r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:35:57 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x4a000000, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) [ 845.897475] device veth0_to_bond entered promiscuous mode [ 845.937623] team0: Device macvtap51 failed to register rx_handler [ 845.983338] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 846.021136] device veth0_to_bond left promiscuous mode 19:35:57 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, 0x0) 19:35:57 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:35:57 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x88000, 0x0) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) (async) openat$incfs(r0, &(0x7f0000000180)='.log\x00', 0xa5800, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000400)=0x400) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async, rerun: 64) getpid() (async, rerun: 64) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) (async) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) (async) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'vlan0\x00', 0x1000}) (async) socket$nl_route(0x10, 0x3, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) 19:35:57 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:35:58 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x3cc, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:35:58 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x4c000000, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:35:58 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r1 = getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x2, 0x5a, 0x2a, 0xab, 0x0, 0x80000000, 0x80000, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x4, @perf_config_ext={0x80000000, 0x1000}, 0xa221, 0x400000, 0x2, 0x0, 0xb2, 0x5, 0x7, 0x0, 0x5, 0x0, 0x80000000}, r1, 0xffffffffffffffff, r0, 0x2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) 19:35:58 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:35:58 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:35:58 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x3da, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) [ 846.843567] device veth0_to_bond entered promiscuous mode [ 846.867487] team0: Device macvtap1 failed to register rx_handler [ 846.876922] device veth0_to_bond left promiscuous mode 19:35:58 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 847.270312] device veth0_to_bond entered promiscuous mode [ 847.277182] team0: Device macvtap51 failed to register rx_handler [ 847.284518] device veth0_to_bond left promiscuous mode [ 847.304759] device veth0_to_bond entered promiscuous mode [ 847.311091] team0: Device macvtap1 failed to register rx_handler [ 847.318975] device veth0_to_bond left promiscuous mode 19:35:58 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r1 = getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x2, 0x5a, 0x2a, 0xab, 0x0, 0x80000000, 0x80000, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x4, @perf_config_ext={0x80000000, 0x1000}, 0xa221, 0x400000, 0x2, 0x0, 0xb2, 0x5, 0x7, 0x0, 0x5, 0x0, 0x80000000}, r1, 0xffffffffffffffff, r0, 0x2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) getpid() (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)) (async) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x2, 0x5a, 0x2a, 0xab, 0x0, 0x80000000, 0x80000, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x4, @perf_config_ext={0x80000000, 0x1000}, 0xa221, 0x400000, 0x2, 0x0, 0xb2, 0x5, 0x7, 0x0, 0x5, 0x0, 0x80000000}, r1, 0xffffffffffffffff, r0, 0x2) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) (async) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) (async) 19:35:58 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xac, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r5}]}, 0xac}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:35:58 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r1 = getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x2, 0x5a, 0x2a, 0xab, 0x0, 0x80000000, 0x80000, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x4, @perf_config_ext={0x80000000, 0x1000}, 0xa221, 0x400000, 0x2, 0x0, 0xb2, 0x5, 0x7, 0x0, 0x5, 0x0, 0x80000000}, r1, 0xffffffffffffffff, r0, 0x2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) getpid() (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)) (async) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x2, 0x5a, 0x2a, 0xab, 0x0, 0x80000000, 0x80000, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x4, @perf_config_ext={0x80000000, 0x1000}, 0xa221, 0x400000, 0x2, 0x0, 0xb2, 0x5, 0x7, 0x0, 0x5, 0x0, 0x80000000}, r1, 0xffffffffffffffff, r0, 0x2) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) (async) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) (async) 19:35:59 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x54030000, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:35:59 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x354, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:35:59 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:35:59 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xd, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getpid() r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000440)='\'B\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, &(0x7f0000000400)=0x400) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r9, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) r10 = syz_open_dev$midi(&(0x7f0000000480), 0xffffffffffff0001, 0x115000) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r11, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) sendfile(r10, r11, 0x0, 0xffffffff) r12 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r12, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) sendmmsg$unix(r3, &(0x7f0000000380)=[{{&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB=' \x00'/16, @ANYRES32=r1, @ANYRES32=r7, @ANYRES32=r2, @ANYRES32=r1, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r8, @ANYRES32, @ANYRES32=0xee00, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r3, @ANYRES32=r0, @ANYRES32=r12, @ANYRES32=r0], 0x60, 0x810}}, {{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000200)="ad8af06cda892b728f7a5eb1b7510cee4823ded300e2fac6d8f539ee12ac8d5e0bbfd11856b1c7782d211588fa380b074c7a73ca0bd197f28be75d62a15e9f7e150214d5513cc69637adf908304b84bb7f2d830801a85b9553300b04fe71badf40b639f8301c0bd0584e670f1cfc10029bab984a2f6aa2a222151c3319ee2868a7806b7c5146b35fe31838b722f14721cc425cfdfb12127160f28d6c09d31a762fce5fabc32eca236e556c8995279f7e451c", 0xb2}, {&(0x7f00000002c0)="a3d5fd76e3e5aa9a48f09d688fe952c4f0c5e57a0ce9d9d639c854c3853a16f81761c8ab82f97953faf9ce875d6878cd09ddda74ce4982877636e6503838", 0x3e}], 0x2, 0x0, 0x0, 0x24000000}}], 0x2, 0x4004) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x2405, r2) [ 847.782729] device veth0_to_bond entered promiscuous mode [ 847.807579] team0: Device macvtap51 failed to register rx_handler [ 847.821473] device veth0_to_bond left promiscuous mode 19:35:59 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 847.863229] device veth0_to_bond entered promiscuous mode [ 847.886265] team0: Device macvtap1 failed to register rx_handler [ 847.929536] device veth0_to_bond left promiscuous mode 19:35:59 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:35:59 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:35:59 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:35:59 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:00 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xd, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) getpid() (async) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) (async) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) (async) r5 = socket$nl_route(0x10, 0x3, 0x0) (async) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) (async) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000440)='\'B\x00') (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) (async) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, &(0x7f0000000400)=0x400) (async) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r9, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) (async) r10 = syz_open_dev$midi(&(0x7f0000000480), 0xffffffffffff0001, 0x115000) (async) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r11, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) (async) sendfile(r10, r11, 0x0, 0xffffffff) (async) r12 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r12, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) (async) sendmmsg$unix(r3, &(0x7f0000000380)=[{{&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB=' \x00'/16, @ANYRES32=r1, @ANYRES32=r7, @ANYRES32=r2, @ANYRES32=r1, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r8, @ANYRES32, @ANYRES32=0xee00, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r3, @ANYRES32=r0, @ANYRES32=r12, @ANYRES32=r0], 