[ 70.957881][ T26] audit: type=1800 audit(1565002564.713:26): pid=10073 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 70.998761][ T26] audit: type=1800 audit(1565002564.713:27): pid=10073 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 71.043309][ T26] audit: type=1800 audit(1565002564.713:28): pid=10073 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 71.745342][ T26] audit: type=1800 audit(1565002565.543:29): pid=10073 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.173' (ECDSA) to the list of known hosts. 2019/08/05 10:56:16 fuzzer started 2019/08/05 10:56:19 dialing manager at 10.128.0.26:35541 2019/08/05 10:56:25 syscalls: 2484 2019/08/05 10:56:25 code coverage: enabled 2019/08/05 10:56:25 comparison tracing: enabled 2019/08/05 10:56:25 extra coverage: extra coverage is not supported by the kernel 2019/08/05 10:56:25 setuid sandbox: enabled 2019/08/05 10:56:25 namespace sandbox: enabled 2019/08/05 10:56:25 Android sandbox: /sys/fs/selinux/policy does not exist 2019/08/05 10:56:25 fault injection: enabled 2019/08/05 10:56:25 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/08/05 10:56:25 net packet injection: enabled 2019/08/05 10:56:25 net device setup: enabled 10:57:39 executing program 0: 10:57:39 executing program 1: syzkaller login: [ 165.914268][T10240] IPVS: ftp: loaded support on port[0] = 21 [ 165.976528][T10242] IPVS: ftp: loaded support on port[0] = 21 [ 166.095741][T10240] chnl_net:caif_netlink_parms(): no params data found 10:57:39 executing program 2: [ 166.200408][T10240] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.207601][T10240] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.238422][T10240] device bridge_slave_0 entered promiscuous mode [ 166.248926][T10242] chnl_net:caif_netlink_parms(): no params data found [ 166.268727][T10240] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.276443][T10240] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.299226][T10240] device bridge_slave_1 entered promiscuous mode [ 166.336926][T10240] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 166.358836][T10240] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 166.369195][T10242] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.376730][T10242] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.384907][T10242] device bridge_slave_0 entered promiscuous mode [ 166.390334][T10246] IPVS: ftp: loaded support on port[0] = 21 [ 166.412224][T10242] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.421079][T10242] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.430061][T10242] device bridge_slave_1 entered promiscuous mode [ 166.438693][T10240] team0: Port device team_slave_0 added [ 166.447801][T10240] team0: Port device team_slave_1 added 10:57:40 executing program 3: [ 166.487343][T10242] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 10:57:40 executing program 4: [ 166.590545][T10240] device hsr_slave_0 entered promiscuous mode [ 166.658162][T10240] device hsr_slave_1 entered promiscuous mode [ 166.715478][T10242] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 166.767528][T10248] IPVS: ftp: loaded support on port[0] = 21 [ 166.782839][T10240] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.790065][T10240] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.797640][T10240] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.805560][T10240] bridge0: port 1(bridge_slave_0) entered forwarding state 10:57:40 executing program 5: [ 166.816321][T10242] team0: Port device team_slave_0 added [ 166.824095][T10242] team0: Port device team_slave_1 added [ 166.841282][T10250] IPVS: ftp: loaded support on port[0] = 21 [ 166.931337][T10242] device hsr_slave_0 entered promiscuous mode [ 166.978326][T10242] device hsr_slave_1 entered promiscuous mode [ 167.047979][T10242] debugfs: Directory 'hsr0' with parent '/' already present! [ 167.106034][T10253] IPVS: ftp: loaded support on port[0] = 21 [ 167.127569][T10246] chnl_net:caif_netlink_parms(): no params data found [ 167.135754][ T3488] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.153864][ T3488] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.221804][T10246] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.229422][T10246] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.237180][T10246] device bridge_slave_0 entered promiscuous mode [ 167.245701][T10246] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.253089][T10246] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.260993][T10246] device bridge_slave_1 entered promiscuous mode [ 167.329057][T10246] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 167.340122][T10246] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 167.377425][T10246] team0: Port device team_slave_0 added [ 167.385496][T10246] team0: Port device team_slave_1 added [ 167.398137][T10248] chnl_net:caif_netlink_parms(): no params data found [ 167.456114][T10240] 8021q: adding VLAN 0 to HW filter on device bond0 [ 167.510174][T10246] device hsr_slave_0 entered promiscuous mode [ 167.548144][T10246] device hsr_slave_1 entered promiscuous mode [ 167.608901][T10246] debugfs: Directory 'hsr0' with parent '/' already present! [ 167.626201][T10242] 8021q: adding VLAN 0 to HW filter on device bond0 [ 167.650844][T10250] chnl_net:caif_netlink_parms(): no params data found [ 167.667491][T10248] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.675433][T10248] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.683563][T10248] device bridge_slave_0 entered promiscuous mode [ 167.694341][T10248] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.701634][T10248] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.709440][T10248] device bridge_slave_1 entered promiscuous mode [ 167.722581][T10240] 8021q: adding VLAN 0 to HW filter on device team0 [ 167.732047][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 167.740205][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 167.753245][T10242] 8021q: adding VLAN 0 to HW filter on device team0 [ 167.783135][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 167.791209][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 167.821957][T10248] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 167.831950][T10250] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.839208][T10250] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.847250][T10250] device bridge_slave_0 entered promiscuous mode [ 167.856509][T10250] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.864001][T10250] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.871909][T10250] device bridge_slave_1 entered promiscuous mode [ 167.882071][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 