[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 78.655235][ T31] audit: type=1800 audit(1568466004.747:25): pid=11457 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 78.678391][ T31] audit: type=1800 audit(1568466004.767:26): pid=11457 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 78.714320][ T31] audit: type=1800 audit(1568466004.787:27): pid=11457 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.24' (ECDSA) to the list of known hosts. 2019/09/14 13:00:18 fuzzer started syzkaller login: [ 95.248425][T11617] as (11617) used greatest stack depth: 52600 bytes left 2019/09/14 13:00:22 dialing manager at 10.128.0.26:39015 2019/09/14 13:00:23 syscalls: 2376 2019/09/14 13:00:23 code coverage: enabled 2019/09/14 13:00:23 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/09/14 13:00:23 extra coverage: enabled 2019/09/14 13:00:23 setuid sandbox: enabled 2019/09/14 13:00:23 namespace sandbox: enabled 2019/09/14 13:00:23 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/14 13:00:23 fault injection: enabled 2019/09/14 13:00:23 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/14 13:00:23 net packet injection: enabled 2019/09/14 13:00:23 net device setup: enabled 13:02:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 252.462006][T11624] IPVS: ftp: loaded support on port[0] = 21 [ 252.604063][T11624] chnl_net:caif_netlink_parms(): no params data found [ 252.659174][T11624] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.666451][T11624] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.675200][T11624] device bridge_slave_0 entered promiscuous mode [ 252.685134][T11624] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.692417][T11624] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.701358][T11624] device bridge_slave_1 entered promiscuous mode [ 252.733643][T11624] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 252.746306][T11624] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 252.778039][T11624] team0: Port device team_slave_0 added [ 252.787379][T11624] team0: Port device team_slave_1 added [ 252.889024][T11624] device hsr_slave_0 entered promiscuous mode [ 253.015291][T11624] device hsr_slave_1 entered promiscuous mode [ 253.194295][T11624] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.201514][T11624] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.209343][T11624] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.216640][T11624] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.297059][T11624] 8021q: adding VLAN 0 to HW filter on device bond0 [ 253.318432][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 253.329505][ T4114] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.340193][ T4114] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.351868][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 253.373085][T11624] 8021q: adding VLAN 0 to HW filter on device team0 [ 253.391070][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 253.400770][ T4114] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.408905][ T4114] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.468290][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.477703][ T4114] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.484945][ T4114] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.495207][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 253.505534][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 253.515184][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 253.524738][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 253.537233][T11624] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 253.571159][T11624] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 253.611055][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 13:02:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x3d, 0x0) writev(r1, &(0x7f0000000940)=[{0x0}, {&(0x7f0000000580)='5', 0x1}], 0x2) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) 13:02:59 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x60240) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r2 = getpgrp(r1) fcntl$setownex(r0, 0xf, &(0x7f00000003c0)={0x0, r2}) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x9) r4 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup(r3) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000380)) syz_open_procfs(0x0, &(0x7f0000000140)='status\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfa\x81\x00\x00\x00\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7.\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r6 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r7 = dup2(r6, r5) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r7, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) fdatasync(r7) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0x10000f48b, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r5, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) fstatfs(r4, &(0x7f0000004200)=""/4096) 13:03:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) getrlimit(0x0, &(0x7f0000000180)) [ 257.151961][T11643] IPVS: ftp: loaded support on port[0] = 21 [ 257.415137][T11643] chnl_net:caif_netlink_parms(): no params data found [ 257.503198][T11643] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.510552][T11643] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.519267][T11643] device bridge_slave_0 entered promiscuous mode [ 257.565198][T11643] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.572400][T11643] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.581177][T11643] device bridge_slave_1 entered promiscuous mode [ 257.660886][T11643] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 257.688034][T11643] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 257.758746][T11643] team0: Port device team_slave_0 added [ 257.779448][T11643] team0: Port device team_slave_1 added [ 262.481707][T11646] IPVS: ftp: loaded support on port[0] = 21 13:03:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = epoll_create(0x3) epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, 0x0, 0x0) [ 265.884060][ C0] clocksource: timekeeping watchdog on CPU0: Marking clocksource 'tsc' as unstable because the skew is too large: [ 265.896384][ C0] clocksource: 'acpi_pm' wd_now: 8f2049 wd_last: 6423e mask: ffffff [ 265.906451][ C0] clocksource: 'tsc' cs_now: 9374a498c1 cs_last: 8d182c4dd4 mask: ffffffffffffffff [ 265.917779][ C0] tsc: Marking TSC unstable due to clocksource watchdog [ 265.949457][ T12] TSC found unstable after boot, most likely due to broken BIOS. Use 'tsc=unstable'. [ 265.959071][ T12] sched_clock: Marking unstable (266045328134, -95898954)<-(265954662630, -5232878) [ 265.992711][T11643] device hsr_slave_0 entered promiscuous mode [ 266.000052][T11647] clocksource: Switched to clocksource acpi_pm [ 266.036207][T11643] device hsr_slave_1 entered promiscuous mode [ 266.075354][T11643] debugfs: Directory 'hsr0' with parent '/' already present! 