0x60, 0x810}}, {{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000200)="ad8af06cda892b728f7a5eb1b7510cee4823ded300e2fac6d8f539ee12ac8d5e0bbfd11856b1c7782d211588fa380b074c7a73ca0bd197f28be75d62a15e9f7e150214d5513cc69637adf908304b84bb7f2d830801a85b9553300b04fe71badf40b639f8301c0bd0584e670f1cfc10029bab984a2f6aa2a222151c3319ee2868a7806b7c5146b35fe31838b722f14721cc425cfdfb12127160f28d6c09d31a762fce5fabc32eca236e556c8995279f7e451c", 0xb2}, {&(0x7f00000002c0)="a3d5fd76e3e5aa9a48f09d688fe952c4f0c5e57a0ce9d9d639c854c3853a16f81761c8ab82f97953faf9ce875d6878cd09ddda74ce4982877636e6503838", 0x3e}], 0x2, 0x0, 0x0, 0x24000000}}], 0x2, 0x4004) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x2405, r2) [ 848.917276] kauditd_printk_skb: 34 callbacks suppressed [ 848.917290] audit: type=1804 audit(1669232160.347:1616): pid=31617 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir2693782222/syzkaller.HDrBKC/499/bus" dev="sda1" ino=14371 res=1 19:36:00 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xd, 0xffffffffffffffff, 0x0) (async, rerun: 32) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) (async, rerun: 32) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async, rerun: 32) getpid() (async, rerun: 32) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) (async, rerun: 32) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) (rerun: 32) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) (async) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000440)='\'B\x00') (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) (async) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, &(0x7f0000000400)=0x400) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) (async) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r9, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) r10 = syz_open_dev$midi(&(0x7f0000000480), 0xffffffffffff0001, 0x115000) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r11, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) (async, rerun: 32) sendfile(r10, r11, 0x0, 0xffffffff) (rerun: 32) r12 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r12, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) (async) sendmmsg$unix(r3, &(0x7f0000000380)=[{{&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB=' \x00'/16, @ANYRES32=r1, @ANYRES32=r7, @ANYRES32=r2, @ANYRES32=r1, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r8, @ANYRES32, @ANYRES32=0xee00, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r3, @ANYRES32=r0, @ANYRES32=r12, @ANYRES32=r0], 0x60, 0x810}}, {{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000200)="ad8af06cda892b728f7a5eb1b7510cee4823ded300e2fac6d8f539ee12ac8d5e0bbfd11856b1c7782d211588fa380b074c7a73ca0bd197f28be75d62a15e9f7e150214d5513cc69637adf908304b84bb7f2d830801a85b9553300b04fe71badf40b639f8301c0bd0584e670f1cfc10029bab984a2f6aa2a222151c3319ee2868a7806b7c5146b35fe31838b722f14721cc425cfdfb12127160f28d6c09d31a762fce5fabc32eca236e556c8995279f7e451c", 0xb2}, {&(0x7f00000002c0)="a3d5fd76e3e5aa9a48f09d688fe952c4f0c5e57a0ce9d9d639c854c3853a16f81761c8ab82f97953faf9ce875d6878cd09ddda74ce4982877636e6503838", 0x3e}], 0x2, 0x0, 0x0, 0x24000000}}], 0x2, 0x4004) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x2405, r2) 19:36:00 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x5c010000, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:36:00 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x354, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) [ 849.417097] device veth0_to_bond entered promiscuous mode 19:36:00 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 849.484946] team0: Device macvtap1 failed to register rx_handler 19:36:00 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, 0x0) [ 849.530674] device veth0_to_bond left promiscuous mode [ 849.669590] audit: type=1804 audit(1669232161.097:1617): pid=31647 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/83/bus" dev="sda1" ino=14388 res=1 [ 849.768481] net_ratelimit: 11 callbacks suppressed [ 849.768492] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 849.851065] audit: type=1804 audit(1669232161.277:1618): pid=31647 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/83/bus" dev="sda1" ino=14388 res=1 19:36:01 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r5}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 850.074774] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 850.324392] audit: type=1804 audit(1669232161.747:1619): pid=31651 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/84/bus" dev="sda1" ino=14388 res=1 [ 850.329891] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:36:01 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(0xffffffffffffffff, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xac, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xac}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 850.486301] audit: type=1804 audit(1669232161.877:1620): pid=31652 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/84/bus" dev="sda1" ino=14388 res=1 19:36:02 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r5}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 850.559185] device veth0_to_bond entered promiscuous mode [ 850.593901] team0: Device macvtap51 failed to register rx_handler [ 850.617488] device veth0_to_bond left promiscuous mode [ 850.645030] audit: type=1804 audit(1669232162.067:1621): pid=31662 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir2693782222/syzkaller.HDrBKC/501/bus" dev="sda1" ino=14384 res=1 [ 850.680480] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 850.735979] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 850.789217] audit: type=1804 audit(1669232162.147:1622): pid=31663 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/85/bus" dev="sda1" ino=14394 res=1 [ 850.860545] audit: type=1804 audit(1669232162.247:1623): pid=31668 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/85/bus" dev="sda1" ino=14394 res=1 [ 851.335783] audit: type=1804 audit(1669232162.757:1624): pid=31660 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir2693782222/syzkaller.HDrBKC/501/bus" dev="sda1" ino=14384 res=1 [ 852.904873] IPVS: ftp: loaded support on port[0] = 21 [ 853.230320] chnl_net:caif_netlink_parms(): no params data found [ 853.290118] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 853.297185] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 853.305367] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 853.312468] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 853.321850] device bridge_slave_1 left promiscuous mode [ 853.328338] bridge0: port 2(bridge_slave_1) entered disabled state [ 853.336435] device bridge_slave_0 left promiscuous mode [ 853.341890] bridge0: port 1(bridge_slave_0) entered disabled state [ 853.351394] device veth1_macvtap left promiscuous mode [ 853.356842] device veth0_macvtap left promiscuous mode [ 853.362147] device veth1_vlan left promiscuous mode [ 853.367366] device veth0_vlan left promiscuous mode [ 854.935541] Bluetooth: hci3: command 0x0409 tx timeout [ 857.025391] Bluetooth: hci3: command 0x041b tx timeout [ 857.722732] device hsr_slave_1 left promiscuous mode [ 857.731930] device hsr_slave_0 left promiscuous mode [ 857.750210] team0 (unregistering): Port device team_slave_1 removed [ 857.760959] team0 (unregistering): Port device team_slave_0 removed [ 857.770654] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 857.782072] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 857.813807] bond0 (unregistering): Released all slaves [ 857.824893] bridge0: port 1(bridge_slave_0) entered blocking state [ 857.834544] bridge0: port 1(bridge_slave_0) entered disabled state [ 857.842299] device bridge_slave_0 entered promiscuous mode [ 857.851293] bridge0: port 2(bridge_slave_1) entered blocking state [ 857.857781] bridge0: port 2(bridge_slave_1) entered disabled state [ 857.864978] device bridge_slave_1 entered promiscuous mode [ 857.890099] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 857.899434] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 857.919548] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 857.927022] team0: Port device team_slave_0 added [ 857.933376] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 857.941385] team0: Port device team_slave_1 added [ 857.960270] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 857.966726] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 857.995251] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 858.007595] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 858.013842] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 858.040409] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 858.055934] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 858.063596] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 