167.890693][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.899202][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.906252][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.913955][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 167.922504][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.930922][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.938255][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.945787][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 167.954413][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.962738][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.969890][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.978501][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 168.005162][T10248] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 168.029257][T10251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 168.037959][T10251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 168.046568][T10251] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 168.055216][T10251] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.062484][T10251] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.079578][T10250] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 168.091843][T10250] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 168.113663][T10250] team0: Port device team_slave_0 added [ 168.121549][T10250] team0: Port device team_slave_1 added [ 168.127369][T10253] chnl_net:caif_netlink_parms(): no params data found [ 168.138970][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 168.154186][T10248] team0: Port device team_slave_0 added [ 168.178549][T10251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 168.187217][T10251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 168.196410][T10251] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 168.204860][T10251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 168.213500][T10251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 168.222032][T10251] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 168.230379][T10251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 168.239913][T10251] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 168.248665][T10251] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 168.256538][T10251] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 168.265164][T10248] team0: Port device team_slave_1 added [ 168.295647][ T3488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 168.304435][ T3488] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 168.350415][T10250] device hsr_slave_0 entered promiscuous mode [ 168.418212][T10250] device hsr_slave_1 entered promiscuous mode [ 168.487975][T10250] debugfs: Directory 'hsr0' with parent '/' already present! [ 168.550688][T10248] device hsr_slave_0 entered promiscuous mode [ 168.598182][T10248] device hsr_slave_1 entered promiscuous mode [ 168.647904][T10248] debugfs: Directory 'hsr0' with parent '/' already present! [ 168.656003][ T3488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 168.664303][ T3488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 168.672728][ T3488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 168.680984][ T3488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 168.689203][ T3488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 168.697366][ T3488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 168.715777][T10242] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 168.734055][T10240] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 168.747096][T10240] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 168.768975][T10251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 168.777287][T10251] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 168.800262][T10246] 8021q: adding VLAN 0 to HW filter on device bond0 [ 168.808631][T10253] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.815711][T10253] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.824164][T10253] device bridge_slave_0 entered promiscuous mode [ 168.853281][T10253] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.861936][T10253] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.869759][T10253] device bridge_slave_1 entered promiscuous mode [ 168.893806][T10242] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 168.906220][T10246] 8021q: adding VLAN 0 to HW filter on device team0 [ 168.920405][T10240] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 168.935933][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 168.944046][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 168.969922][T10248] 8021q: adding VLAN 0 to HW filter on device bond0 [ 168.986751][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 168.996917][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 169.005618][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.012713][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 169.023056][T10253] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 169.034326][T10253] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 169.061082][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 169.069514][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 169.081449][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 169.090434][ T2986] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.097514][ T2986] bridge0: port 2(bridge_slave_1) entered forwarding state [ 169.105799][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 169.114292][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 169.123076][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 169.131864][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 169.140413][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 169.148842][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 169.158305][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 169.183499][T10250] 8021q: adding VLAN 0 to HW filter on device bond0 [ 169.218595][ T3488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 10:57:43 executing program 1: [ 169.227003][ T3488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 169.247522][ T3488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 169.265021][ T3488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 10:57:43 executing program 1: [ 169.281523][T10250] 8021q: adding VLAN 0 to HW filter on device team0 [ 169.290087][T10253] team0: Port device team_slave_0 added [ 169.297646][T10246] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 169.308592][T10253] team0: Port device team_slave_1 added [ 169.327124][T10251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 10:57:43 executing program 1: [ 169.336330][T10251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 169.353661][T10248] 8021q: adding VLAN 0 to HW filter on device team0 [ 169.385173][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 10:57:43 executing