13:03:12 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x60240) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r2 = getpgrp(r1) fcntl$setownex(r0, 0xf, &(0x7f00000003c0)={0x0, r2}) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x9) r4 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup(r3) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000380)) syz_open_procfs(0x0, &(0x7f0000000140)='status\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfa\x81\x00\x00\x00\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7.\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r6 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r7 = dup2(r6, r5) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r7, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) fdatasync(r7) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0x10000f48b, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r5, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) fstatfs(r4, &(0x7f0000004200)=""/4096) [ 266.342263][T11643] 8021q: adding VLAN 0 to HW filter on device bond0 [ 266.380472][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 266.389078][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 266.402958][T11643] 8021q: adding VLAN 0 to HW filter on device team0 [ 266.465430][T11646] chnl_net:caif_netlink_parms(): no params data found [ 266.560812][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 266.570444][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 266.579611][ T30] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.586857][ T30] bridge0: port 1(bridge_slave_0) entered forwarding state [ 266.646698][T11646] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.653969][T11646] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.662836][T11646] device bridge_slave_0 entered promiscuous mode [ 266.690741][T11643] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 266.701268][T11643] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 266.735932][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 266.744992][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 266.754478][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 266.763616][ T30] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.770877][ T30] bridge0: port 2(bridge_slave_1) entered forwarding state [ 266.780804][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 266.790900][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 266.800904][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 266.810692][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 266.820147][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 266.829992][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 266.839536][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 266.848657][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 266.858209][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 266.867377][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 266.886626][T11646] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.893974][T11646] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.902887][T11646] device bridge_slave_1 entered promiscuous mode [ 266.982744][T11643] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 267.037720][T11646] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 267.069610][T11646] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 267.139329][T11646] team0: Port device team_slave_0 added [ 267.158201][T11646] team0: Port device team_slave_1 added 13:03:13 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000040)={0x0, 0x0, {0x4}}) [ 268.622429][T11658] IPVS: ftp: loaded support on port[0] = 21 [ 273.831992][T11660] IPVS: ftp: loaded support on port[0] = 21 13:03:19 executing program 4: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000040)={0x9d5, 0xffffffffffffffb6}) pipe(&(0x7f0000000080)={0xffffffffffffffff}) getsockname$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000001c0)={r2, 0x4cde00000000, 0xa, [0x3, 0x400, 0x3, 0x40, 0x3027, 0x8, 0x4, 0x3f, 0x100, 0x8]}, 0x1c) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000200)=@assoc_value={r2, 0x6a0084b1}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r3, 0x84, 0x78, &(0x7f0000000280)=r4, 0x4) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vsock\x00', 0x200, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x70, 0x800, 0x0, 0xe2, 0x8, 0x0, 0x8ebf, 0x28, 0x6, 0x3, 0x6, 0x8, 0x4, 0x4, 0x0, 0x0, 0x861c, 0x1000, 0x1, 0x65, 0x5, 0x3, 0x47, 0xfffffffffffffff9, 0x3ff, 0x813, 0x7fe00, 0xcc4, 0x3f, 0x7ac, 0x1, 0x3, 0x1, 0x800, 0x98, 0x1000, 0x401, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000002c0), 0x2}, 0x40, 0x7fffffff, 0x7fffffff, 0x5, 0x1, 0x1, 0x3ff}, r1, 0x0, r5, 0x4) r6 = socket$inet(0x2, 0x7, 0x3) ioctl$sock_inet_sctp_SIOCINQ(r6, 0x541b, &(0x7f00000003c0)) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer\x00', 0x185001, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r7, 0x111, 0x1, 0x9, 0x4) userfaultfd(0x800) r8 = creat(&(0x7f0000000440)='./file0\x00', 0x6) write$capi20_data(r8, &(0x7f0000000480)={{0x10, 0x1, 0x0, 0x186, 0x8, 0x8}, 0x96, "0a91699bbb04c6b81a118b5b83e44e266bdc5efd11bf90d2447caaaefcc5859be09a98f9a9d26b0f2a1a05978cb3dec5e7befae774d3a38368b452a886ec46b9255b22d20287a459502cf0ff23fc5a709777bb923999106014d56e6e74a7db1a487e3a89feeb9726084f6f7f21bf4dcaf206b51dd5329c79e6ed0795cf4676b9ece58146c032d16ef70e5cd6605bf39585ec9878b3ea"}, 0xa8) syz_open_dev$dri(&(0x7f0000000540)='/dev/dri/card#\x00', 0x3f, 0x440100) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000580)='/dev/full\x00', 0x2002, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000005c0)={0x0, 0xf3, "73cb2f62f991b9934edf37ab3bc0b307b2c654881e3005ebe56ee8c201e11bc9b7391fd942cdc507708b229ede8403feec2fdb2cbd6078ba86f51856e383a98d7381703584980846e9ed3bdc2169271ea1ba93250ffde9b3430a62e98fb43e6d6eb32fc115953e07e856c64445eb8e0572e185da2db8f08ed0769c8c322ebe0f5d685372a69007a2ceee4c7abd0608ad773d29fce85b2c3ab77b7f3eb6ffd6ddbbaea944839f8d4c0f42a33d88d5fc0b5748083c5deaa199a86e8d37ff5487bc100d0dce3ce5f442d253d93afcd1686270334dd2e9cd5c121279bea14199b7ec0aa165dc2a87dd6dacecf83da83fb79150bb72"}, &(0x7f00000006c0)=0xfb) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r9, 