000140)=@in={0x10, 0x2}, 0x10, &(0x7f00000003c0)=[{&(0x7f00000001c0)="cf", 0x1}], 0x1}, 0x0) 10:01:02 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffb6, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x4075, 0x7f}, 0x10) 10:01:02 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) r1 = dup2(r0, r0) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r2, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r3 = dup2(r2, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f00000016c0)=ANY=[], &(0x7f0000001700)=0x8) r4 = socket$inet6_sctp(0x1c, 0x5, 0x84) r5 = dup2(r4, r4) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x901, &(0x7f0000000040)={r6}, 0x8) 10:01:02 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) listen(r0, 0x0) r1 = socket$inet6_tcp(0x1c, 0x1, 0x0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) dup2(r1, r0) 10:01:02 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0x101, &(0x7f0000000180), &(0x7f0000000040)=0x98) 10:01:02 executing program 4: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) 10:01:02 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4}, 0xb) 10:01:02 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r1, r0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 10:01:02 executing program 4: r0 = socket$inet_sctp(0x2, 0x8000000000000001, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x5) 10:01:02 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000100)=@in={0x10, 0x2}, 0x10) 10:01:02 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffb6, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4}, 0xb) 10:01:02 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) listen(r0, 0x0) listen(r0, 0x0) 10:01:02 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r1, r0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 10:01:02 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) listen(r0, 0x0) r1 = socket$inet6_tcp(0x1c, 0x1, 0x0) dup2(r1, r0) 10:01:02 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000200)=ANY=[@ANYBLOB="10024e20ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001"], 0xa0) 10:01:02 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r1, r0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) ftruncate(r2, 0x600004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 10:01:02 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r2, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r3 = dup2(r2, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x103, &(0x7f00000000c0)={r4, 0x2, "d29a"}, &(0x7f0000000040)=0xa) 10:01:02 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@in={0x10, 0x2}, 0x10) 10:01:02 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) 10:01:02 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$sock_int(r0, 0xffff, 0x200, &(0x7f0000000040), 0x4) 10:01:02 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x3}, 0x1c) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) sendmsg$inet_sctp(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000001180)=[{&(0x7f00000000c0)="f9", 0x1}], 0x1}, 0x0) 10:01:02 executing program 4: 10:01:02 executing program 0: 10:01:03 executing program 3: 10:01:03 executing program 2: 10:01:03 executing program 4: 10:01:03 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000100)={0x1c, 0x1c, 0x3}, 0x1c) 10:01:03 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r1, r0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) ftruncate(r2, 0x600004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 10:01:03 executing program 1: 10:01:03 executing program 0: 10:01:03 executing program 2: 10:01:03 executing program 4: 10:01:03 executing program 0: 10:01:03 executing program 1: 10:01:03 executing program 4: 10:01:03 executing program 0: 10:01:03 executing program 3: 10:01:03 executing program 2: 10:01:03 executing program 1: 10:01:03 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r1, r0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) ftruncate(r2, 0x600004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 10:01:03 executing program 4: 10:01:03 executing program 3: 10:01:03 executing program 1: 10:01:03 executing program 0: 10:01:03 executing program 2: 10:01:03 executing program 0: 10:01:03 executing program 4: 10:01:03 executing program 2: sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000180)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000005c00), 0x40000000000037b, 0xff48) 10:01:03 executing program 1: 10:01:03 executing program 3: 10:01:03 executing program 2: 10:01:03 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r1, r0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ftruncate(r2, 0x600004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 10:01:03 executing program 0: 10:01:03 executing program 1: 10:01:03 executing program 4: 10:01:03 executing program 3: 10:01:03 executing program 2: 10:01:03 executing program 3: 10:01:03 executing program 1: 10:01:03 executing program 2: 10:01:03 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) 10:01:03 executing program 0: 10:01:03 executing program 1: 10:01:03 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r1, r0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ftruncate(r2, 0x600004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 10:01:03 executing program 3: 10:01:03 executing program 0: 10:01:03 executing program 2: 10:01:03 executing program 1: 10:01:03 executing program 4: 10:01:04 executing program 0: 10:01:04 executing program 2: 10:01:04 executing program 4: 10:01:04 executing program 3: 