program 0: 10:57:43 executing program 1: [ 169.428248][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 169.436108][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 169.456586][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 10:57:43 executing program 0: [ 169.483720][ T2986] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.490840][ T2986] bridge0: port 1(bridge_slave_0) entered forwarding state 10:57:43 executing program 1: [ 169.525823][T10246] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 169.560302][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 10:57:43 executing program 0: [ 169.568779][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 169.601865][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 169.615196][ T2986] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.622313][ T2986] bridge0: port 1(bridge_slave_0) entered forwarding state [ 169.648194][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 169.656886][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 169.672550][ T2986] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.679669][ T2986] bridge0: port 2(bridge_slave_1) entered forwarding state [ 169.690499][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 169.708512][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 169.717152][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 169.725837][ T2986] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.732941][ T2986] bridge0: port 2(bridge_slave_1) entered forwarding state [ 169.741807][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 169.799675][T10253] device hsr_slave_0 entered promiscuous mode [ 169.828211][T10253] device hsr_slave_1 entered promiscuous mode [ 169.868338][T10253] debugfs: Directory 'hsr0' with parent '/' already present! [ 169.878090][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 169.886925][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 169.896464][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 169.906759][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 169.915391][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 169.923967][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 169.937930][T10258] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 169.946571][T10258] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 169.954911][T10258] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 169.963089][T10258] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 169.994761][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 170.003072][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 170.012904][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 170.021512][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 170.033566][T10250] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 170.047474][T10248] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 170.059414][T10248] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 170.078276][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 170.086125][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 10:57:43 executing program 2: [ 170.107212][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 170.130286][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 170.150380][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 170.159987][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 170.168620][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 170.177327][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 170.206819][T10250] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 170.218977][T10248] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 170.246292][T10253] 8021q: adding VLAN 0 to HW filter on device bond0 [ 170.270958][T10253] 8021q: adding VLAN 0 to HW filter on device team0 [ 170.291699][ T3488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 170.300312][ T3488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 170.310288][ T3488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 170.318829][ T3488] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 170.327027][ T3488] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.334117][ T3488] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.342230][ T3488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 170.350869][ T3488] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 170.359236][ T3488] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.366277][ T3488] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.373919][ T3488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 170.383290][ T3488] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 170.405121][T10253] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 170.415793][T10253] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 170.429242][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 170.439044][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 170.447680][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 170.456593][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 170.465637][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 170.474146][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 170.482805][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 170.491296][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 170.499635][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 170.508067][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 170.515992][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 170.544019][T10253] 8021q: adding VLAN 0 to HW filter on device batadv0 10:57:44 executing program 3: 10:57:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000140)=""/157, 0x9d}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfffffecb, 0x0, 0x0, 0x800e00515) shutdown(r0, 0x0) r2 = socket(0x11, 0x3, 0x0) readv(r2, &(0x7f0000001800)=[{&(0x7f0000000100)=""/66, 0x42}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) shutdown(r1, 0x0) 10:57:44 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) 10:57:44 executing program 1: 10:57:44 executing program 0: 10:57:44 executing program 2: 10:57:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000080)=""/203, 0xcb}, {0x0}], 0x2}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/189, 0xbd}, {0x0}], 0x2}, 0x2) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xbf9d, 0x0, 0x0, 0x800e0053e) shutdown(r4, 0x0) shutdown(0xffffffffffffffff, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r6, &(0x7f0000001a40)=[{&(0x7f0000000000)=""/165, 0x4}, {0x0}, {0x0}, {0x0, 0x1a4}], 0x1c0) shutdown(r5, 0x0) shutdown(r3, 0x0) 10:57:44 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, 0x0) 10:57:44 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) 10:57:44 executing program 