0x84, 0x1f, &(0x7f0000000700)={r10, @in6={{0xa, 0x4e20, 0x4, @dev={0xfe, 0x80, [], 0x17}, 0xfffffffffffff4c8}}, 0xe43, 0x532}, 0x90) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f00000007c0)={0x18, 0x0, 0x3, {0x80}}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) r12 = openat$null(0xffffffffffffff9c, &(0x7f0000000900)='/dev/null\x00', 0x100, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000002000)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x80800}, 0xc, &(0x7f0000001fc0)={&(0x7f0000000940)=@deltfilter={0x1664, 0x2d, 0x1, 0x70bd2b, 0x25dfdbfe, {0x0, r11, {0xc, 0x1001d}, {0xfff1, 0x7}, {0x10, 0xe}}, [@TCA_CHAIN={0x8, 0xb, 0x800}, @filter_kind_options=@f_bpf={{0x8, 0x1, 'bpf\x00'}, {0x418, 0x2, [@TCA_BPF_OPS={{0x8}, {0x4}}, @TCA_BPF_POLICE={0x408, 0x2, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x9, 0x5dd, 0x7fffffff, 0x8, 0x0, 0x9, 0x0, 0xe89, 0x1f, 0x0, 0x3, 0x1ff, 0x1ff, 0x4, 0x9, 0xd43, 0xfffffffffffffffb, 0x8, 0x7fffffff, 0x3, 0x5, 0x65f, 0x5, 0x8000, 0x31, 0x4, 0x2, 0x10000, 0x2, 0x6, 0x8, 0x100000001, 0x147, 0xffff, 0xfffc000000000000, 0x0, 0x80000001, 0x8, 0x3, 0x5, 0x5, 0xd, 0x7, 0x3, 0xffffffffffffff81, 0x4, 0x6, 0x8, 0x6, 0xffff, 0x6, 0x6d9, 0x8001, 0x6213, 0x7f8, 0x9, 0x1000, 0xe62e, 0x4, 0x0, 0x10001, 0xff, 0x20, 0xffffffffffffff82, 0x0, 0x1, 0x10001, 0x101, 0x1000, 0x75, 0x20, 0x1000, 0x1c2, 0x7, 0x920, 0x1, 0x1, 0x4, 0x1, 0x1, 0xc8e, 0x3, 0x100000000, 0x2fa, 0x0, 0x10000, 0x7, 0x2, 0x8, 0x1, 0x4, 0x80000000, 0x80000000, 0xea0, 0x8, 0x0, 0x7, 0x9, 0x0, 0x20, 0x100000000, 0x2, 0x40, 0x7, 0x5, 0xa8, 0x6, 0x9, 0x6972, 0x3ff, 0x7fff, 0x2a, 0x800, 0xff, 0x2e5c00000, 0x8000, 0x8, 0x0, 0x2b, 0x1000, 0x6, 0x3, 0x7, 0x4, 0x5, 0x9, 0x80000000, 0x7fffffff, 0x0, 0x0, 0x9, 0x3, 0xcf, 0x7, 0x0, 0x7, 0x1, 0x3, 0xdf, 0x8, 0xfffffffffffffa32, 0x8, 0xfffffffffffffffa, 0x3f, 0x1, 0x0, 0x6, 0x1, 0x2, 0x5, 0x8, 0xc93, 0x5, 0x8, 0x0, 0x2, 0xd4, 0x3, 0x4, 0x2, 0x3ff, 0x80, 0x5, 0x2, 0x2, 0x65e, 0x401, 0x10000, 0x10001, 0x7, 0x9, 0x3, 0xf0, 0x5e, 0x2, 0x9, 0x6, 0x2, 0x81, 0x6af8, 0x6, 0x401, 0x3, 0x8, 0x2, 0x77, 0x1, 0x4, 0x8, 0x8001, 0xffffffff00000000, 0x40, 0x8001, 0x1, 0xfffffffffffffffd, 0x1ff, 0x100, 0x80, 0x80, 0x8000, 0x4, 0x1, 0xfdfa, 0x101, 0x15f, 0x1, 0x3ff, 0x6, 0x5, 0x2, 0x9, 0x2, 0x6, 0xfffffffffffeffff, 0x100000000, 0x9b0, 0xa3, 0xfffffffffffffffd, 0x9, 0x9, 0x4, 0x6, 0x9, 0x100, 0x1, 0x80000001, 0x394, 0x4, 0x7fffffff, 0x8, 0x75d, 0x1, 0x401, 0x8, 0x1, 0x6, 0x9, 0x2, 0x6, 0x1, 0x800, 0xb6e5, 0x80000000, 0xfffffffffffff001, 0x9, 0x472, 0xfffffffffffffe00, 0x3, 0x100, 0x100, 0x7, 0x80000000, 0x5, 0x1, 0x5, 0x9]}}]}}, @TCA_RATE={0x8, 0x5, {0x4, 0x100000001}}, @filter_kind_options=@f_bpf={{0x8, 0x1, 'bpf\x00'}, {0x11e8, 0x2, [@TCA_BPF_NAME={0xc, 0x7, './file0\x00'}, @TCA_BPF_NAME={0xc, 0x7, './file0\x00'}, @TCA_BPF_POLICE={0xc, 0x2, @TCA_POLICE_RESULT={0x8, 0x5, 0x9}}, @TCA_BPF_ACT={0x11ac, 0x1, @m_police={0x11a8, 0xe, {{0xc, 0x1, 'police\x00'}, {0x110c, 0x2, [@TCA_POLICE_RATE={0x404, 0x2, [0x1ff, 0x8, 0x4, 0x7fff, 0x5, 0x401, 0x7, 0x0, 0x6, 0xfff, 0x1000, 0xebbc, 0x46, 0x0, 0x1, 0x100000001, 0x7, 0x8, 0x401, 0x0, 0x8000, 0x6, 0x6, 0x6892, 0x5, 0x4b2, 0x3, 0x91, 0x5, 0x4, 0x7fff, 0x8, 0x5, 0x2, 0x5, 0x401, 0x4, 0x1f, 0xeed, 0x6, 0x3, 0x7ff, 0x0, 0x9, 0x9, 0x7, 0xffffffff, 0x2, 0x8, 0x2b, 0x200, 0xa7, 0x3, 0x40, 0x6, 0x7ff, 0xffffffffffff8001, 0x1, 0x4, 0x100000001, 0x0, 0x3, 0x0, 0x2, 0xff, 0x9, 0x8, 0x683d, 0x100000000, 0x7fffffff, 0x6, 0x3f, 0x80000001, 0x81, 0x9, 0x3, 0x40, 0x7fffffff, 0x4d, 0x7, 0x6000000000000000, 0x57, 0xcb2, 0x1, 0x3, 0x6, 0x9, 0x3f, 0x10000, 0xb0f, 0x8, 0x7, 0x7c, 0x56b20fb6, 0x0, 0x383, 0x4, 0x400, 0xff, 0x100000001, 0x6, 0x1, 0x3, 0x100, 0x8, 0xffffffff, 0x7fffffff, 0xffff, 0xe1c, 0x142, 0x1, 0x2, 0x3ff, 0x8001, 0xb4a, 0x0, 0x84, 0x0, 0x8000, 0xfffffffffffffff9, 0x3, 0xffffffffffffff84, 0x3f, 0x94c, 0x6, 0x0, 0x64, 0x3, 0x100000000, 0x311, 0x4, 0x9, 0x1, 0x8, 0xbb8, 0x400, 0x200, 0x0, 0x45b54948, 0x2, 0x8, 0x0, 0x4, 0xfffffffffffffffe, 0x81, 0x8, 0x0, 0xa43, 0x7, 0xffffffff, 0x0, 0xe7, 0x0, 0x5, 0x0, 0x0, 0x7fff, 0x8, 0x10000, 0x6, 0x8df, 0xcdab, 0x2, 0x6, 0xffffffff, 0x5, 0x3f, 0x3ff, 0x8001, 0x1000, 0xbe6, 0x0, 0x7f625174, 0x5, 0x4, 0x1, 0x6, 0x4, 0x9, 0xffffffffffffffff, 0xed, 0x10000, 0x1, 0x5, 0x7fff, 0x63, 0xfffffffffffffff8, 0x1, 0x7, 0x6, 0x4, 0x2000, 0x2, 0xd243, 0x2, 0x1, 0x645, 0x9, 0x3, 0x5, 0xfff, 0x8000, 0x2, 0x0, 0x9, 0x80000001, 0x1ff, 0x1ff, 0xc00, 0x8000, 0x6, 0x8, 0x5, 0x1000, 0x2, 0x3, 0xd1, 0x6, 0xffff, 0x8b56, 0x1f, 0x20, 0x6, 0x81, 0x246, 0x9, 0x6, 0x115e, 0x8, 0x1aa, 0x100000000, 0x20, 0x2, 0x9, 0x2, 0x3, 0x7, 0x8001, 0x0, 0xbe, 0x8, 0x2, 0x4, 0x400, 0xfffffffffffffeff, 0x7, 0xfffffffffffffffb, 0x9, 0x1, 0x7, 0x4, 0x4, 0x9, 0x6, 0x5, 0x2]}, @TCA_POLICE_RATE={0x404, 0x2, [0x6, 0xfffffffffffffbbd, 0x100, 0x1000, 0xf846, 0x9, 0x7, 0x5, 0x3, 0x6, 0x0, 0x6, 0xb1, 0x4, 0x2ad71484, 0x8, 0x1, 0x0, 0x7, 0x1f, 0xbb1, 0x3, 0x62ad7190, 0x1, 0x7, 0x7b0bb341, 0x8, 0x8b3d, 0xffffffffffff8000, 0xfce, 0x800, 0xded, 0x0, 0xc1ce, 0x3, 0x0, 0x200, 0x9, 0x400, 0x14, 0x0, 0x1, 0x5, 0x0, 0x7fffffff, 0x8d5, 0x401, 0x5, 0xfffffffffffff801, 0x87, 0x5, 0x3, 0xae9, 0xfffffffffffff7ca, 0x3ff, 0x2, 0x8, 0x6, 0x3, 0x401, 0xfffffffffffffffb, 0x2e, 0x6, 0x1, 0x0, 0x2, 0x3, 0x7b, 0x2, 0x80000000, 0x7, 0x1ff, 0x21d1, 0x4, 0xfffffffffffffffb, 0x100000000, 0x100000001, 0x6, 0xcc5, 0x200, 0x10001, 0x8, 0xf4, 0x4, 0xffff, 0xfffffffffffffffc, 0x80000000, 0x5, 0x7, 0x2, 0x8, 0x81, 0x297, 0x3, 0x4000000000, 0x7fff, 0x20000000, 0x7, 0x100, 0x2, 0x3, 0x7be2, 0x9, 0x2, 0x6, 0x0, 0x100, 0x9, 0xfffffffffffffffe, 0x797, 0x2, 0x9, 0xf10, 0x80000001, 0x0, 0x1, 0x602e, 0x7, 0x9, 0x60000, 0x0, 0x7fff, 0x4, 0x0, 0x817, 0x80000001, 0x2, 0x8000, 0x100000000, 0x1, 0x1, 0x3c, 0x6, 0x20000000, 0x81, 0x20, 0x6, 0x5, 0xfffffffffffffeff, 0x1, 0x7301, 0x3, 0x40, 0x0, 0x80, 0x401, 0x80000001, 0x4, 0x61, 0x1, 0x400, 0x8, 0x80, 0x1, 0x2, 0xffffffff, 0x16, 0x8, 0x101, 0x0, 0x0, 0x1, 0x7fff, 0x7, 0x6, 0x5, 0x0, 0x4, 0x63a1, 0x0, 0xfffffffffffff6a8, 0x8e0, 0xdf000000000, 0x5, 0xf99, 0x1ff, 0x7f, 0x1ff, 0xfffffffffffffffa, 0x6d9, 0x5, 0x7, 0x4, 0xdd78, 0x7ff, 0x2, 0x5, 0x5, 0x8, 0x2, 0xffffffffffffffff, 0xff, 0x10001, 0x10000, 0x2c4, 0x6, 0x3, 0x2, 0x7, 0x1f, 0x0, 0x20, 0x5, 0x2, 0xfffffffffffffffc, 0x8, 0x3, 0x6, 0x8001, 0x101, 0xab0f, 0x5, 0x200, 0x4, 0x401, 0xfffffffffffffffc, 