858.088895] device hsr_slave_0 entered promiscuous mode [ 858.095684] device hsr_slave_1 entered promiscuous mode [ 858.102035] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 858.109861] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 858.206989] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 858.257328] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 858.263418] 8021q: adding VLAN 0 to HW filter on device bond0 [ 858.274575] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 858.286600] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 858.293582] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 858.304493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 858.312707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 858.324162] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 858.331872] 8021q: adding VLAN 0 to HW filter on device team0 [ 858.344363] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 858.358466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 858.377563] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 858.389718] bridge0: port 1(bridge_slave_0) entered blocking state [ 858.396118] bridge0: port 1(bridge_slave_0) entered forwarding state [ 858.413085] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 858.420988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 858.430155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 858.439365] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 858.449202] bridge0: port 2(bridge_slave_1) entered blocking state [ 858.455624] bridge0: port 2(bridge_slave_1) entered forwarding state [ 858.499877] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 858.508412] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 858.517676] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 858.531679] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 858.546477] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 858.552567] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 858.562436] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 858.571036] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 858.631169] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 858.640239] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 858.647266] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 858.654079] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 858.667268] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 858.719850] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 858.738761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 858.809099] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 858.822005] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 858.830732] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 858.848018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 858.856447] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 858.863520] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 858.876595] device veth0_vlan entered promiscuous mode [ 858.889237] device veth1_vlan entered promiscuous mode [ 858.913668] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 858.932632] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 858.941422] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 858.950942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 858.968929] device veth0_macvtap entered promiscuous mode [ 858.976657] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 858.987085] device veth1_macvtap entered promiscuous mode [ 858.993627] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 859.004857] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 859.017809] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 859.027660] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 859.037591] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 859.047297] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 859.057398] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 859.067222] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 859.077239] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 859.086782] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 859.096793] Bluetooth: hci3: command 0x040f tx timeout [ 859.103358] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 859.113149] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 859.123590] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 859.134357] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 859.141757] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 859.150232] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 859.159043] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 859.167687] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 859.176180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 859.185706] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 859.195695] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 859.204887] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 859.215524] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 859.224638] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 859.234391] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 859.243588] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 859.253345] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 859.262717] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 859.272506] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 859.284156] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 859.291163] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 859.299186] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 859.307890] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 859.464680] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 859.479459] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 859.505657] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 859.517154] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 859.528230] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 859.536706] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 859.544302] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 859.553357] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 859.634523] audit: type=1804 audit(1669232171.057:1625): pid=31942 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3782150716/syzkaller.VXyUDn/0/bus" dev="sda1" ino=14399 res=1 [ 859.660569] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 859.729331] audit: type=1804 audit(1669232171.157:1626): pid=31944 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3782150716/syzkaller.VXyUDn/0/bus" dev="sda1" ino=14399 res=1 19:36:11 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:11 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r5}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:11 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x22a502, 0x0) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040), 0x402000, 0x0) ioctl$KVM_CAP_HYPERV_SYNIC(r0, 0x4068aea3, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r2 = getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x5, 0x4, 0x9, 0x1, 0x0, 0x5, 0xa433, 0x581de509007349e0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xcf, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x0, 0x0, 0x101, 0x4, 0x9, 0x1, 0x4, 0x0, 0x3, 0x0, 0x8}, r2, 0x9, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = gettid() fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x2, 0x4, 0x3, 0x91, r4}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) 19:36:11 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x60000000, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:36:11 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r5}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:11 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x354, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) [ 860.509701] device veth0_to_bond entered promiscuous mode [ 860.551469] team0: Device macvtap51 failed to register rx_handler [ 860.564978] audit: type=1804 audit(1669232171.997:1627): pid=31963 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3782150716/syzkaller.VXyUDn/1/bus" dev="sda1" ino=14427 res=1 [ 860.574489] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 860.595774] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 860.609183] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 860.643253] device veth0_to_bond left promiscuous mode [ 860.715165] audit: type=1804 audit(1669232171.997:1628): pid=31964 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir2693782222/syzkaller.HDrBKC/502/bus" dev="sda1" ino=14426 res=1 [ 860.771096] device veth0_to_bond entered promiscuous mode [ 860.796421] team0: Device macvtap1 failed to register rx_handler [ 860.819158] device veth0_to_bond left promiscuous mode 19:36:12 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 