2: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x60, 0x0) 10:57:44 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:57:44 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RRENAME(r1, &(0x7f0000000140)={0x7}, 0x7) fcntl$setstatus(r1, 0x4, 0x4002) io_setup(0xc32f, &(0x7f0000000440)=0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r3, 0x0) ftruncate(r1, 0x48280) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) [ 171.100137][T10346] IPVS: ftp: loaded support on port[0] = 21 10:57:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f000059dffc), &(0x7f0000000100)=0x4) [ 171.382837][T10346] IPVS: ftp: loaded support on port[0] = 21 10:57:45 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x11, 0x1a002000000}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 10:57:45 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="d3d7b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYRESHEX, @ANYPTR64, @ANYRESOCT, @ANYRESHEX, @ANYBLOB="e6c55c5d9eb82ee4510100010029a741efca44f937d0492482ba837296d961244e2e0c734057548c402cc43b3897cc275fd87f333c960d2bc40dd887fc8dc4872bf5b65c87e940b30eecd4afe67ba454a235f07b6d284fefacb272ce561e71bf939d833ebce2f51adac109dca960", @ANYRESHEX], 0x0, 0xc3}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:57:45 executing program 1: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x2000000, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') 10:57:45 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) poll(&(0x7f0000000000)=[{}, {r0}, {r0}], 0x3, 0x4e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup2(r1, r2) nanosleep(&(0x7f0000000840)={0x9}, &(0x7f0000000880)) shutdown(r3, 0x0) 10:57:45 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x4, 0x0, 0x0) socketpair(0x1d, 0x3, 0x1, &(0x7f00000000c0)={0x0, 0x0}) sendmsg(0xffffffffffffffff, 0x0, 0x0) [ 171.634725][T10372] ptrace attach of "/root/syz-executor.2"[10370] was attempted by "/root/syz-executor.2"[10372] 10:57:45 executing program 3: r0 = socket(0x3, 0xf, 0x0) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) accept$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000017c0)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001800)={@mcast2, 0xffffffff, r1}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000240)=ANY=[], 0x0) unshare(0x60000000) syz_genetlink_get_family_id$ipvs(0x0) socket$can_bcm(0x1d, 0x2, 0x2) syz_genetlink_get_family_id$ipvs(0x0) socket(0x0, 0xfffffffffffffffd, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="0000041b0000f100000a0000ee"], 0x1}}, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x13, &(0x7f0000000100)=0x8000, 0x4) r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r2, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) socket$inet6(0xa, 0x0, 0x0) 10:57:45 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x9d4f9895844931c2) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x11, &(0x7f0000001740)=r0, 0x8) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) 10:57:45 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f0000000600)="f4001100002b3c25", 0x8}], 0x1}, 0x0) 10:57:45 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) write$cgroup_int(r2, &(0x7f0000000000), 0x7) 10:57:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000140)=""/157, 0x9d}, {0x0}], 0x100000000000020e}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfffffecb, 0x0, 0x0, 0x800e00515) shutdown(r0, 0x0) dup(0xffffffffffffffff) shutdown(0xffffffffffffffff, 0x0) r2 = socket(0x11, 0x3, 0x0) readv(r2, &(0x7f0000001800)=[{&(0x7f0000000100)=""/66, 0x42}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) shutdown(r1, 0x0) 10:57:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000080)=""/203, 0xcb}], 0x1}, 0x2) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000140)=""/160, 0xa0}, {0x0}, {0x0}, {0x0}], 0x4}, 0x42) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xffffff97, 0x0, 0x0, 0x800e00547) shutdown(r4, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r6, &(0x7f0000000340)=[{&(0x7f0000000080)=""/47, 0x2f}], 0x1) r7 = dup(r6) r8 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r8, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r7, 0x0) r9 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r9, &(0x7f0000001800)=[{&(0x7f00000000c0)=""/112, 0x70}, {0x0}], 0x2) shutdown(r8, 0x0) shutdown(r5, 0x0) shutdown(r3, 0x0) 10:57:45 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@random="152e4651b9f4", @empty, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @empty, @remote={0xac, 0x14, 0x0}, @local, @remote={0xac, 0x14, 0x0}}}}}, 0x0) 10:57:45 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@random="152e4651b9f4", @empty, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @empty, @remote={0xac, 0x14, 0x0}, @local, @remote={0xac, 0x14, 0x0}}}}}, 0x0) 10:57:45 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@random="152e4651b9f4", @empty, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @empty, @remote={0xac, 0x14, 0x0}, @local, @remote={0xac, 0x14, 0x0}}}}}, 0x0) 10:57:45 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@random="152e4651b9f4", @empty, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @empty, @remote={0xac, 0x14, 0x0}, @local, @remote={0xac, 0x14, 0x0}}}}}, 0x0) 10:57:46 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000001400)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000080)={0x8, 0x4, 0x2}) 10:57:46 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x4, 0x0, 0x0) socketpair(0x1d, 0x3, 0x1, &(0x7f00000000c0)={0x0, 0x0}) sendmsg(0xffffffffffffffff, 0x0, 0x0) 10:57:46 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendmsg$inet_sctp(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="805943663247b92af01b35c919ac185d1618a19c7788afea37f3179ffaa39e45ab2f53af98be3bf139428684e437ef689924827e2e1a97e8befdda12a3450711d92e6e6fe1ffd6c5f8260715b1184e3f4d3d0c9748561658281696164d22c73a68b78e25fb23307e880a7c50bbd3508b8fe92e2643e06c333a6e9d6cdc44a4a5ccfab2a98e55652450564dfe4d550708", 0x90}], 0x1}, 0xc000) sendmmsg$alg(r2, &(0x7f00000070c0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x118, 0x0) recvmmsg(r1, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}], 0x1}}], 0x10, 0x0, 0x0) 10:57:46 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000001400)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000080)={0x8, 0x4, 0x2}) 10:57:46 executing program 3: r0 = socket(0x3, 0xf, 0x0) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) accept$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000017c0)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001800)={@mcast2, 0xffffffff, r1}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000240)=ANY=[], 0x0) unshare(0x60000000) syz_genetlink_get_family_id$ipvs(0x0) socket$can_bcm(0x1d, 0x2, 0x2) syz_genetlink_get_family_id$ipvs(0x0) socket(0x0, 