0x6, 0x5, 0x934, 0x8000, 0xffffffffffff0000, 0x10001, 0x80, 0x28, 0x7, 0x6, 0x7, 0x7, 0x1, 0xffffffffffffffff, 0x81, 0x4, 0x8, 0x81, 0xfffffffffffffffb, 0x4, 0x6, 0x3, 0x7fffffff, 0x1, 0x44, 0x7, 0x3, 0x80, 0x1, 0x2f794895, 0x3, 0x3b, 0x3, 0x7, 0x7, 0x0, 0xffffffff, 0xfffffffffffffffd, 0xa581, 0xfff]}, @TCA_POLICE_RATE={0x404, 0x2, [0x0, 0x5, 0x12, 0x1164000000000, 0x7f, 0x4, 0xbd, 0xfffffffffffffffa, 0x0, 0xff, 0x0, 0x59, 0xfffffffffffffffa, 0xff, 0xfffffffffffffffb, 0x1, 0x4, 0x1000, 0x5, 0x401, 0x6, 0x1, 0x3, 0x7, 0x401, 0x8000, 0x1, 0x78b5, 0x1, 0xff, 0x9d, 0x0, 0x4, 0x6, 0x5000, 0x1, 0x376, 0xffffffffffff8000, 0x1f, 0x6, 0x80000000, 0x7, 0xb9, 0x8, 0x1ff, 0xffffffff, 0x9, 0x2f9, 0x3, 0x9, 0x5, 0xffffffff, 0x1, 0x200, 0x1, 0x800, 0x3, 0x49f, 0x7f, 0x1, 0xe5a, 0xffffffff7fffffff, 0x20, 0x16, 0x3, 0x4d2, 0xffffffffffffff27, 0xee, 0xa5b, 0x8000, 0x8, 0x9, 0x8e7, 0x6, 0x100000000, 0x10001, 0x2, 0x1, 0x800, 0x0, 0x4, 0x40000, 0x7fffffff, 0x3, 0x17e6af58, 0x0, 0x4, 0x800, 0x3, 0xfffffffffffff648, 0xfffffffffffffd62, 0x401, 0x6, 0x101, 0xdb0, 0x9, 0x1, 0x2, 0x4, 0x7fff, 0x4, 0x5, 0x1b7, 0x101, 0x1, 0xc944, 0x0, 0x8, 0x9, 0x9, 0x3ff, 0xffff, 0x3fffc0000, 0x2, 0xfffffffffffffffb, 0xffffffffffffff2b, 0x0, 0x6, 0x4b4, 0x1, 0x1f, 0x3f, 0x7, 0x8, 0x7, 0x1000, 0x4, 0x8, 0x3, 0x400, 0x81, 0xfffffffffffffffe, 0xfffffffffffffff8, 0x1, 0x7f, 0x9, 0x6ab, 0x8000, 0x80, 0x100000000, 0x8, 0x1000, 0x9, 0x3, 0x8, 0x5, 0x101, 0x8001, 0x6, 0x5, 0x7fc62670, 0x4, 0xffff, 0x800, 0x4, 0xfffffffffffffff9, 0x40, 0x815, 0x3c, 0x3, 0x8, 0x9, 0x0, 0x6a, 0x7fffffff, 0xc0c3, 0x6, 0x1f, 0x3ff, 0x3, 0x41, 0x40, 0x0, 0x5, 0x2, 0x7, 0x4, 0xffffffffffffff81, 0x1, 0x50000000000, 0x80000000, 0x101, 0x101, 0x7, 0xb4f, 0x0, 0x10000, 0x7, 0x3, 0xfffffffffffffffa, 0x5fc2, 0x7f, 0x6, 0x80, 0x0, 0x1, 0x0, 0x5, 0x8, 0x7, 0x7f, 0x4, 0x71752c54, 0xfffffffffffffff9, 0x7ff, 0xea85, 0x3f, 0x9, 0x9, 0x6, 0x3ff, 0x2, 0x7, 0x0, 0x1, 0x1, 0x8000, 0x0, 0x6, 0x9, 0x4, 0x9, 0x6d, 0xffffffff, 0x2, 0x1800000000, 0xffffffff, 0x1ff, 0x6, 0x0, 0x4, 0xffffffffffffff00, 0x6, 0x1f, 0x7, 0x100000000, 0x8, 0x1, 0x3, 0x0, 0x61ad, 0x800000, 0x9, 0x5, 0x70c, 0x1, 0x8000, 0x9, 0x1, 0x7, 0x2, 0x2b, 0x0, 0xff, 0x81, 0x8]}, @TCA_POLICE_RESULT={0x8, 0x5, 0x7}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0xfffffffffffffffb, 0x100, 0xffffffff7fffffff, 0x8, 0x8, 0x1000, 0x30f, 0xfffffffffffffff8, 0x4, 0x800000000000000, 0x4, 0x1, 0x6, 0x8, 0x2, 0x4, 0xf919, 0x2, 0x5, 0xeb, 0xfffffffffffffc01, 0x0, 0x8, 0x8c8, 0x9, 0x1, 0x2, 0xb529, 0x10000, 0x4, 0x5, 0x3, 0x101, 0x386, 0x5, 0x9, 0x3000000000, 0x7, 0x7, 0x5, 0x672f, 0xa73e, 0x4, 0x1, 0x9, 0x6, 0x7dd, 0xffffffffffffc527, 0x10000, 0x9, 0x6, 0x5, 0x81, 0x8, 0x8, 0x5, 0x7fff, 0xbb, 0x46bf1a47, 0xe97, 0xffffffffffffffa4, 0xfab2, 0x0, 0xfffffffffffffff9, 0xffff, 0x7, 0xffff, 0x9, 0x2a1b, 0x6, 0x6, 0x100, 0x2, 0x2a1, 0x5, 0xffff, 0x2, 0x4, 0x1e, 0x5, 0x2, 0x80000000, 0x0, 0x2, 0x8, 0x2eba, 0x8, 0x800, 0xbd, 0x6, 0x5, 0x1, 0x7, 0x1, 0x50000000000000, 0x100, 0x7, 0x9, 0x1ff, 0x1000, 0x7ff, 0x9, 0x7c2, 0x3, 0x2, 0x0, 0x5, 0xfffffffffffffff8, 0x1, 0xffffffff80000001, 0x4, 0x1, 0x0, 0x2, 0x9, 0x1, 0xfffffffffffffff8, 0x5, 0x3f, 0x8000, 0x8, 0x8, 0x80000000, 0x1f, 0x8, 0xfe, 0x6, 0xe58e, 0x9, 0x8, 0x5, 0x200, 0x1, 0x81, 0x542a, 0x6, 0x10000, 0x1c00000, 0x3, 0x8, 0x1, 0x81, 0x8, 0x6a77d9fe, 0x2, 0x8, 0x2, 0x9, 0x5, 0x8000, 0x7, 0x4, 0x3, 0x3, 0x6, 0x4, 0x80, 0x4, 0x2, 0x4000000000000000, 0x1, 0x6, 0x6, 0x1, 0x3, 0x12, 0x4, 0x277, 0x7ff, 0x20, 0x80000001, 0x7, 0x6, 0x6, 0x3ff, 0x2, 0x1, 0x7, 0x1, 0x7, 0xbfb, 0x81, 0x8, 0x3, 0x200, 0x8, 0x80000001, 0x7fffffff, 0x28, 0x8, 0x80, 0x639d, 0xb6, 0x0, 0x196f, 0x80000000, 0x8, 0x80000000, 0x4, 0xdc, 0x2, 0xfffffffffffffff4, 0x1, 0x5, 0x100000001, 0x14d, 0x4, 0x4, 0x58, 0x3, 0x4, 0x6, 0x400, 0x4, 0x1ff, 0x81, 0x3, 0xffffffff, 0x3, 0xa21, 0x1, 0x1, 0x9, 0xfffffffffffffff8, 0x813b, 0x6, 0x4, 0x4, 0x5, 0x1000, 0x1, 0x10000, 0x3, 0x69a, 0x4, 0x6, 0x5, 0x4, 0x5, 0x1, 0x5, 0xfffffffffffffff9, 0x4, 0x0, 0x8, 0x10000000000000, 0x1, 0x5, 0x80000000, 0x80000001, 0x8, 0xffffffff, 0x3, 0x10000, 0xfffffffffffffff8]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x3, 0x7, 0x7, 0x6, 0x6, {0xff, 0x2, 0x0, 0x1000, 0x3f, 0x101}, {0x7fffffff, 0x1, 0x1f, 0xffffffffffffff00, 0x7, 0xffff}, 0x8000, 0x9, 0x9}}, @TCA_POLICE_TBF={0x3c, 0x1, {0x20, 0x3, 0x800, 0x2, 0x1, {0x7, 0x2, 0x8000, 0x0, 0x3aa000000000, 0xcc8}, {0x5, 0x2, 0x6, 0x100000000, 0x100000001, 0x1}, 0x648, 0x0, 0xbaf}}, @TCA_POLICE_TBF={0x3c, 0x1, {0x2b, 0x6, 0x2, 0x200, 0x3f, {0x101, 0x0, 0x7, 0x1, 0x1000, 0x7}, {0x4, 0x2, 0x80, 0x800, 0x7, 0x40}, 0x1, 0x3, 0x101}}, @TCA_POLICE_TBF={0x3c, 0x1, {0x101, 0x6, 0x10000, 0x9, 0xff, {0x1, 0x2, 0x6, 0x100000001, 0x3f, 0x101}, {0x10000, 0x1, 0xf361, 0x80000001, 0x9, 0x5}, 0x2, 0x7ff, 0xffffffff}}]}, {0x88, 0x6, "8da7f5720359ecd4aaddf29a20565443c3f664989f2ed39db30abd1882db3beb96bb89b0c57856ff7e888cb3cf8206586f624b18f03c504567f828bc4d910bcfb0069ef50d095e90679fb4d98042aefdbda04bf33a7c41e77f3a3d18132bf2de60a118fd9b5feeaf99e863c2f86d7998d9af6c02b36d011043a68e44eb6115c6b4de"}}}}, @TCA_BPF_FD={0x8, 0x6, r12}, @TCA_BPF_NAME={0xc, 0x7, './file0\x00'}]}}, @TCA_CHAIN={0x8, 0xb, 0x9}, @TCA_RATE={0x8, 0x5, {0x1, 0x3ff}}, @TCA_RATE={0x8, 0x5, {0x6, 0x8}}, @TCA_RATE={0x8, 0x5, {0x7, 0x100000000}}]}, 0x1664}, 0x1, 0x0, 0x0, 0x8000}, 0x78fea63947c0af50) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000002040)={r2, @in6={{0xa, 0x4e21, 0x8, @dev={0xfe, 0x80, [], 0x1c}, 0x4792}}, 0xfae, 0x9, 0x3, 0x8, 0x6}, 0x98) getsockopt$IPT_SO_GET_INFO(r6, 0x0, 0x40, &(0x7f0000002100)={'raw\x00'}, &(0x7f0000002180)=0x54) socket$rxrpc(0x21, 0x2, 0x2) 13:03:24 executing program 5: r0 = socket(0x2, 0xa, 0x7) sendto$isdn(r0, &(0x7f0000000000)={0x3, 0x400, "086f89a2789af9326b99d5c23ebfb2e4cf5eae3620560ef6fb003296de97cd6a70db730dafd0c5fa9d04503c8e60b8ce53f9aa77f915db787c602397607cea6433cfcdfdef2418c5cbba3a1d40ccee6786a81207bc95936787d5634fadf04701229dca6cd3edc5e02d36ceefc51076ac9ef81464fbed20e79403c34154295f8f670168d63a9279dabd9ec2aa6d0e9005ed33968608"}, 0x9d, 0x8000, &(0x7f00000000c0)={0x22, 0x7f, 0x10001, 0x3, 0x5}, 0x6) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x140, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x30b000, 0x0) connect$rxrpc(r2, &(0x7f0000000180)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x24) r3 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x80000) sendto$isdn(r3, &(0x7f0000000200)={0x7fffffff, 