10:01:04 executing program 1: 10:01:04 executing program 0: 10:01:04 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r1, r0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ftruncate(r2, 0x600004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 10:01:04 executing program 3: 10:01:04 executing program 2: 10:01:04 executing program 1: 10:01:04 executing program 4: 10:01:04 executing program 0: 10:01:04 executing program 3: 10:01:04 executing program 2: 10:01:04 executing program 1: 10:01:04 executing program 0: 10:01:04 executing program 4: 10:01:04 executing program 2: 10:01:04 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r1, r0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ftruncate(r2, 0x600004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 10:01:04 executing program 0: 10:01:04 executing program 3: 10:01:04 executing program 1: 10:01:04 executing program 4: 10:01:04 executing program 2: 10:01:04 executing program 0: 10:01:04 executing program 1: 10:01:04 executing program 2: 10:01:04 executing program 4: 10:01:04 executing program 3: 10:01:04 executing program 2: 10:01:04 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r1, r0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ftruncate(r2, 0x600004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 10:01:04 executing program 1: 10:01:04 executing program 4: 10:01:04 executing program 3: 10:01:04 executing program 0: 10:01:04 executing program 2: 10:01:04 executing program 3: 10:01:04 executing program 1: 10:01:04 executing program 4: 10:01:04 executing program 2: 10:01:04 executing program 0: 10:01:04 executing program 3: 10:01:05 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r1, r0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ftruncate(r2, 0x600004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 10:01:05 executing program 1: 10:01:05 executing program 2: 10:01:05 executing program 4: 10:01:05 executing program 0: 10:01:05 executing program 3: 10:01:05 executing program 2: 10:01:05 executing program 3: 10:01:05 executing program 4: 10:01:05 executing program 1: 10:01:05 executing program 0: 10:01:05 executing program 3: 10:01:05 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r1, r0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x600004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 10:01:05 executing program 4: 10:01:05 executing program 2: 10:01:05 executing program 1: 10:01:05 executing program 0: 10:01:05 executing program 3: 10:01:05 executing program 4: 10:01:05 executing program 2: 10:01:05 executing program 0: 10:01:05 executing program 1: 10:01:05 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r1, r0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x600004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 10:01:05 executing program 3: 10:01:05 executing program 2: 10:01:05 executing program 1: 10:01:05 executing program 4: 10:01:05 executing program 0: 10:01:05 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) 10:01:05 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = add_key$keyring(0x0, &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key(0x0, 0x0, 0x0, 0x0, r1) keyctl$read(0xb, r2, 0x0, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 10:01:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x200000000006, 0x0, 0x0, 0xfffffff8}]}) mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000180)=""/241) 10:01:05 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'\x00', 0x7132}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000280)=ANY=[@ANYBLOB="00006dac"]) 10:01:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmmsg$inet6(r1, &(0x7f0000003b80)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="e6", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000440)='&', 0x1}], 0x1}}], 0x4000070, 0x8000) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 10:01:05 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r1, r0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x600004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 10:01:05 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r1, r0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ftruncate(0xffffffffffffffff, 0x600004) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80001d00c0d0) [ 140.205734][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 140.217729][ T28] audit: type=1326 audit(1595844065.697:3): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=10458 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f1aa code=0xffff0000 10:01:05 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r1, r0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ftruncate(0xffffffffffffffff, 0x600004) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80001d00c0d0) 10:01:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmmsg$inet6(r1, &(0x7f0000003b80)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="e6", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000440)='&', 0x1}], 0x1}}], 0x4000070, 0x8000) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 10:01:05 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r1, r0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ftruncate(0xffffffffffffffff, 0x600004) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80001d00c0d0) 10:01:05 executing program 0: [ 140.291244][ T28] audit: type=1326 audit(1595844065.757:4): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=10454 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f1aa code=0xffff0000 10:01:05 