0xfffffffffffffffd, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="0000041b0000f100000a0000ee"], 0x1}}, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x13, &(0x7f0000000100)=0x8000, 0x4) r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r2, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) socket$inet6(0xa, 0x0, 0x0) 10:57:46 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) 10:57:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendmmsg$alg(r2, &(0x7f00000070c0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x118, 0x0) recvmmsg(r1, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}], 0x1}}], 0x10, 0x0, 0x0) 10:57:46 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) 10:57:46 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000001400)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000080)={0x8, 0x4, 0x2}) 10:57:46 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) 10:57:46 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000001400)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000080)={0x8, 0x4, 0x2}) 10:57:46 executing program 4: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="d3d7b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYRESHEX, @ANYRESHEX, @ANYBLOB="e6c55c5d9eb82ee4510100010029a741efca44f937d0492482ba837296d961244e2e0c734057548c402cc43b3897cc275fd87f333c960d2bc40dd887fc8dc4872bf5b65c87e940b30eecd4afe67ba454a235f07b6d284fefacb272ce561e71bf939d833ebce2f51adac109dca96079322300000080"], 0x0, 0x99}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:57:46 executing program 0: ioctl$VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, &(0x7f0000000080)={0x8, 0x4, 0x2}) 10:57:47 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x4, 0x0, 0x0) socketpair(0x1d, 0x3, 0x1, &(0x7f00000000c0)={0x0, 0x0}) sendmsg(0xffffffffffffffff, 0x0, 0x0) 10:57:47 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lookup_dcookie(0x0, 0x0, 0x0) 10:57:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendmmsg$alg(r2, &(0x7f00000070c0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x118, 0x0) recvmmsg(r1, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}], 0x1}}], 0x10, 0x0, 0x0) 10:57:47 executing program 3: r0 = socket(0x3, 0xf, 0x0) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) accept$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000017c0)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001800)={@mcast2, 0xffffffff, r1}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000240)=ANY=[], 0x0) unshare(0x60000000) syz_genetlink_get_family_id$ipvs(0x0) socket$can_bcm(0x1d, 0x2, 0x2) syz_genetlink_get_family_id$ipvs(0x0) socket(0x0, 0xfffffffffffffffd, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="0000041b0000f100000a0000ee"], 0x1}}, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x13, &(0x7f0000000100)=0x8000, 0x4) r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r2, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) socket$inet6(0xa, 0x0, 0x0) 10:57:47 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0xffffc, 0x0) 10:57:47 executing program 0: ioctl$VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, &(0x7f0000000080)={0x8, 0x4, 0x2}) 10:57:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='loginuid\x00') write$P9_RLCREATE(r1, 0x0, 0x0) 10:57:47 executing program 0: ioctl$VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, &(0x7f0000000080)={0x8, 0x4, 0x2}) [ 174.093848][T10531] IPVS: ftp: loaded support on port[0] = 21 10:57:47 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x4, 0x0, 0x0) socketpair(0x1d, 0x3, 0x1, &(0x7f00000000c0)={0x0, 0x0}) sendmsg(0xffffffffffffffff, 0x0, 0x0) 10:57:48 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lookup_dcookie(0x0, 0x0, 0x0) 10:57:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='loginuid\x00') write$P9_RLCREATE(r1, 0x0, 0x0) 10:57:48 executing program 0: r0 = syz_open_dev$vbi(0x0, 0x2, 0x2) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000080)={0x8, 0x4, 0x2}) 10:57:48 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='loginuid\x00') sendfile(r0, r0, 0x0, 0x36e5) 10:57:48 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="d3d7b13c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYRESHEX, @ANYRESHEX, @ANYBLOB="e6c55c5d9eb82ee4510100010029a741efca44f937d0492482ba837296d961244e2e0c734057548c402cc43b3897cc275fd87f333c960d2bc40dd887fc8dc4872bf5b65c87e940b30eecd4afe67ba454a235f0"], 0x0, 0x77}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:57:48 executing program 5: 10:57:48 executing program 3: r0 = socket(0x3, 0xf, 0x0) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) accept$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000017c0)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001800)={@mcast2, 0xffffffff, r1}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000240)=ANY=[], 0x0) unshare(0x60000000) syz_genetlink_get_family_id$ipvs(0x0) socket$can_bcm(0x1d, 0x2, 0x2) syz_genetlink_get_family_id$ipvs(0x0) socket(0x0, 0xfffffffffffffffd, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="0000041b0000f100000a0000ee"], 0x1}}, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x13, &(0x7f0000000100)=0x8000, 0x4) r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r2, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) socket$inet6(0xa, 0x0, 0x0) 10:57:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='loginuid\x00') write$P9_RLCREATE(r1, 0x0, 0x0) [ 174.471163][T10566] ptrace attach of "/root/syz-executor.2"[10565] was attempted by "/root/syz-executor.2"[10566] 10:57:48 executing program 2: 10:57:48 executing program 0: r0 = syz_open_dev$vbi(0x0, 0x2, 0x2) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000080)={0x8, 0x4, 0x2}) 10:57:48 executing program 4: 10:57:48 executing program 5: [ 174.551942][T10570] IPVS: ftp: loaded support on port[0] = 21 10:57:48 executing program 4: 10:57:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='loginuid\x00') write$P9_RLCREATE(r1, 0x0, 0x0) 10:57:48 executing program 2: 10:57:48 executing program 0: r0 = syz_open_dev$vbi(0x0, 0x2, 0x2) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000080)={0x8, 0x4, 0x2}) 10:57:48 executing program 5: 10:57:48 executing program 4: 10:57:49 executing program 3: 10:57:49 executing program 2: 10:57:49 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) 10:57:49 executing program 5: 10:57:49 executing program 4: 10:57:49 executing program 0: syz_open_dev$vbi(&(0x7f0000001400)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, &(0x7f0000000080)={0x8, 0x4, 0x2}) 10:57:49 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_SCRNMAP(r0, 0x4b41, 0x0) 10:57:49 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_buf(r0, 0x0, 0x0, 0x0, 0x0) 10:57:49 