0x0, "edec68da86a782032547e4bf267c9a4943131ad84dd21f59d40ee1e576e809c63daeaf879ac77e83bcbe4a0950800064f8f2eddb37de8038777ccc8ad87896054018f4264271239a4f5ac1106294bbb76db1a9d9e04ab4eab4279392b434ef780e054049406975be0fc8c733a74ca8183a0dfdaa50e8fa87d692ee0d4587d8675bc57b1d48ff0b517e2aa848af55b6f6c514079df30ca9e6baacfe15fad62cd0fb00897dca76aa"}, 0xaf, 0xc800, &(0x7f00000002c0)={0x22, 0x1ff, 0x40, 0xfffffffffffffff7, 0x7fffffff}, 0x6) syz_open_dev$sndctrl(&(0x7f0000000300)='/dev/snd/controlC#\x00', 0x7ff, 0x40001) syz_open_dev$adsp(&(0x7f0000000340)='/dev/adsp#\x00', 0x78889610, 0x42000) syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x126b1dd7d199b41f, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f0000000400)) mknod$loop(&(0x7f0000000440)='./file0\x00', 0x8, 0x1) ioctl$HIDIOCGPHYS(0xffffffffffffffff, 0x80404812, &(0x7f0000000480)) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000004c0)=@sack_info={0x0, 0x3, 0x2}, 0xc) r5 = syz_open_dev$vcsn(&(0x7f0000000500)='/dev/vcs#\x00', 0x8, 0x0) ioctl$TIOCGPKT(r5, 0x80045438, &(0x7f0000000540)) signalfd(r2, &(0x7f0000000580)={0x318}, 0x8) openat$usbmon(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/usbmon0\x00', 0x10940, 0x0) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x2000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r6, 0x40045730, &(0x7f0000000640)=0x4) syz_open_dev$sndctrl(&(0x7f0000000680)='/dev/snd/controlC#\x00', 0x3, 0x0) socket$caif_stream(0x25, 0x1, 0x2) r7 = syz_open_dev$midi(&(0x7f00000006c0)='/dev/midi#\x00', 0x4, 0x20080) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000740)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r7, &(0x7f00000008c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000880)={&(0x7f0000000780)={0xc4, r8, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x401}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}]}, @TIPC_NLA_BEARER={0x20, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'bond_slave_1\x00'}}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_BEARER={0x3c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1d}}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x1, @mcast1, 0x7}}}}]}, @TIPC_NLA_NODE={0x34, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) r9 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000900)='/proc/capi/capi20ncci\x00', 0x1c1180, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000980)={0x0, 0x70, 0x4, 0x2, 0x2, 0x100000000, 0x0, 0x10001, 0x40, 0x0, 0x9e8, 0x5, 0xfffffffffffffff8, 0x10000000000, 0x3, 0x20, 0x16c7, 0x1, 0x80000000, 0xa4, 0x4, 0x7f, 0x9, 0xfffffffffffffffb, 0x7fff, 0x8000, 0xfffffffeffffffff, 0x400, 0x0, 0x7, 0x3, 0x8, 0x8000, 0x7, 0x9, 0x3, 0x2, 0xfffffffffffffffd, 0x0, 0xb5e, 0x1, @perf_bp={&(0x7f0000000940), 0x8}, 0x0, 0x5c, 0x7fffffff, 0x9, 0x80, 0xfffffffffffffff8, 0x1}) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r5, 0x84, 0x78, &(0x7f0000000a00), 0x4) 13:03:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'bond0\x00', &(0x7f0000000500)=ANY=[@ANYBLOB='&']}) [ 278.265174][T11646] device hsr_slave_0 entered promiscuous mode [ 278.336123][T11646] device hsr_slave_1 entered promiscuous mode [ 278.494408][T11646] debugfs: Directory 'hsr0' with parent '/' already present! [ 278.507500][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 278.516186][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 13:03:24 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x10000, 0x1000}, 0x0) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x4, &(0x7f0000000800), 0x4) [ 278.673852][T11665] IPVS: ftp: loaded support on port[0] = 21 13:03:24 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x10000, 0x1000}, 0x0) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000800)=0x100000c, 0x4) 13:03:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000001140)='./file0\x00', 0x402c2, 0x0) truncate(&(0x7f00000015c0)='./file0\x00', 0x0) [ 278.972502][T11658] chnl_net:caif_netlink_parms(): no params data found [ 279.018177][T11660] chnl_net:caif_netlink_parms(): no params data found 13:03:25 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000001440)={0x1, 0x6}, 0x4) 13:03:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x26000000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/cgroup\x00') setns(r0, 0x0) [ 279.195131][T11646] 8021q: adding VLAN 0 to HW filter on device bond0 [ 279.207592][T11658] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.214862][T11658] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.223338][T11658] device bridge_slave_0 entered promiscuous mode [ 279.244859][T11665] chnl_net:caif_netlink_parms(): no params data found [ 279.269122][T11660] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.276876][T11660] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.285786][T11660] device bridge_slave_0 entered promiscuous mode [ 279.310230][T11658] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.318043][T11658] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.326848][T11658] device bridge_slave_1 entered promiscuous mode [ 279.344963][ T3371] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 279.353415][ T3371] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 13:03:25 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "6a6b508a1c7d48cc", "7ffafffffff3fd61b71aaef023f7a6fa", "02049822", "9b9d480f2ef47ab2"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 279.395261][T11646] 8021q: adding VLAN 0 to HW filter on device team0 [ 279.422944][T11660] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.431618][T11660] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.440667][T11660] device bridge_slave_1 entered promiscuous mode [ 279.448860][T11665] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.456936][T11665] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.465755][T11665] device bridge_slave_0 entered promiscuous mode [ 279.491587][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 279.499245][ T3371] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 279.512789][ T3371] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 279.521797][ T3371] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.529169][ T3371] bridge0: port 1(bridge_slave_0) entered forwarding state [ 279.537685][ T3371] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 279.547163][ T3371] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 279.556312][ T3371] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.563502][ T3371] bridge0: port 2(bridge_slave_1) entered forwarding state [ 279.572211][T11665] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.579826][T11665] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.588339][T11665] device