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r1, r0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x600004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 10:01:06 executing program 3: pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r3, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff3b, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000043c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000000000)=""/60, 0xfffffffffffffe44, 0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000000)="48050000140019", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x100000005, 0x0) 10:01:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffff8}]}) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) [ 140.949389][ T28] audit: type=1326 audit(1595844066.427:5): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=10454 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f1aa code=0xffff0000 [ 140.972501][ T28] audit: type=1326 audit(1595844066.457:6): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=10458 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f1aa code=0xffff0000 10:01:06 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) fstatfs(r0, &(0x7f00000000c0)=""/28) 10:01:06 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) rmdir(&(0x7f0000000140)='./file0\x00') 10:01:06 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r1, r0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x600004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 10:01:06 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = add_key$keyring(0x0, &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key(0x0, 0x0, 0x0, 0x0, r1) keyctl$read(0xb, r2, 0x0, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 141.035541][ T28] audit: type=1326 audit(1595844066.517:7): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=10506 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f1aa code=0xffff0000 10:01:06 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r1, r0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x600004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 10:01:06 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 141.091985][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 141.109753][T10520] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.3'. 10:01:06 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x600004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) [ 141.151262][ T28] audit: type=1326 audit(1595844066.607:8): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=10514 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f1aa code=0xffff0000 [ 141.202364][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 141.219627][ C0] hrtimer: interrupt took 36377 ns 10:01:06 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x600004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 10:01:06 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x600004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 10:01:06 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) dup3(r1, r0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x600004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 10:01:07 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') [ 141.828469][ T28] audit: type=1326 audit(1595844067.307:9): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=10506 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f1aa code=0xffff0000 10:01:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 141.886505][ T28] audit: type=1326 audit(1595844067.367:10): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=10514 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f1aa code=0xffff0000 10:01:07 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) fstatfs(r0, &(0x7f00000000c0)=""/28) 10:01:07 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) dup3(r1, r0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x600004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 10:01:07 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 10:01:07 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 10:01:07 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) listxattr(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 141.992097][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 142.027261][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:01:07 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) dup3(r1, r0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x600004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) [ 142.033114][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 142.057070][ T28] audit: type=1326 audit(1595844067.537:11): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=10570 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f1aa code=0xffff0000 10:01:07 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') openat(r0, &(0x7f0000000040)='./file0\x00', 0x141242, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x84003ff) r2 = syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, 0x0, 0x20000804) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x28, r2, 0x8, 0x70bd28, 0x25dfdbff, {{}, {}, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x400e0}, 0x4000800) socket$inet6_tcp(0xa, 0x1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x141242, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000000)=""/88, &(0x7f0000000080)=0x58) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) connect$inet(r3, &(0x7f0000000280)={0x2, 0x0, @empty}, 