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000280)='/dev/snd/controlC#\x00', 0x840, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f0000000040)=0x9d) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7b77519a, 0x0) 10:57:49 executing program 0: syz_open_dev$vbi(&(0x7f0000001400)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, &(0x7f0000000080)={0x8, 0x4, 0x2}) 10:57:49 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) 10:57:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x0, 0x0, 0xc0000103], [0xc1]}) 10:57:49 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000280)='/dev/snd/controlC#\x00', 0x840, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f0000000040)=0x9d) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7b77519a, 0x0) 10:57:49 executing program 0: syz_open_dev$vbi(&(0x7f0000001400)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, &(0x7f0000000080)={0x8, 0x4, 0x2}) 10:57:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000240)=0xff) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xa6, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000280)=""/4096, 0x1000, 0x12000, &(0x7f0000000080)={0xa, 0x4e23, 0x400, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) ioctl$DRM_IOCTL_SG_ALLOC(r2, 0xc0106438, 0x0) syz_open_dev$usbmon(0x0, 0xfffffffffffffffd, 0x408000) 10:57:49 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) [ 175.977719][T10640] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 10:57:49 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000280)='/dev/snd/controlC#\x00', 0x840, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f0000000040)=0x9d) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7b77519a, 0x0) [ 176.084249][ C0] hrtimer: interrupt took 25907 ns 10:57:49 executing program 3: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x80000802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000b00)='./file0\x00', 0x8000200000000000) r3 = dup3(0xffffffffffffffff, r2, 0x0) mknod$loop(&(0x7f00000002c0)='./bus\x00', 0x2850, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000880)=0x2, 0x4) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000700)='rpc_pipefs\x00', 0x400000001, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, &(0x7f0000000200)) ioctl$UI_BEGIN_FF_UPLOAD(r3, 0xc06855c8, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000740)={0x0, 0x81, 0x2, 0x3, 0xfffffffffffffeff, 0x5, 0x0, 0x5, {0x0, @in6={{0xa, 0x4e20, 0x2, @rand_addr="e6fb0912c4501462563181538de2d24d", 0x9a}}, 0x2, 0x7, 0xde, 0x1, 0x3}}, &(0x7f0000000200)=0xb0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000300)={r4}, 0x8) r5 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0xfffffffffffffff7, 0x10000) stat(0x0, &(0x7f0000000e40)) getresuid(&(0x7f00000004c0), &(0x7f0000000480), &(0x7f0000000640)) sendmsg(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0xa7}, 0x4) ioctl$sock_ifreq(r3, 0x8934, &(0x7f0000000a00)={'nr0\x00', @ifru_map={0x9, 0x6, 0xd3, 0x2, 0x1ff, 0x3}}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r5, 0x84, 0x65, &(0x7f0000000380)=[@in={0x2, 0x4e24, @empty}, @in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xb}, 0x5}, @in={0x2, 0x4e21, @multicast2}, @in6={0xa, 0x4e22, 0xffffffffffffabf5, @ipv4={[], [], @remote}, 0x9f5}, @in6={0xa, 0x4e24, 0x8, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1}, @in6={0xa, 0x4e20, 0x5, @mcast2}, @in6={0xa, 0x4e23, 0x7f, @mcast2, 0x3}], 0xbc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000540)={0x90, 0x0, 0x0, {0x2}}, 0x90) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) [ 176.115773][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:57:50 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000001400)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, 0x0) 10:57:50 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='loginuid\x00') write$P9_RLCREATE(r0, 0x0, 0x0) 10:57:50 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000280)='/dev/snd/controlC#\x00', 0x840, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f0000000040)=0x9d) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7b77519a, 0x0) 10:57:50 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000001400)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, 0x0) 10:57:50 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x2000000, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) 10:57:50 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='loginuid\x00') write$P9_RLCREATE(r0, 0x0, 0x0) 10:57:50 executing program 3: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x80000802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000b00)='./file0\x00', 0x8000200000000000) r3 = dup3(0xffffffffffffffff, r2, 0x0) mknod$loop(&(0x7f00000002c0)='./bus\x00', 0x2850, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000880)=0x2, 0x4) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000700)='rpc_pipefs\x00', 0x400000001, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, &(0x7f0000000200)) ioctl$UI_BEGIN_FF_UPLOAD(r3, 0xc06855c8, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000740)={0x0, 0x81, 0x2, 0x3, 0xfffffffffffffeff, 0x5, 0x0, 0x5, {0x0, @in6={{0xa, 0x4e20, 0x2, @rand_addr="e6fb0912c4501462563181538de2d24d", 0x9a}}, 0x2, 0x7, 0xde, 0x1, 0x3}}, &(0x7f0000000200)=0xb0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000300)={r4}, 0x8) r5 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0xfffffffffffffff7, 0x10000) stat(0x0, &(0x7f0000000e40)) getresuid(&(0x7f00000004c0), &(0x7f0000000480), &(0x7f0000000640)) sendmsg(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0xa7}, 0x4) ioctl$sock_ifreq(r3, 0x8934, &(0x7f0000000a00)={'nr0\x00', @ifru_map={0x9, 0x6, 0xd3, 0x2, 0x1ff, 0x3}}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r5, 0x84, 0x65, &(0x7f0000000380)=[@in={0x2, 0x4e24, @empty}, @in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xb}, 0x5}, @in={0x2, 0x4e21, @multicast2}, @in6={0xa, 0x4e22, 0xffffffffffffabf5, @ipv4={[], [], @remote}, 0x9f5}, @in6={0xa, 0x4e24, 0x8, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1}, @in6={0xa, 0x4e20, 0x5, @mcast2}, @in6={0xa, 0x4e23, 0x7f, @mcast2, 0x3}], 0xbc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000540)={0x90, 0x0, 0x0, {0x2}}, 0x90) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 10:57:50 executing program 4: syz_open_dev$sndctrl(&(0x7f0000000280)='/dev/snd/controlC#\x00', 0x840, 0x0) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7b77519a, 0x0) 10:57:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000240)=0xff) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xa6, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000280)=""/4096, 0x1000, 0x12000, &(0x7f0000000080)={0xa, 0x4e23, 0x400, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) ioctl$DRM_IOCTL_SG_ALLOC(r2, 0xc0106438, 