860.844609] audit: type=1804 audit(1669232172.027:1629): pid=31965 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/86/bus" dev="sda1" ino=14428 res=1 19:36:12 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 860.885867] audit: type=1804 audit(1669232172.167:1630): pid=31968 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir2693782222/syzkaller.HDrBKC/502/bus" dev="sda1" ino=14426 res=1 [ 860.934327] audit: type=1804 audit(1669232172.177:1631): pid=31969 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/86/bus" dev="sda1" ino=14428 res=1 [ 860.973136] audit: type=1804 audit(1669232172.217:1632): pid=31956 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3782150716/syzkaller.VXyUDn/1/bus" dev="sda1" ino=14427 res=1 [ 861.023958] audit: type=1804 audit(1669232172.447:1633): pid=31983 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3782150716/syzkaller.VXyUDn/2/bus" dev="sda1" ino=14428 res=1 [ 861.055168] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 861.087689] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 861.104143] audit: type=1804 audit(1669232172.507:1634): pid=31984 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/87/bus" dev="sda1" ino=14427 res=1 19:36:12 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:12 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x22a502, 0x0) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040), 0x402000, 0x0) ioctl$KVM_CAP_HYPERV_SYNIC(r0, 0x4068aea3, &(0x7f0000000100)) (async) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) r2 = getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x5, 0x4, 0x9, 0x1, 0x0, 0x5, 0xa433, 0x581de509007349e0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xcf, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x0, 0x0, 0x101, 0x4, 0x9, 0x1, 0x4, 0x0, 0x3, 0x0, 0x8}, r2, 0x9, 0xffffffffffffffff, 0x0) (async, rerun: 32) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r4 = gettid() fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x2, 0x4, 0x3, 0x91, r4}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) (async) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) (async, rerun: 32) socket$nl_route(0x10, 0x3, 0x0) (rerun: 32) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) 19:36:12 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x62020000, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) [ 861.329965] Bluetooth: hci3: command 0x0419 tx timeout 19:36:12 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r5}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:12 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r5}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 861.460097] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:36:12 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 861.517340] device veth0_to_bond entered promiscuous mode [ 861.566964] team0: Device macvtap51 failed to register rx_handler [ 861.630658] device veth0_to_bond left promiscuous mode [ 861.674248] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 861.707091] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:36:13 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x22a502, 0x0) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040), 0x402000, 0x0) ioctl$KVM_CAP_HYPERV_SYNIC(r0, 0x4068aea3, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r2 = getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x5, 0x4, 0x9, 0x1, 0x0, 0x5, 0xa433, 0x581de509007349e0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xcf, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x0, 0x0, 0x101, 0x4, 0x9, 0x1, 0x4, 0x0, 0x3, 0x0, 0x8}, r2, 0x9, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = gettid() fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x2, 0x4, 0x3, 0x91, r4}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x22a502, 0x0) (async) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040), 0x402000, 0x0) (async) ioctl$KVM_CAP_HYPERV_SYNIC(r0, 0x4068aea3, &(0x7f0000000100)) (async) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) getpid() (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x5, 0x4, 0x9, 0x1, 0x0, 0x5, 0xa433, 0x581de509007349e0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xcf, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x0, 0x0, 0x101, 0x4, 0x9, 0x1, 0x4, 0x0, 0x3, 0x0, 0x8}, r2, 0x9, 0xffffffffffffffff, 0x0) (async) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)) (async) gettid() (async) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x2, 0x4, 0x3, 0x91, r4}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) (async) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) (async) 19:36:13 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x65580000, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) [ 861.879477] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 861.951711] device veth0_to_bond entered promiscuous mode 19:36:13 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r5}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 862.054131] team0: Device macvtap51 failed to register rx_handler [ 862.091883] device veth0_to_bond left promiscuous mode 19:36:13 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r5}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:13 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x8000}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) 19:36:13 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:13 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:13 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x68000000, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) [ 862.411537] device veth0_to_bond entered promiscuous mode [ 862.444238] team0: Device macvtap51 failed to register rx_handler [ 862.506542] device veth0_to_bond left promiscuous mode 19:36:14 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x8000}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) getpid() (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x8000}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) (async) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) (async) 19:36:14 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r5}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:14 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x6a030000, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:36:14 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:14 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:14 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:14 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 862.837114] device veth0_to_bond entered promiscuous mode [ 862.871930] team0: Device macvtap51 failed to register rx_handler [ 862.907379] device veth0_to_bond left promiscuous mode 19:36:14 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:14 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x8000}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) getpid() (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0x8000}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) (async) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) (async) 19:36:14 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x6b020000, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:36:14 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 863.218759] device veth0_to_bond entered promiscuous mode [ 863.273018] team0: Device macvtap51 failed to register rx_handler 19:36:14 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 863.319697] device veth0_to_bond left promiscuous mode 19:36:14 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:14 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x6c000000, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:36:14 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getpid() r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={r3, 0xffffffffffffffff, 0x12}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000100)='wlan1\x00') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) 19:36:14 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xac, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xac}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:14 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 863.521401] device veth0_to_bond entered promiscuous mode [ 863.601179] team0: Device macvtap51 failed to register rx_handler 19:36:15 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 863.683784] device veth0_to_bond left promiscuous mode 19:36:15 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getpid() r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={r3, 0xffffffffffffffff, 0x12}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000100)='wlan1\x00') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) getpid() (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) (async) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={r3, 