0x10) 10:01:07 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(0xffffffffffffffff, r0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ftruncate(r1, 0x600004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) 10:01:07 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') openat(r0, &(0x7f0000000040)='./file0\x00', 0x141242, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x84003ff) r2 = syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, 0x0, 0x20000804) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x28, r2, 0x8, 0x70bd28, 0x25dfdbff, {{}, {}, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x400e0}, 0x4000800) socket$inet6_tcp(0xa, 0x1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x141242, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000000)=""/88, &(0x7f0000000080)=0x58) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) connect$inet(r3, &(0x7f0000000280)={0x2, 0x0, @empty}, 0x10) 10:01:07 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(0xffffffffffffffff, r0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ftruncate(r1, 0x600004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) 10:01:07 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(0xffffffffffffffff, r0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ftruncate(r1, 0x600004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) 10:01:08 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001740)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pwritev(r0, &(0x7f0000001800)=[{&(0x7f0000000200)='u', 0x1}], 0x1, 0x9, 0x0) 10:01:08 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = add_key$keyring(0x0, &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key(0x0, 0x0, 0x0, 0x0, r1) keyctl$read(0xb, r2, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000280)="3f67499d63fedff39e0951a189557082260d4453def2026958c5a9f2ffc758edee205a3a0421a9e56c8730d0066e1aa1b917d363f9237dfe58a5b4d18a33149871820fc233ad06298b6d9f9fbca966c0dadf449b80d95326e394cee9961f069edd18ab2a8cc52d8b0a15f89a1cc41419ca6886", 0x73, 0xfffffffffffffffc) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup(0xffffffffffffffff) sendto$inet6(r4, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 10:01:08 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) read$eventfd(r0, 0x0, 0x0) 10:01:08 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ftruncate(r1, 0x600004) sendfile(0xffffffffffffffff, r1, 0x0, 0x80001d00c0d0) 10:01:08 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001740)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pwritev(r0, &(0x7f0000001800)=[{&(0x7f0000000200)='u', 0x1}], 0x1, 0x9, 0x0) 10:01:08 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001740)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pwritev(r0, &(0x7f0000001800)=[{&(0x7f0000000200)='u', 0x1}], 0x1, 0x9, 0x0) 10:01:08 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 10:01:08 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001740)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pwritev(r0, &(0x7f0000001800)=[{&(0x7f0000000200)='u', 0x1}], 0x1, 0x9, 0x0) 10:01:08 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) rename(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file1\x00') 10:01:08 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ftruncate(r1, 0x600004) sendfile(0xffffffffffffffff, r1, 0x0, 0x80001d00c0d0) 10:01:08 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x4, &(0x7f0000000380)={0x1, &(0x7f00000001c0)=[{0x6}]}) 10:01:08 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 142.956502][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:01:08 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001740)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pwritev(r0, &(0x7f0000001800)=[{&(0x7f0000000200)='u', 0x1}], 0x1, 0x9, 0x0) [ 143.009877][ T28] audit: type=1326 audit(1595844068.487:12): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=10645 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f1aa code=0x0 [ 143.075733][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 143.085214][ T28] audit: type=1326 audit(1595844068.527:13): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=10647 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f1aa code=0xffff0000 10:01:09 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = add_key$keyring(0x0, &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key(0x0, 0x0, 0x0, 0x0, r1) keyctl$read(0xb, r2, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000280)="3f67499d63fedff39e0951a189557082260d4453def2026958c5a9f2ffc758edee205a3a0421a9e56c8730d0066e1aa1b917d363f9237dfe58a5b4d18a33149871820fc233ad06298b6d9f9fbca966c0dadf449b80d95326e394cee9961f069edd18ab2a8cc52d8b0a15f89a1cc41419ca6886", 0x73, 0xfffffffffffffffc) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup(0xffffffffffffffff) sendto$inet6(r4, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 10:01:09 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ftruncate(r1, 0x600004) sendfile(0xffffffffffffffff, r1, 0x0, 0x80001d00c0d0) 10:01:09 executing program 0: pwritev(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f0000000200)='u', 0x1}], 0x1, 0x9, 0x0) [ 143.732997][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:01:09 executing program 0: pwritev(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f0000000200)='u', 0x1}], 0x1, 0x9, 0x0) 10:01:09 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r1, r0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x600004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) [ 