bridge_slave_1 entered promiscuous mode [ 279.596723][ T3371] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 279.609927][T11658] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 279.635182][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 279.680374][T11658] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 279.702127][T11665] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 279.725800][T11658] team0: Port device team_slave_0 added [ 279.736995][T11660] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 279.748845][T11658] team0: Port device team_slave_1 added [ 279.808659][T11646] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 279.819456][T11646] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 279.837848][ T3371] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 279.848603][ T3371] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 279.858642][ T3371] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 279.866407][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 279.868147][ T3371] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 279.887664][ T3371] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 279.897354][ T3371] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 279.906666][ T3371] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 279.916384][ T3371] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 279.925727][ T3371] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 279.939065][ T3371] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 279.948173][ T3371] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 279.972417][T11658] device hsr_slave_0 entered promiscuous mode [ 280.015488][T11658] device hsr_slave_1 entered promiscuous mode [ 280.055317][T11658] debugfs: Directory 'hsr0' with parent '/' already present! [ 280.066067][T11660] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 280.087417][T11665] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 280.131089][T11660] team0: Port device team_slave_0 added [ 280.140673][T11665] team0: Port device team_slave_0 added [ 280.150434][T11665] team0: Port device team_slave_1 added [ 280.160353][T11660] team0: Port device team_slave_1 added [ 280.277334][T11660] device hsr_slave_0 entered promiscuous mode [ 280.315685][T11660] device hsr_slave_1 entered promiscuous mode [ 280.384703][T11660] debugfs: Directory 'hsr0' with parent '/' already present! [ 280.402320][T11646] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 280.448380][T11665] device hsr_slave_0 entered promiscuous mode [ 280.494939][T11665] device hsr_slave_1 entered promiscuous mode [ 280.574503][T11665] debugfs: Directory 'hsr0' with parent '/' already present! [ 280.730412][T11658] 8021q: adding VLAN 0 to HW filter on device bond0 13:03:26 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x26000000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/cgroup\x00') setns(r0, 0x0) 13:03:26 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00\x00\x00v\x98\x91bS\xb3\x81\x99\x00', 0x1}) [ 280.801459][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 280.810385][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 280.830967][T11658] 8021q: adding VLAN 0 to HW filter on device team0 [ 280.877712][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 280.887807][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 280.897064][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.904338][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 280.939956][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 280.957930][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 280.967675][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 280.976643][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.983787][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 280.999716][T11660] 8021q: adding VLAN 0 to HW filter on device bond0 [ 281.058381][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 281.068339][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 281.077005][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 281.085744][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 281.103926][T11660] 8021q: adding VLAN 0 to HW filter on device team0 [ 281.119144][T11665] 8021q: adding VLAN 0 to HW filter on device bond0 [ 281.138963][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 281.148673][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 281.158229][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 281.168359][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 281.221552][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 281.230481][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 281.240224][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 281.249519][ T4114] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.256746][ T4114] bridge0: port 1(bridge_slave_0) entered forwarding state [ 281.266069][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 281.275466][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 281.284088][ T4114] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.291424][ T4114] bridge0: port 2(bridge_slave_1) entered forwarding state [ 281.299622][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 281.309348][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 281.318354][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 281.327288][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 281.336865][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 281.351156][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 281.370929][T11665] 8021q: adding VLAN 0 to HW filter on device team0 [ 281.381019][T11658] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 281.399693][ T3371] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 281.409810][ T3371] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 281.418375][ T3371] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 281.426582][ T3371] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 281.436094][ T3371] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 281.445096][ T3371] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.452208][ T3371] bridge0: port 1(bridge_slave_0) entered forwarding state [ 281.465473][ T3371] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 281.474511][ T3371] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 281.484311][ T3371] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 