0xffffffffffffffff, 0x12}, 0x10) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000100)='wlan1\x00') (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) (async) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) (async) 19:36:15 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x74000000, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:36:15 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:15 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x74010000, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:36:15 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getpid() (async) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={r3, 0xffffffffffffffff, 0x12}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000100)='wlan1\x00') (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) 19:36:15 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 864.226342] device veth0_to_bond entered promiscuous mode [ 864.256208] team0: Device macvtap51 failed to register rx_handler [ 864.284462] device veth0_to_bond left promiscuous mode 19:36:15 executing program 3: unshare(0x60020200) timer_settime(0x0, 0x0, 0x0, 0x0) unshare(0x0) pipe(0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) eventfd(0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f00000002c0)=0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000440)={0x2, 0x0, &(0x7f0000000300)=""/85, &(0x7f0000000380)=""/130, &(0x7f0000000580)=""/162, 0x7002}) 19:36:15 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:15 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="e311765a30217e3c8934beebd3d9ec2fde2769d905f067820e31f2d0af36a3dc0f5482f64d62a842e9a99bdb50bd5a3a95ba4cb99b0cb644db8343a101d2485d2045a303780c19c9b03075048b3d0aaafa225b07b7f0bfb01531cb48711d8f8d01820ea94547f5c630a7294b020051b8", @ANYRES32=r0, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB='./file0\x00']) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000001c0)='\x00') r3 = getpid() r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x6, 0x1f, 0x0, 0x81, 0x0, 0x9, 0x0, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xa70, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0xa26, 0x0, 0x2e15df2f, 0x7, 0x100000001, 0x5, 0x800, 0x0, 0x29f3, 0x0, 0x6cf}, r3, 0x0, r6, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) [ 864.710899] IPVS: ftp: loaded support on port[0] = 21 19:36:16 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x1e8, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:36:16 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x7a000000, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:36:16 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:16 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="e311765a30217e3c8934beebd3d9ec2fde2769d905f067820e31f2d0af36a3dc0f5482f64d62a842e9a99bdb50bd5a3a95ba4cb99b0cb644db8343a101d2485d2045a303780c19c9b03075048b3d0aaafa225b07b7f0bfb01531cb48711d8f8d01820ea94547f5c630a7294b020051b8", @ANYRES32=r0, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB='./file0\x00']) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000001c0)='\x00') (async) r3 = getpid() (async) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) (async, rerun: 64) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) (rerun: 64) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) (rerun: 32) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x6, 0x1f, 0x0, 0x81, 0x0, 0x9, 0x0, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xa70, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0xa26, 0x0, 0x2e15df2f, 0x7, 0x100000001, 0x5, 0x800, 0x0, 0x29f3, 0x0, 0x6cf}, r3, 0x0, r6, 0x2) (async, rerun: 32) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) (rerun: 32) 19:36:16 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xac, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xac}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:16 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r5}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 865.047193] device veth0_to_bond entered promiscuous mode [ 865.075838] kauditd_printk_skb: 51 callbacks suppressed [ 865.075854] audit: type=1804 audit(1669232176.508:1686): pid=32306 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/98/bus" dev="sda1" ino=14446 res=1 [ 865.079964] net_ratelimit: 19 callbacks suppressed [ 865.079974] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 865.089847] team0: Device macvtap1 failed to register rx_handler [ 865.138786] audit: type=1804 audit(1669232176.558:1687): pid=32313 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir2693782222/syzkaller.HDrBKC/508/bus" dev="sda1" ino=14439 res=1 [ 865.163037] device veth0_to_bond left promiscuous mode 19:36:16 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x0) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:16 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xac, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xac}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 865.244957] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 865.340168] audit: type=1804 audit(1669232176.628:1688): pid=32306 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/98/bus" dev="sda1" ino=14446 res=1 19:36:16 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r5}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 865.402139] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 865.429234] audit: type=1804 audit(1669232176.668:1689): pid=32318 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3782150716/syzkaller.VXyUDn/8/bus" dev="sda1" ino=14447 res=1 19:36:16 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x0) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 865.580551] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 865.594459] audit: type=1804 audit(1669232176.768:1690): pid=32320 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3782150716/syzkaller.VXyUDn/8/bus" dev="sda1" ino=14447 res=1 [ 865.660907] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 865.691981] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 865.703905] audit: type=1804 audit(1669232176.818:1691): pid=32323 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/99/bus" dev="sda1" ino=14417 res=1 19:36:17 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x0) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 865.866170] audit: type=1804 audit(1669232176.908:1692): pid=32323 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/99/bus" dev="sda1" ino=14417 res=1 [ 865.966805] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 866.015585] audit: type=1804 audit(1669232176.978:1693): pid=32330 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir2693782222/syzkaller.HDrBKC/509/bus" dev="sda1" ino=14434 res=1 19:36:17 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(0xffffffffffffffff, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 866.044957] audit: type=1804 audit(1669232177.058:1694): pid=32333 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3782150716/syzkaller.VXyUDn/9/bus" dev="sda1" ino=14446 res=1 [ 866.099856] audit: type=1804 audit(1669232177.088:1695): pid=32334 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/100/bus" dev="sda1" ino=14454 res=1 [ 866.151242] device veth0_to_bond entered promiscuous mode [ 866.210734] team0: Device macvtap51 failed to register rx_handler [ 866.219136] device veth0_to_bond left promiscuous mode 19:36:17 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x1e8, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:36:17 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x7a010000, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:36:17 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r5}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:17 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="e311765a30217e3c8934beebd3d9ec2fde2769d905f067820e31f2d0af36a3dc0f5482f64d62a842e9a99bdb50bd5a3a95ba4cb99b0cb644db8343a101d2485d2045a303780c19c9b03075048b3d0aaafa225b07b7f0bfb01531cb48711d8f8d01820ea94547f5c630a7294b020051b8", @ANYRES32=r0, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB='./file0\x00']) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000001c0)='\x00') r3 = getpid() r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) (async) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x6, 0x1f, 0x0, 0x81, 0x0, 0x9, 0x0, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xa70, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0xa26, 0x0, 0x2e15df2f, 0x7, 0x100000001, 0x5, 0x800, 0x0, 0x29f3, 0x0, 0x6cf}, r3, 0x0, r6, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) [ 866.263428] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 866.446326] device veth0_to_bond entered promiscuous mode [ 866.481471] team0: Device macvtap51 failed to register rx_handler [ 866.517174] device veth0_to_bond left promiscuous mode [ 866.537473] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:36:18 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(0xffffffffffffffff, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 866.636606] device veth0_to_bond entered promiscuous mode [ 866.674517] team0: Device macvtap1 failed to register rx_handler [ 866.724409] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 866.741860] device veth0_to_bond left promiscuous mode 19:36:18 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(0xffffffffffffffff, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:18 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:18 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r5}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:18 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:18 executing program 2: ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400), 0x0, 0x10d882) memfd_create(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f57f7f2646972fa2e3a66696c6530"]) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) chdir(&(0x7f0000000100)='./bus\x00') r1 = perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400017, 0x2000006, 0x2012, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$SG_GET_REQUEST_TABLE(r2, 0x2286, &(0x7f0000000200)) write$eventfd(r2, &(0x7f00000001c0)=0x10000, 0x8) creat(&(0x7f0000000500)='./bus/file0\x00', 0x0) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x802, 0x0, 0x0, 0x20}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYRES16], 0x14}, 0x1, 0x0, 0x0, 0x20000800}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r3) pwritev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000001c0)="e9", 0x1}], 0x1, 0x4081002, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'syz_tun\x00'}) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x14, 0x52, 0xffffffffffffffff, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) getgroups(0x2, &(0x7f0000000600)=[0xffffffffffffffff, 0xee01]) lsetxattr$system_posix_acl(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x5}, [{0x2, 0x5}, {0x2, 0x6}], {}, [{0x8, 0x1, r5}, {0x8, 0x2, 0xee00}, {0x8, 0x4}], {}, {0x20, 0x1}}, 0x4c, 0x3) 19:36:18 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x7f990200, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:36:18 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x1e8, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:36:19 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 867.568595] overlayfs: unrecognized mount option "loW÷òdirú.:file0" or missing value [ 867.598032] device veth0_to_bond entered promiscuous mode [ 867.703516] team0: Device macvtap51 failed to register rx_handler [ 867.716804] device veth0_to_bond left promiscuous mode [ 867.778373] device veth0_to_bond entered promiscuous mode 19:36:19 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 867.827388] team0: Device macvtap1 failed to register rx_handler [ 867.905133] device veth0_to_bond left promiscuous mode 19:36:19 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r5}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:19 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:19 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:20 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:20 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x0) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:20 executing program 2: ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) (async, rerun: 32) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) r0 = syz_open_dev$loop(&(0x7f0000000400), 0x0, 0x10d882) memfd_create(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) (async) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) (async) mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f57f7f2646972fa2e3a66696c6530"]) (async) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) (async) chdir(&(0x7f0000000100)='./bus\x00') r1 = perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400017, 0x2000006, 0x2012, 0xffffffffffffffff, 0x0) (async) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$SG_GET_REQUEST_TABLE(r2, 0x2286, &(0x7f0000000200)) (async) write$eventfd(r2, &(0x7f00000001c0)=0x10000, 0x8) (async, rerun: 32) creat(&(0x7f0000000500)='./bus/file0\x00', 0x0) (rerun: 32) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x802, 0x0, 0x0, 0x20}, 0x10) (async) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYRES16], 0x14}, 0x1, 0x0, 0x0, 0x20000800}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r3) pwritev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000001c0)="e9", 0x1}], 0x1, 0x4081002, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'syz_tun\x00'}) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x14, 0x52, 0xffffffffffffffff, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) (async, rerun: 32) getgroups(0x2, &(0x7f0000000600)=[0xffffffffffffffff, 0xee01]) (rerun: 32) lsetxattr$system_posix_acl(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x5}, [{0x2, 0x5}, {0x2, 0x6}], {}, [{0x8, 0x1, r5}, {0x8, 0x2, 0xee00}, {0x8, 0x4}], {}, {0x20, 0x1}}, 0x4c, 0x3) 19:36:20 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 868.833306] overlayfs: unrecognized mount option "loW÷òdirú.:file0" or missing value [ 868.835523] overlayfs: failed to resolve './file1': -2 19:36:20 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x80990200, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:36:20 executing program 2: ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = syz_open_dev$loop(&(0x7f0000000400), 0x0, 0x10d882) (async) memfd_create(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) (async, rerun: 32) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) (async, rerun: 32) mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) (async) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f57f7f2646972fa2e3a66696c6530"]) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) (async, rerun: 32) chdir(&(0x7f0000000100)='./bus\x00') (async, rerun: 32) r1 = perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400017, 0x2000006, 0x2012, 0xffffffffffffffff, 0x0) (async) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$SG_GET_REQUEST_TABLE(r2, 0x2286, &(0x7f0000000200)) (async) write$eventfd(r2, &(0x7f00000001c0)=0x10000, 0x8) creat(&(0x7f0000000500)='./bus/file0\x00', 0x0) (async, rerun: 64) r3 = socket(0x10, 0x3, 0x0) (rerun: 64) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x802, 0x0, 0x0, 0x20}, 0x10) (async) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYRES16], 0x14}, 0x1, 0x0, 0x0, 0x20000800}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r3) (async) pwritev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000001c0)="e9", 0x1}], 0x1, 0x4081002, 0x0) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'syz_tun\x00'}) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x14, 0x52, 0xffffffffffffffff, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) (async) getgroups(0x2, &(0x7f0000000600)=[0xffffffffffffffff, 0xee01]) lsetxattr$system_posix_acl(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x5}, [{0x2, 0x5}, {0x2, 0x6}], {}, [{0x8, 0x1, r5}, {0x8, 0x2, 0xee00}, {0x8, 0x4}], {}, {0x20, 0x1}}, 0x4c, 0x3) [ 869.001851] device veth0_to_bond entered promiscuous mode 19:36:20 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x0) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 869.055685] team0: Device macvtap51 failed to register rx_handler [ 869.173737] device veth0_to_bond left promiscuous mode 19:36:20 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r5}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:20 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x0) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:20 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:21 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x81000000, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:36:21 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:21 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 869.935767] device veth0_to_bond entered promiscuous mode [ 870.002073] team0: Device macvtap51 failed to register rx_handler [ 870.057996] device veth0_to_bond left promiscuous mode [ 870.088606] net_ratelimit: 15 callbacks suppressed [ 870.088617] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:36:21 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r5}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:21 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 870.239737] kauditd_printk_skb: 42 callbacks suppressed [ 870.239752] audit: type=1804 audit(1669232181.668:1738): pid=32466 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir4247018496/syzkaller.Rf6NE1/48/bus" dev="sda1" ino=14002 res=1 [ 870.356904] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 