143.810588][ T28] audit: type=1326 audit(1595844069.287:14): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=10647 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f1aa code=0xffff0000 10:01:09 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 10:01:09 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) r0 = memfd_create(&(0x7f0000000240)='t\bnu\x8c\xc4', 0x0) pwritev(r0, 0x0, 0x0, 0x0, 0x0) 10:01:09 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffff8}]}) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/shm\x00', 0x0, 0x0) read$eventfd(r0, 0x0, 0x0) 10:01:09 executing program 0: pwritev(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f0000000200)='u', 0x1}], 0x1, 0x9, 0x0) 10:01:09 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r1, r0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x600004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 10:01:09 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) pwritev(r0, &(0x7f0000001800)=[{&(0x7f0000000200)='u', 0x1}], 0x1, 0x9, 0x0) [ 143.985900][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:01:09 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) pwritev(r0, &(0x7f0000001800)=[{&(0x7f0000000200)='u', 0x1}], 0x1, 0x9, 0x0) 10:01:10 executing program 1: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x81, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0), 0x1, 0x10003, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x800) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x42, 0x2, 0x0, 0x0, 0x0, 0x0, 0xa2, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x7}, 0x0, 0x8, 0x0, 0x4, 0x5, 0x7fff, 0xfffe}, 0x0, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) io_submit(0x0, 0x0, 0x0) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x1d, &(0x7f0000000180)=0x7fffffff, 0x4) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000003c80), 0x38e, 0x62, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000f, 0x2010, 0xffffffffffffffff, 0x4e533000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in=@private=0xa010100, 0x4e20, 0x0, 0x10, 0x4, 0x2, 0x0, 0x0, 0x3c}, {0x0, 0xfffffffffffffffe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000001}, {0x0, 0x0, 0x0, 0xfffffffff7fffffe}, 0x1, 0x6e6bb8, 0x0, 0x1, 0x2}, {{@in=@rand_addr=0x64010100}, 0xa, @in6=@rand_addr=' \x01\x00', 0x3507, 0x0, 0x3, 0x1, 0x7fffffff, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0xff00) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 10:01:10 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) pwritev(r0, &(0x7f0000001800)=[{&(0x7f0000000200)='u', 0x1}], 0x1, 0x9, 0x0) 10:01:10 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r1, r0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x600004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 10:01:10 executing program 0: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001740)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f0000000200)='u', 0x1}], 0x1, 0x9, 0x0) 10:01:10 executing program 0: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001740)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f0000000200)='u', 0x1}], 0x1, 0x9, 0x0) [ 144.689448][T10738] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 10:01:10 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r1, r0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x600004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 10:01:10 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)) 10:01:10 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r2) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 10:01:10 executing program 0: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001740)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f0000000200)='u', 0x1}], 0x1, 0x9, 0x0) 10:01:10 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fd/3\x00') write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) 10:01:10 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001740)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pwritev(r0, 0x0, 0x0, 0x9, 0x0) 10:01:10 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r1, r0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x600004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 10:01:10 executing program 1: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x81, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0), 0x1, 0x10003, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x800) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x42, 0x2, 0x0, 0x0, 0x0, 0x0, 0xa2, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x7}, 0x0, 0x8, 0x0, 0x4, 0x5, 0x7fff, 0xfffe}, 0x0, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) io_submit(0x0, 0x0, 0x0) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x1d, &(0x7f0000000180)=0x7fffffff, 0x4) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000003c80), 0x38e, 0x62, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000f, 0x2010, 0xffffffffffffffff, 0x4e533000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in=@private=0xa010100, 0x4e20, 0x0, 0x10, 0x4, 0x2, 0x0, 0x0, 0x3c}, {0x0, 0xfffffffffffffffe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000001}, {0x0, 0x0, 0x0, 0xfffffffff7fffffe}, 0x1, 0x6e6bb8, 0x0, 0x1, 0x2}, {{@in=@rand_addr=0x64010100}, 0xa, @in6=@rand_addr=' \x01\x00', 0x3507, 0x0, 0x3, 0x1, 0x7fffffff, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0xff00) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 10:01:10 