0x0) syz_open_dev$usbmon(0x0, 0xfffffffffffffffd, 0x408000) 10:57:50 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000001400)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, 0x0) 10:57:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000240)=0xff) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xa6, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000280)=""/4096, 0x1000, 0x12000, &(0x7f0000000080)={0xa, 0x4e23, 0x400, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) ioctl$DRM_IOCTL_SG_ALLOC(r2, 0xc0106438, 0x0) syz_open_dev$usbmon(0x0, 0xfffffffffffffffd, 0x408000) 10:57:50 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='loginuid\x00') write$P9_RLCREATE(r0, 0x0, 0x0) 10:57:50 executing program 4: syz_open_dev$sndctrl(&(0x7f0000000280)='/dev/snd/controlC#\x00', 0x840, 0x0) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7b77519a, 0x0) 10:57:50 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000001400)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000080)={0x0, 0x4, 0x2}) [ 176.858156][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:57:50 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='loginuid\x00') write$P9_RLCREATE(r0, 0x0, 0x0) 10:57:50 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000001400)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000080)={0x0, 0x4, 0x2}) [ 176.937442][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:57:50 executing program 4: syz_open_dev$sndctrl(&(0x7f0000000280)='/dev/snd/controlC#\x00', 0x840, 0x0) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7b77519a, 0x0) 10:57:50 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000001400)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000080)={0x0, 0x4, 0x2}) 10:57:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000240)=0xff) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xa6, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000280)=""/4096, 0x1000, 0x12000, &(0x7f0000000080)={0xa, 0x4e23, 0x400, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) ioctl$DRM_IOCTL_SG_ALLOC(r2, 0xc0106438, 0x0) syz_open_dev$usbmon(0x0, 0xfffffffffffffffd, 0x408000) 10:57:51 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='loginuid\x00') write$P9_RLCREATE(r0, 0x0, 0x0) [ 177.527474][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 177.617144][T10705] kasan: CONFIG_KASAN_INLINE enabled [ 177.632448][T10705] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 177.645616][T10707] kasan: CONFIG_KASAN_INLINE enabled [ 177.654687][T10705] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 177.661646][T10705] CPU: 1 PID: 10705 Comm: syz-executor.5 Not tainted 5.3.0-rc2-next-20190805 #59 [ 177.667309][T10707] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 177.670747][T10705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.670773][T10705] RIP: 0010:tls_trim_both_msgs+0x54/0x130 [ 177.670788][T10705] Code: 48 c1 ea 03 80 3c 02 00 0f 85 e3 00 00 00 4d 8b b5 b0 06 00 00 48 b8 00 00 00 00 00 fc ff df 49 8d 7e 28 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 b3 00 00 00 48 b8 00 00 00 00 00 fc ff df 49 8b [ 177.670804][T10705] RSP: 0018:ffff88805ae4fac0 EFLAGS: 00010206 [ 177.720271][T10705] RAX: dffffc0000000000 RBX: ffff8880599a6280 RCX: ffffc900109ce000 [ 177.728237][T10705] RDX: 0000000000000005 RSI: ffffffff862e5d26 RDI: 0000000000000028 [ 177.736206][T10705] RBP: ffff88805ae4fae0 R08: ffff88805ae400c0 R09: ffffed1012938d49 [ 177.744172][T10705] R10: ffffed1012938d48 R11: ffff8880949c6a43 R12: 0000000000000000 [ 177.752140][T10705] R13: ffff888062a5a040 R14: 0000000000000000 R15: 00000000ffffffe0 [ 177.760113][T10705] FS: 00007fb68df30700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 177.769038][T10705] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 177.775622][T10705] CR2: 0000001b2c136000 CR3: 000000008e84f000 CR4: 00000000001406e0 [ 177.783590][T10705] Call Trace: [ 177.786884][T10705] tls_sw_sendmsg+0xe38/0x17b0 [ 177.791661][T10705] ? tx_work_handler+0x180/0x180 [ 177.796596][T10705] ? retint_kernel+0x2b/0x2b [ 177.801194][T10705] inet6_sendmsg+0x9e/0xe0 [ 177.805611][T10705] ? inet6_ioctl+0x1c0/0x1c0 [ 177.810200][T10705] sock_sendmsg+0xd7/0x130 [ 177.814614][T10705] __sys_sendto+0x262/0x380 [ 177.819112][T10705] ? __ia32_sys_getpeername+0xb0/0xb0 [ 177.824477][T10705] ? retint_kernel+0x2b/0x2b [ 177.829075][T10705] ? put_timespec64+0xc1/0x140 [ 177.833844][T10705] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 177.840077][T10705] ? put_timespec64+0xda/0x140 [ 177.844834][T10705] ? nsecs_to_jiffies+0x30/0x30 [ 177.849684][T10705] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 177.855920][T10705] ? __x64_sys_clock_gettime+0x16d/0x240 [ 177.861556][T10705] __x64_sys_sendto+0xe1/0x1a0 [ 177.866324][T10705] do_syscall_64+0xfa/0x760 [ 177.870828][T10705] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 177.876712][T10705] RIP: 0033:0x459829 [ 177.880601][T10705] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 177.900206][T10705] RSP: 002b:00007fb68df2fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 177.908614][T10705] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000459829 [ 177.916576][T10705] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000004 [ 177.924543][T10705] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 177.932512][T10705] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb68df306d4 [ 177.940479][T10705] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 00000000ffffffff [ 177.948464][T10705] Modules linked in: [ 177.952374][T10707] general protection fault: 0000 [#2] PREEMPT SMP KASAN [ 177.959340][T10707] CPU: 0 PID: 10707 Comm: syz-executor.2 Tainted: G D 5.3.0-rc2-next-20190805 #59 [ 177.971314][T10707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.981390][T10707] RIP: 0010:tls_trim_both_msgs+0x54/0x130 [ 177.987121][T10707] Code: 48 c1 ea 03 80 3c 02 00 0f 85 e3 00 00 00 4d 8b b5 b0 06 00 00 48 b8 00 00 00 00 00 fc ff df 49 8d 7e 28 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 b3 00 00 00 48 b8 00 00 00 00 00 fc ff df 49 8b [ 178.006730][T10707] RSP: 0018:ffff88805af2fac0 EFLAGS: 00010206 [ 178.012794][T10707] RAX: dffffc0000000000 RBX: ffff888059a00a00 RCX: ffffc9000a377000 [ 178.020764][T10707] RDX: 0000000000000005 RSI: ffffffff862e5d26 RDI: 0000000000000028 [ 178.028737][T10707] RBP: ffff88805af2fae0 R08: ffff8880a9562340 R09: ffffed1012938219 [ 178.036716][T10707] R10: ffffed1012938218 R11: ffff8880949c10c3 R12: 0000000000000000 [ 178.044689][T10707] R13: ffff88806206cc80 R14: 0000000000000000 R15: 00000000ffffffe0 [ 178.052667][T10707] FS: 00007f5a76d03700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 178.061616][T10707] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 178.068194][T10707] CR2: 00007f02860eadb8 CR3: 