870.400882] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 870.452659] audit: type=1804 audit(1669232181.768:1739): pid=32536 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir2693782222/syzkaller.HDrBKC/513/bus" dev="sda1" ino=14130 res=1 [ 870.685492] audit: type=1804 audit(1669232181.928:1740): pid=32539 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir2693782222/syzkaller.HDrBKC/513/bus" dev="sda1" ino=14130 res=1 19:36:22 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xac, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xac}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:22 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:22 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r5, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) [ 870.965838] audit: type=1804 audit(1669232182.388:1741): pid=32551 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir4247018496/syzkaller.Rf6NE1/49/bus" dev="sda1" ino=13959 res=1 [ 871.000529] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 871.098421] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 871.150892] audit: type=1804 audit(1669232182.408:1742): pid=32548 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir2693782222/syzkaller.HDrBKC/514/bus" dev="sda1" ino=14132 res=1 19:36:22 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:22 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r5, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) [ 871.330307] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 871.347396] ieee802154 phy0 wpan0: encryption failed: -22 [ 871.353024] ieee802154 phy1 wpan1: encryption failed: -22 [ 871.444448] audit: type=1804 audit(1669232182.598:1743): pid=32553 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir2693782222/syzkaller.HDrBKC/514/bus" dev="sda1" ino=14132 res=1 19:36:22 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 871.559911] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:36:23 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x81990200, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) [ 871.653046] audit: type=1804 audit(1669232182.808:1744): pid=32559 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/114/bus" dev="sda1" ino=14130 res=1 19:36:23 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 871.791039] audit: type=1804 audit(1669232182.988:1745): pid=32565 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir2693782222/syzkaller.HDrBKC/515/bus" dev="sda1" ino=14132 res=1 [ 871.817309] device veth0_to_bond entered promiscuous mode [ 871.893189] audit: type=1804 audit(1669232183.168:1746): pid=32566 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir2693782222/syzkaller.HDrBKC/515/bus" dev="sda1" ino=14132 res=1 [ 871.923886] team0: Device macvtap51 failed to register rx_handler [ 871.952911] device veth0_to_bond left promiscuous mode [ 872.069070] audit: type=1804 audit(1669232183.248:1747): pid=32572 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/115/bus" dev="sda1" ino=14309 res=1 [ 874.381978] IPVS: ftp: loaded support on port[0] = 21 [ 874.661819] chnl_net:caif_netlink_parms(): no params data found [ 874.811132] bridge0: port 1(bridge_slave_0) entered blocking state [ 874.818183] bridge0: port 1(bridge_slave_0) entered disabled state [ 874.827194] device bridge_slave_0 entered promiscuous mode [ 874.835008] bridge0: port 2(bridge_slave_1) entered blocking state [ 874.841591] bridge0: port 2(bridge_slave_1) entered disabled state [ 874.849134] device bridge_slave_1 entered promiscuous mode [ 874.970271] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 874.980485] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 875.001032] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 875.008979] team0: Port device team_slave_0 added [ 875.015297] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 875.022832] team0: Port device team_slave_1 added [ 875.042169] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 875.048502] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 875.073818] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 875.194011] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 875.200596] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 875.226197] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 875.248020] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 875.255480] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 875.263237] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 875.271279] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 875.279605] device bridge_slave_1 left promiscuous mode [ 875.286199] bridge0: port 2(bridge_slave_1) entered disabled state [ 875.293452] device bridge_slave_0 left promiscuous mode [ 875.299456] bridge0: port 1(bridge_slave_0) entered disabled state [ 875.308820] device veth1_macvtap left promiscuous mode [ 875.314385] device veth0_macvtap left promiscuous mode [ 875.319805] device veth1_vlan left promiscuous mode [ 875.325020] device veth0_vlan left promiscuous mode [ 876.294242] Bluetooth: hci3: command 0x0409 tx timeout [ 878.374047] Bluetooth: hci3: command 0x041b tx timeout [ 879.694491] device hsr_slave_1 left promiscuous mode [ 879.702094] device hsr_slave_0 left promiscuous mode [ 879.720727] team0 (unregistering): Port device team_slave_1 removed [ 879.730438] team0 (unregistering): Port device team_slave_0 removed [ 879.742654] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 879.754964] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 879.785901] bond0 (unregistering): Released all slaves [ 879.798686] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 879.808488] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 879.832110] device hsr_slave_0 entered promiscuous mode [ 879.838692] device hsr_slave_1 entered promiscuous mode [ 879.846528] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 879.853789] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 879.933447] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 880.009055] 8021q: adding VLAN 0 to HW filter on device bond0 [ 880.022189] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 880.037760] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 880.048164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 880.060251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 880.073366] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 880.083244] 8021q: adding VLAN 0 to HW filter on device team0 [ 880.099198] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 880.108870] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 880.120800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 880.131961] bridge0: port 1(bridge_slave_0) entered blocking state [ 880.138485] bridge0: port 1(bridge_slave_0) entered forwarding state [ 880.156540] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 880.170009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 880.177788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 880.192314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 880.200919] bridge0: port 2(bridge_slave_1) entered blocking state [ 880.207340] bridge0: port 2(bridge_slave_1) entered forwarding state [ 880.225275] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 880.233489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 880.265698] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 880.275488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 880.286235] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 880.289108] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 880.327579] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 880.327593] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 880.328435] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 880.380618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 880.389042] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 880.400419] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 880.413451] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 880.423750] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 880.438161] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 880.447401] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 880.462357] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 880.471799] Bluetooth: hci3: command 0x040f tx timeout [ 880.482965] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 880.495948] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 880.502394] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 880.511412] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 880.526934] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 880.589950] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 880.602565] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 880.688699] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 