281.497385][ T3371] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 281.517045][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 281.527408][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 281.536475][ T4114] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.543612][ T4114] bridge0: port 2(bridge_slave_1) entered forwarding state [ 281.552168][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 281.605297][T11665] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 281.615779][T11665] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 281.630226][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 281.640463][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 281.650232][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 281.659579][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 281.669216][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 281.678612][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 281.688216][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 281.697474][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 281.706524][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 281.715868][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 281.725022][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 281.734265][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 281.743478][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 281.759332][T11658] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 281.766919][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 281.776395][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 281.826973][T11665] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 281.851298][T11660] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 281.863882][T11660] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 281.873975][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 281.883326][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 281.951913][T11660] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 282.052623][T11724] syz-executor.5 uses obsolete (PF_INET,SOCK_PACKET) 13:03:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x40000000002, 0x3, 0x80000000002) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000100)='bridge_slave_0\x00', 0x10) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)=@abs={0x0, 0x0, 0x10000e0}, 0x33) 13:03:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x602}) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) [ 282.238435][T11738] raw_sendmsg: syz-executor.3 forgot to set AF_INET. Fix it! 13:03:28 executing program 5: perf_event_open(&(0x7f0000000040)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000000)='oom_adj\x00') 13:03:28 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "6a6b508a1c7d48cc", "7ffafffffff3fd61b71aaef023f7a6fa", "02049822", "9b9d480f2ef47ab2"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 13:03:28 executing program 2: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='environ\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000340)=""/161, 0xa1}], 0x1, 0x0) 13:03:28 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x20600, 0x0) 13:03:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000240)=[@text16={0x10, &(0x7f00000001c0)="bad004ecb828018ee00f20c06635100000000f22c066b9800000c00f326635010000000f3026262e2e0f381d9cac000f797e3826660f3a0d882ba7fc660f2206f0fe8d0800f20f01f9", 0x49}], 0x1, 0x0, 0x0, 0xfffffffffffffdc5) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000004cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:03:28 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r1, 0x1) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x6}, 0x4) [ 282.496563][T11757] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 282.544479][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 282.630729][T11756] ================================================================== [ 282.634469][T11756] BUG: KMSAN: uninit-value in aesti_encrypt+0x1238/0x1bc0 [ 282.642467][T11756] CPU: 0 PID: 11756 Comm: syz-executor.0 Not tainted 5.3.0-rc7+ #0 [ 282.642467][T11756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.642467][T11756] Call Trace: [ 282.642467][T11756] dump_stack+0x191/0x1f0 [ 282.642467][T11756] kmsan_report+0x162/0x2d0 [ 282.642467][T11756] __msan_warning+0x75/0xe0 [ 282.642467][T11756] aesti_encrypt+0x1238/0x1bc0 [ 282.642467][T11756] ? aesti_set_key+0x1eb0/0x1eb0 [ 282.642467][T11756] crypto_cbcmac_digest_update+0x3cf/0x550 [ 282.642467][T11756] ? crypto_cbcmac_digest_init+0x140/0x140 [ 282.642467][T11756] crypto_shash_update+0x4eb/0x550 [ 282.642467][T11756] ? kmsan_get_shadow_origin_ptr+0x71/0x4c0 [ 282.642467][T11756] shash_ahash_finup+0x1e1/0x730 [ 282.642467][T11756] ? crypto_cbcmac_digest_update+0x4b0/0x550 [ 282.642467][T11756] ? crypto_cbcmac_digest_init+0x140/0x140 [ 282.642467][T11756] ? kmsan_get_shadow_origin_ptr+0x71/0x4c0 [ 282.642467][T11756] shash_async_finup+0xbb/0x110 [ 282.642467][T11756] crypto_ahash_op+0x1cd/0x6e0 [ 282.642467][T11756] ? shash_async_final+0x440/0x440 [ 282.642467][T11756] ? kmsan_get_shadow_origin_ptr+0x71/0x4c0 [ 282.642467][T11756] ? shash_async_final+0x440/0x440 [ 282.642467][T11756] ? shash_async_final+0x440/0x440 [ 282.642467][T11756] crypto_ahash_finup+0x8c/0xb0 [ 282.642467][T11756] crypto_ccm_auth+0x14b2/0x1570 [ 282.642467][T11756] ? sg_next+0x83/0x130 [ 282.642467][T11756] crypto_ccm_encrypt+0x283/0x840 [ 282.642467][T11756] ? kmsan_get_shadow_origin_ptr+0x71/0x4c0 [ 282.642467][T11756] ? crypto_ccm_setauthsize+0xc0/0xc0 [ 282.642467][T11756] crypto_aead_encrypt+0xf2/0x180 [ 282.642467][T11756] tls_push_record+0x341e/0x4e50 [ 282.642467][T11756] ? kmsan_get_shadow_origin_ptr+0x71/0x4c0 [ 282.642467][T11756] bpf_exec_tx_verdict+0x1454/0x1c80 [ 282.642467][T11756] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 282.642467][T11756] ? get_user_pages_fast+0x69b/0x6e0 [ 282.642467][T11756] tls_sw_sendmsg+0x158d/0x2710 [ 282.642467][T11756] ? udpv6_rcv+0x70/0x70 [ 282.642467][T11756] ? tls_tx_records+0xb40/0xb40 [ 282.642467][T11756] inet6_sendmsg+0x2d8/0x2e0 [ 282.642467][T11756] ? inet6_ioctl+0x340/0x340 [ 282.642467][T11756] __sys_sendto+0x8fc/0xc70 [ 282.642467][T11756] ? kmsan_get_shadow_origin_ptr+0x71/0x4c0 [ 282.642467][T11756] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 282.642467][T11756] ? prepare_exit_to_usermode+0x19a/0x4d0 [ 282.642467][T11756] ? kmsan_get_shadow_origin_ptr+0x71/0x4c0 [ 