000000008f194000 CR4: 00000000001406f0 [ 178.076765][T10707] Call Trace: [ 178.080057][T10707] tls_sw_sendmsg+0xe38/0x17b0 [ 178.084845][T10707] ? tx_work_handler+0x180/0x180 [ 178.089778][T10707] ? retint_kernel+0x2b/0x2b [ 178.094367][T10707] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 178.099907][T10707] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 178.106143][T10707] inet6_sendmsg+0x9e/0xe0 [ 178.110557][T10707] ? inet6_ioctl+0x1c0/0x1c0 [ 178.115142][T10707] sock_sendmsg+0xd7/0x130 [ 178.119561][T10707] __sys_sendto+0x262/0x380 [ 178.124060][T10707] ? __ia32_sys_getpeername+0xb0/0xb0 [ 178.129436][T10707] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 178.135665][T10707] ? put_timespec64+0xda/0x140 [ 178.140443][T10707] ? nsecs_to_jiffies+0x30/0x30 [ 178.145291][T10707] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 178.151523][T10707] ? __x64_sys_clock_gettime+0x16d/0x240 [ 178.157156][T10707] __x64_sys_sendto+0xe1/0x1a0 [ 178.161917][T10707] do_syscall_64+0xfa/0x760 [ 178.166422][T10707] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 178.172305][T10707] RIP: 0033:0x459829 [ 178.176194][T10707] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 178.195791][T10707] RSP: 002b:00007f5a76d02c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 178.204192][T10707] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000459829 [ 178.212156][T10707] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000004 [ 178.220119][T10707] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 178.228082][T10707] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5a76d036d4 [ 178.236040][T10707] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 00000000ffffffff [ 178.244009][T10707] Modules linked in: [ 178.272762][T10705] ---[ end trace 79cf0f49e96ed570 ]--- [ 178.278523][T10705] RIP: 0010:tls_trim_both_msgs+0x54/0x130 [ 178.284345][T10705] Code: 48 c1 ea 03 80 3c 02 00 0f 85 e3 00 00 00 4d 8b b5 b0 06 00 00 48 b8 00 00 00 00 00 fc ff df 49 8d 7e 28 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 b3 00 00 00 48 b8 00 00 00 00 00 fc ff df 49 8b [ 178.304626][T10705] RSP: 0018:ffff88805ae4fac0 EFLAGS: 00010206 [ 178.313016][T10705] RAX: dffffc0000000000 RBX: ffff8880599a6280 RCX: ffffc900109ce000 [ 178.321384][T10705] RDX: 0000000000000005 RSI: ffffffff862e5d26 RDI: 0000000000000028 [ 178.329673][T10705] RBP: ffff88805ae4fae0 R08: ffff88805ae400c0 R09: ffffed1012938d49 [ 178.337745][T10705] R10: ffffed1012938d48 R11: ffff8880949c6a43 R12: 0000000000000000 [ 178.344186][T10707] ---[ end trace 79cf0f49e96ed571 ]--- [ 178.346253][T10705] R13: ffff888062a5a040 R14: 0000000000000000 R15: 00000000ffffffe0 [ 178.353778][T10707] RIP: 0010:tls_trim_both_msgs+0x54/0x130 [ 178.365006][T10707] Code: 48 c1 ea 03 80 3c 02 00 0f 85 e3 00 00 00 4d 8b b5 b0 06 00 00 48 b8 00 00 00 00 00 fc ff df 49 8d 7e 28 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 b3 00 00 00 48 b8 00 00 00 00 00 fc ff df 49 8b [ 178.384499][T10705] FS: 00007fb68df30700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 178.387184][T10707] RSP: 0018:ffff88805ae4fac0 EFLAGS: 00010206 [ 178.402263][T10707] RAX: dffffc0000000000 RBX: ffff8880599a6280 RCX: ffffc900109ce000 [ 178.410304][T10707] RDX: 0000000000000005 RSI: ffffffff862e5d26 RDI: 0000000000000028 [ 178.417906][T10705] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 178.420903][T10707] RBP: ffff88805ae4fae0 R08: ffff88805ae400c0 R09: ffffed1012938d49 [ 178.429487][T10705] CR2: 0000001b2c333000 CR3: 000000008e84f000 CR4: 00000000001406e0 [ 178.433224][T10738] kasan: CONFIG_KASAN_INLINE enabled [ 178.449067][T10738] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 178.453258][T10705] Kernel panic - not syncing: Fatal exception [ 178.457137][T10738] general protection fault: 0000 [#3] PREEMPT SMP KASAN [ 178.470099][T10738] CPU: 0 PID: 10738 Comm: syz-executor.3 Tainted: G D 5.3.0-rc2-next-20190805 #59 [ 178.480581][T10738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.490641][T10738] RIP: 0010:tls_trim_both_msgs+0x54/0x130 [ 178.496350][T10738] Code: 48 c1 ea 03 80 3c 02 00 0f 85 e3 00 00 00 4d 8b b5 b0 06 00 00 48 b8 00 00 00 00 00 fc ff df 49 8d 7e 28 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 b3 00 00 00 48 b8 00 00 00 00 00 fc ff df 49 8b [ 178.515969][T10738] RSP: 0018:ffff8880599dfac0 EFLAGS: 00010206 [ 178.522037][T10738] RAX: dffffc0000000000 RBX: ffff88809edbb280 RCX: ffffc9000c594000 [ 178.530008][T10738] RDX: 0000000000000005 RSI: ffffffff862e5d26 RDI: 0000000000000028 [ 178.537981][T10738] RBP: ffff8880599dfae0 R08: ffff8880599d2540 R09: ffffed101248d559 [ 178.545954][T10738] R10: ffffed101248d558 R11: ffff88809246aac3 R12: 0000000000000000 [ 178.553922][T10738] R13: ffff8880607c8080 R14: 0000000000000000 R15: 00000000ffffffe0 [ 178.561894][T10738] FS: 00007f028612d700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 178.570816][T10738] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 178.577396][T10738] CR2: 0000000000000000 CR3: 000000009c602000 CR4: 00000000001406f0 [ 178.585364][T10738] Call Trace: [ 178.588668][T10738] tls_sw_sendmsg+0xe38/0x17b0 [ 178.593446][T10738] ? tx_work_handler+0x180/0x180 [ 178.598383][T10738] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 178.603932][T10738] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 178.610177][T10738] inet6_sendmsg+0x9e/0xe0 [ 178.614595][T10738] ? inet6_ioctl+0x1c0/0x1c0 [ 178.619187][T10738] sock_sendmsg+0xd7/0x130 [ 178.623607][T10738] __sys_sendto+0x262/0x380 [ 178.628119][T10738] ? __ia32_sys_getpeername+0xb0/0xb0 [ 178.633499][T10738] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 178.639740][T10738] ? put_timespec64+0xda/0x140 [ 178.644501][T10738] ? nsecs_to_jiffies+0x30/0x30 [ 178.649355][T10738] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 178.655599][T10738] ? __x64_sys_clock_gettime+0x16d/0x240 [ 178.661235][T10738] __x64_sys_sendto+0xe1/0x1a0 [ 178.666008][T10738] do_syscall_64+0xfa/0x760 [ 178.670510][T10738] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 178.676399][T10738] RIP: 0033:0x459829 [ 178.680287][T10738] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 178.699976][T10738] RSP: 002b:00007f028612cc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 178.708389][T10738] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000459829 [ 178.716366][T10738] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000004 [ 178.724338][T10738] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 178.732308][T10738] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f028612d6d4 [ 178.740279][T10738] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 00000000ffffffff [ 178.748255][T10738] Modules linked in: [ 178.753190][T10705] Kernel Offset: disabled [ 178.757531][T10705] Rebooting in 86400 seconds..