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001740)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pwritev(r0, 0x0, 0x0, 0x9, 0x0) 10:01:10 executing program 4: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x4283, 0x0) 10:01:10 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r1, r0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x600004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 10:01:10 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fd/3\x00') write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) 10:01:10 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001740)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pwritev(r0, 0x0, 0x0, 0x9, 0x0) 10:01:10 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fd/3\x00') write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) 10:01:11 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r2) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 10:01:11 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r1, r0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x600004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 10:01:11 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001740)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pwritev(r0, &(0x7f0000001800), 0x0, 0x9, 0x0) 10:01:11 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) lsetxattr$trusted_overlay_redirect(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 10:01:11 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = epoll_create(0x10007ffd) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\t\x00'}) r4 = syz_open_pts(r0, 0x0) dup3(r3, r0, 0x0) dup3(r3, r4, 0x0) [ 145.783638][ C1] net_ratelimit: 1 callbacks suppressed [ 145.783645][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 145.854308][T10826] ================================================================== [ 145.862426][T10826] BUG: KCSAN: data-race in __fput / __tty_hangup [ 145.868772][T10826] [ 145.871122][T10826] write to 0xffff888124a6e828 of 8 bytes by task 10825 on cpu 0: [ 145.878825][T10826] __tty_hangup+0x23a/0x610 [ 145.883326][T10826] tty_vhangup+0x13/0x20 [ 145.887562][T10826] pty_close+0x298/0x2c0 [ 145.892838][T10826] tty_release+0x255/0xa00 [ 145.897243][T10826] __fput+0x1df/0x460 [ 145.901216][T10826] ____fput+0x11/0x20 [ 145.905205][T10826] task_work_run+0x8e/0x110 [ 145.909699][T10826] __prepare_exit_to_usermode+0x1c6/0x230 [ 145.915505][T10826] __syscall_return_slowpath+0x47/0x60 [ 145.920947][T10826] do_syscall_64+0x5d/0xb0 [ 145.925355][T10826] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 145.931312][T10826] [ 145.933661][T10826] read to 0xffff888124a6e828 of 8 bytes by task 10826 on cpu 1: [ 145.941283][T10826] __fput+0x1b6/0x460 [ 145.945390][T10826] ____fput+0x11/0x20 [ 145.950399][T10826] task_work_run+0x8e/0x110 [ 145.954975][T10826] __prepare_exit_to_usermode+0x1c6/0x230 [ 145.960683][T10826] __syscall_return_slowpath+0x47/0x60 [ 145.966213][T10826] do_syscall_64+0x5d/0xb0 [ 145.970632][T10826] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 145.976508][T10826] [ 145.978823][T10826] Reported by Kernel Concurrency Sanitizer on: [ 145.985745][T10826] CPU: 1 PID: 10826 Comm: syz-executor.3 Not tainted 5.8.0-rc7-syzkaller #0 [ 145.994397][T10826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 146.004438][T10826] ================================================================== [ 146.012486][T10826] Kernel panic - not syncing: panic_on_warn set ... [ 146.019153][T10826] CPU: 1 PID: 10826 Comm: syz-executor.3 Not tainted 5.8.0-rc7-syzkaller #0 [ 146.027801][T10826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 146.037998][T10826] Call Trace: [ 146.041361][T10826] dump_stack+0x10f/0x19d [ 146.045661][T10826] panic+0x207/0x64a [ 146.049529][T10826] ? vprintk_emit+0x44a/0x4f0 [ 146.054195][T10826] kcsan_report+0x684/0x690 [ 146.058822][T10826] ? kcsan_setup_watchpoint+0x453/0x4d0 [ 146.064478][T10826] ? __fput+0x1b6/0x460 [ 146.068610][T10826] ? ____fput+0x11/0x20 [ 146.072748][T10826] ? task_work_run+0x8e/0x110 [ 146.079770][T10826] ? __prepare_exit_to_usermode+0x1c6/0x230 [ 146.085870][T10826] ? __syscall_return_slowpath+0x47/0x60 [ 146.091483][T10826] ? do_syscall_64+0x5d/0xb0 [ 146.096059][T10826] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 146.102195][T10826] ? locks_remove_posix+0xe0/0x2f0 [ 146.107369][T10826] kcsan_setup_watchpoint+0x453/0x4d0 [ 146.112800][T10826] ? ima_file_free+0xaf/0x230 [ 146.117461][T10826] __fput+0x1b6/0x460 [ 146.121428][T10826] ____fput+0x11/0x20 [ 146.125381][T10826] task_work_run+0x8e/0x110 [ 146.129859][T10826] __prepare_exit_to_usermode+0x1c6/0x230 [ 146.135557][T10826] __syscall_return_slowpath+0x47/0x60 [ 146.140987][T10826] do_syscall_64+0x5d/0xb0 [ 146.145376][T10826] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 146.151357][T10826] RIP: 0033:0x45c369 [ 146.155239][T10826] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 146.174823][T10826] RSP: 002b:00007f17a40dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000124 [ 146.185305][T10826] RAX: 0000000000000007 RBX: 00000000000029c0 RCX: 000000000045c369 [ 146.193335][T10826] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 146.201276][T10826] RBP: 000000000078bfe0 R08: 0000000000000000 R09: 0000000000000000 [ 146.209218][T10826] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000078bfac [ 146.217167][T10826] R13: 00007ffe72ea76cf R14: 00007f17a40db9c0 R15: 000000000078bfac [ 146.226662][T10826] Kernel Offset: disabled [ 146.231036][T10826] Rebooting in 86400 seconds..