282.642467][T11756] __se_sys_sendto+0x107/0x130 [ 282.642467][T11756] __x64_sys_sendto+0x6e/0x90 [ 282.642467][T11756] do_syscall_64+0xbc/0xf0 [ 282.642467][T11756] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 282.642467][T11756] RIP: 0033:0x4598e9 [ 282.642467][T11756] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 282.642467][T11756] RSP: 002b:00007f104ac0fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 282.642467][T11756] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004598e9 [ 282.642467][T11756] RDX: ffffffffffffffc1 RSI: 0000000020000080 RDI: 0000000000000003 [ 282.642467][T11756] RBP: 000000000075bf20 R08: 0000000000000000 R09: fffffffffffffe5b [ 282.642467][T11756] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f104ac106d4 [ 282.642467][T11756] R13: 00000000004c7880 R14: 00000000004dd188 R15: 00000000ffffffff [ 282.642467][T11756] [ 282.642467][T11756] Uninit was stored to memory at: [ 282.642467][T11756] kmsan_internal_chain_origin+0xcc/0x150 [ 282.642467][T11756] __msan_chain_origin+0x6b/0xe0 [ 282.642467][T11756] __crypto_xor+0x1e8/0x1470 [ 282.642467][T11756] crypto_cbcmac_digest_update+0x2ba/0x550 [ 282.642467][T11756] crypto_shash_update+0x4eb/0x550 [ 282.642467][T11756] shash_ahash_finup+0x1e1/0x730 [ 282.642467][T11756] shash_async_finup+0xbb/0x110 [ 282.642467][T11756] crypto_ahash_op+0x1cd/0x6e0 [ 282.642467][T11756] crypto_ahash_finup+0x8c/0xb0 [ 282.642467][T11756] crypto_ccm_auth+0x14b2/0x1570 [ 282.642467][T11756] crypto_ccm_encrypt+0x283/0x840 [ 282.642467][T11756] crypto_aead_encrypt+0xf2/0x180 [ 282.642467][T11756] tls_push_record+0x341e/0x4e50 [ 282.642467][T11756] bpf_exec_tx_verdict+0x1454/0x1c80 [ 282.642467][T11756] tls_sw_sendmsg+0x158d/0x2710 [ 282.642467][T11756] inet6_sendmsg+0x2d8/0x2e0 [ 282.642467][T11756] __sys_sendto+0x8fc/0xc70 [ 282.642467][T11756] __se_sys_sendto+0x107/0x130 [ 282.642467][T11756] __x64_sys_sendto+0x6e/0x90 [ 282.642467][T11756] do_syscall_64+0xbc/0xf0 [ 282.642467][T11756] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 282.642467][T11756] [ 282.642467][T11756] Uninit was created at: [ 282.642467][T11756] kmsan_save_stack_with_flags+0x37/0x70 [ 282.642467][T11756] kmsan_alloc_page+0x151/0x360 [ 282.642467][T11756] __alloc_pages_nodemask+0x142d/0x5fa0 [ 282.642467][T11756] alloc_pages_current+0x68d/0x9a0 [ 282.642467][T11756] skb_page_frag_refill+0x2b0/0x580 [ 282.642467][T11756] sk_page_frag_refill+0xa4/0x330 [ 282.642467][T11756] tcp_sendmsg_locked+0x2610/0x6950 [ 282.642467][T11756] tcp_sendmsg+0xb2/0x100 [ 282.642467][T11756] inet6_sendmsg+0x178/0x2e0 [ 282.642467][T11756] __sys_sendto+0x8fc/0xc70 [ 282.642467][T11756] __se_sys_sendto+0x107/0x130 [ 282.642467][T11756] __x64_sys_sendto+0x6e/0x90 [ 282.642467][T11756] do_syscall_64+0xbc/0xf0 [ 282.642467][T11756] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 282.642467][T11756] ================================================================== [ 282.642467][T11756] Disabling lock debugging due to kernel taint [ 282.642467][T11756] Kernel panic - not syncing: panic_on_warn set ... [ 282.642467][T11756] CPU: 0 PID: 11756 Comm: syz-executor.0 Tainted: G B 5.3.0-rc7+ #0 [ 282.642467][T11756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.642467][T11756] Call Trace: [ 282.642467][T11756] dump_stack+0x191/0x1f0 [ 282.642467][T11756] panic+0x3c9/0xc1e [ 282.642467][T11756] kmsan_report+0x2ca/0x2d0 [ 282.642467][T11756] __msan_warning+0x75/0xe0 [ 282.642467][T11756] aesti_encrypt+0x1238/0x1bc0 [ 282.642467][T11756] ? aesti_set_key+0x1eb0/0x1eb0 [ 282.642467][T11756] crypto_cbcmac_digest_update+0x3cf/0x550 [ 282.642467][T11756] ? crypto_cbcmac_digest_init+0x140/0x140 [ 282.642467][T11756] crypto_shash_update+0x4eb/0x550 [ 282.642467][T11756] ? kmsan_get_shadow_origin_ptr+0x71/0x4c0 [ 282.642467][T11756] shash_ahash_finup+0x1e1/0x730 [ 282.642467][T11756] ? crypto_cbcmac_digest_update+0x4b0/0x550 [ 282.642467][T11756] ? crypto_cbcmac_digest_init+0x140/0x140 [ 282.642467][T11756] ? kmsan_get_shadow_origin_ptr+0x71/0x4c0 [ 282.642467][T11756] shash_async_finup+0xbb/0x110 [ 282.642467][T11756] crypto_ahash_op+0x1cd/0x6e0 [ 282.642467][T11756] ? shash_async_final+0x440/0x440 [ 282.642467][T11756] ? kmsan_get_shadow_origin_ptr+0x71/0x4c0 [ 282.642467][T11756] ? shash_async_final+0x440/0x440 [ 282.642467][T11756] ? shash_async_final+0x440/0x440 [ 282.642467][T11756] crypto_ahash_finup+0x8c/0xb0 [ 282.642467][T11756] crypto_ccm_auth+0x14b2/0x1570 [ 282.642467][T11756] ? sg_next+0x83/0x130 [ 282.642467][T11756] crypto_ccm_encrypt+0x283/0x840 [ 282.642467][T11756] ? kmsan_get_shadow_origin_ptr+0x71/0x4c0 [ 282.642467][T11756] ? crypto_ccm_setauthsize+0xc0/0xc0 [ 282.642467][T11756] crypto_aead_encrypt+0xf2/0x180 [ 282.642467][T11756] tls_push_record+0x341e/0x4e50 [ 282.642467][T11756] ? kmsan_get_shadow_origin_ptr+0x71/0x4c0 [ 282.642467][T11756] bpf_exec_tx_verdict+0x1454/0x1c80 [ 282.642467][T11756] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 282.642467][T11756] ? get_user_pages_fast+0x69b/0x6e0 [ 282.642467][T11756] tls_sw_sendmsg+0x158d/0x2710 [ 282.642467][T11756] ? udpv6_rcv+0x70/0x70 [ 282.642467][T11756] ? tls_tx_records+0xb40/0xb40 [ 282.642467][T11756] inet6_sendmsg+0x2d8/0x2e0 [ 282.642467][T11756] ? inet6_ioctl+0x340/0x340 [ 282.642467][T11756] __sys_sendto+0x8fc/0xc70 [ 282.642467][T11756] ? kmsan_get_shadow_origin_ptr+0x71/0x4c0 [ 282.642467][T11756] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 282.642467][T11756] ? prepare_exit_to_usermode+0x19a/0x4d0 [ 282.642467][T11756] ? kmsan_get_shadow_origin_ptr+0x71/0x4c0 [ 282.642467][T11756] __se_sys_sendto+0x107/0x130 [ 282.642467][T11756] __x64_sys_sendto+0x6e/0x90 [ 282.642467][T11756] do_syscall_64+0xbc/0xf0 [ 282.642467][T11756] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 282.642467][T11756] RIP: 0033:0x4598e9 [ 282.642467][T11756] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 282.642467][T11756] RSP: 002b:00007f104ac0fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 282.642467][T11756] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004598e9 [ 282.642467][T11756] RDX: ffffffffffffffc1 RSI: 0000000020000080 RDI: 0000000000000003 [ 282.642467][T11756] RBP: 000000000075bf20 R08: 0000000000000000 R09: fffffffffffffe5b [ 282.642467][T11756] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f104ac106d4 [ 282.642467][T11756] R13: 00000000004c7880 R14: 00000000004dd188 R15: 00000000ffffffff [ 282.642467][T11756] Kernel Offset: disabled [ 282.642467][T11756] Rebooting in 86400 seconds..