880.700045] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 880.708358] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 880.725274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 880.733070] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 880.744414] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 880.754408] device veth0_vlan entered promiscuous mode [ 880.768983] device veth1_vlan entered promiscuous mode [ 880.776194] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 880.787837] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 880.802484] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 880.815749] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 880.823438] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 880.833684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 880.845516] device veth0_macvtap entered promiscuous mode [ 880.858118] device veth1_macvtap entered promiscuous mode [ 880.871113] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 880.882130] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 880.894542] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 880.904850] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 880.915834] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 880.928329] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 880.938423] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 880.948693] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 880.958185] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 880.968887] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 880.978859] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 880.988660] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 880.999176] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 881.006620] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 881.014325] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 881.022366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 881.041248] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 881.051898] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 881.069305] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 881.081071] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 881.091250] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 881.102128] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 881.111737] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 881.122035] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 881.131626] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 881.141777] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 881.152495] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 881.160225] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 881.167817] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 881.178069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 881.310151] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 881.321675] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 881.346548] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 881.367201] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 881.379196] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 881.386220] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 881.393347] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 881.400570] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 881.443398] kauditd_printk_skb: 2 callbacks suppressed [ 881.443414] audit: type=1804 audit(1669232192.869:1750): pid=388 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir1849430255/syzkaller.ZZTaSn/0/bus" dev="sda1" ino=14457 res=1 [ 881.448215] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:36:32 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:32 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r2 = getpid() r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) r5 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000002340), 0x304002, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000600000000000001060bc50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='rxrpc_local\x00', r6}, 0x10) r8 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r8, r7, 0x0, 0x1, &(0x7f00000001c0)='\x00'}, 0x30) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000600000000000001060bc50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='rxrpc_local\x00', r9}, 0x10) r11 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r11, r10, 0x0, 0x1, &(0x7f00000001c0)='\x00'}, 0x30) fstat(0xffffffffffffffff, &(0x7f0000002380)={0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)=0x0) ioprio_get$uid(0x3, r14) r15 = ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) r16 = openat$cgroup_subtree(r1, &(0x7f0000002400), 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002540)=[{{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000180)="21b39ff22dd0ad9dc6af9bab5912b96b31b931f06e1bbe8cb61040deec94650b9bdf073ac2c9bc5fbff817af737f1c326eb07a08c58f2683b5bea9b0da0d472ffa5c0e309e1ae8723d8130e6cc8b5ee59a8e6ada5dfb6a06751b04c795cf702800fdef1e874b95dbe46fa17e39da75a42509c56ced0f29bdada5c342268182fecb06a92e49a70c9c128a3d1e8905f80a93df1f0fa876c26bbbe37c4567ec7fc2bc18f70bb35a67b2e29ff9d57e96aca9ac92c783302847fc0170671d3def69f64c6795e87fe304fa675271ee5a4a8ff798482db68edd27937dcdc340abbebd57", 0xe0}, {&(0x7f0000000340)="ad3ad7424c32dfb338c59c1d95ebb19b77706a1770b1b680f2f98beba532cc56459bdbe0c4d15c857270366c12cdbbb72c631d7a20d6a4f058c76a1498db810517b3021b97bd2cd521cece262e32be9ae1915fc911273f4152f2ede828c322b46b0e30a9d4473019beb704fe6bc983358985086e56090fc5a90616fd6f3b113fa5ccb3a3536f28113409cff37bd00e52b6c3fd754dfbf2871ce023f895f2db3a7cb76f0d10be35bab2450ae36f964320130ae2a89f4a4271052cbbf6bb020d14c7aa621f0433a85ade7c97ba8220dee458c9a6f7be9452581b72b228b84aad9f027a2baae71cd8b839bf941ebcc43bcb2b0188b60925d15d11652788e06e2845ce47e3c5eaa5eba64465015e0c0e0dd03722f9d45b9859a4a0ac1430ac715557e1082816bbbda823a0a3c1eee373f27aa05e1d6d8e7457b61b904a0de08a5791f45d2763b0316d1a86e78afa7a0d2d967a231617517b8c27828f62d394b5eefbc1cd91a23300dcb1b4f1db8bbb622ea6808cce81cde17047ac3953e4201e6876625a32a53506a5bb1fbcbf812e286d01adc18a405a63b006fec96fda8f5ad749157f805d354512a1fb9bfd5667466de3ff0cdef3c2ce67e594c08d3adecca473be2df354e5207a293e908ba190496ce771c21568941f3770f0adedbfbb7f0ffd6ba35f81db2d36d192f6e8564ec2101a8d12a3e9588de01adeba4192eac26d6915d30d25c99362efe6165d321cbf8e37ee450a4f81ce21300e30e5c31a240518849289acb7fb922e233658bddc3f38d887094f24172c25c660900cb73a4b09dbfa836218d4e1e64511651f42a528b80d20d184bbe17df5adc544a5e20c275cdad152666249302ec4ec1fadf8bf4551656c2ce50153ea80ceaa3fdd81bd87b973415b6c92522967e3b8e2a565b2dbd695d980d5537cd9f7fe838ad0585daf2d85b4afdc21fe8638d1d5ccef9d0c4ef5b9da7449918574876593e984251989fbd8f230b5b23af3e8259d99bff80362012ef8c79c495df5e62430558dfadda28812b3256668d8bc316c7abfa1688fc9d2c6c16818ad7dcdb553b2b5ee7e4929fc8cd2fc1fb3a88d489260e99eb1292de38174f77cad6f0b05681ca20d183429d356e250640e82292800ada5eb67e4f9085ee22b8947410a54aea1d55e10088adf3b53b3b33741efe45e85f4aec87c761635dc833a6b3ea53ef8ab38ed00b1cd6e875503966f60cc233913c7a3b1f019f894fdca26c2fba3d5ce70004f5a6a149d326d9442a0bffc0d21716b2ec0f5b00259d25fc9fb07a9e0827302f086ef096ccaf201e48584e9f37de60d844b668a45a7a9cac72d9d8aadba6138a08453fa49b6866c167c9261253b566f743f8848307b65c0b18294ab3b945ff07edf176cd864892b6cd15003b106e0f0d6bb224ba336d33e65c0cb88c32f35e99930c36613e74541c54df3906fb0efaf0c56c5b60cfc99b0f0e2821073dd53ed247c7dcda1a2ae674b62cde93543f8a7449e62a1104519f7b9f82eba9a18ae9a64a6e7f4f6730141ad657577dbe6a48a2cacd318a46c4ef69c0bc5210ac318c687988beadf2b09eaa803ffa094250f086b09bf3f055dcc5f52183d82fd316af98bbdd5f6327d268677debd8dd2f804c9be2c99a2ed243cbdb85acce4c26db27e23690bff8cfddd34789ddceeeff1e7934595aea8178c9c77bcc5027997b9c28bef9072c36517fa0f2d115ecb4e9ad90e315fc9a45fb6e36b6e6a661330cf7b34f032c741bc72d7d15304acfb8ff377055530baed02b2e45e7ee9ab47023490b148346b50d158e5b05f6347035a99fb2587a57eb81fee5c8fd34bc17af5029a73d525e0c08fff2c4e622bd56a36107612e527de7efc99694bb1a958b40d659886a22240eab4c46a7f6091b55f2615d84f03f470babab8db19ef2a332aca8d9c930875d6cfa576696daa45990db36aadb678b0c66e6b53238597170f0409b1c81c21a0339396e8ad316ed4416682aad656606fb7de5414a8b0ceb8e8113b73ce63dac6b778de40d7eff4f949b142476260479fdf2234688017a0b6431be69b2ad594f6631d2f6c9033e61d9225b3ab81653de0aa6b5762e221d128b4339abf9b29689b7366d7cd4a260b2d677335a13ba9f4e5e3ca9b8ed1a1cd5bae8d7d03f6678b453927b8f4b3c9e303d39fc5e84214fcaebeb1f87b22addefdeef5bebbd29ba9dba0c86fa65a730c65ace7b64c720eb35d6d103cf4c0ded1f6d710fe9500f4f2fc94b7e285c5d61c01ad09baee566f42c56ee4208702d0402b19798f5cfe717fc65b84a100f9a167e2baa2dbb93da8e9ce2ce3cb3e2759502c550dea0758d133f57e67111abb6fe86500444802580cba834144d9afe0662a9c8edc7f30453bfc4864ad51565656164330c4f8e0fdfb10addf5ce52c3774fbba1a54755a0eeaf9d389be4e3e53281aa057d740f5a496de5335697afccce24b239f90571ea40c2312d7dce87ee959ff8fb5862c9e885956013e608b138a0380d81129e1e7205f1300e46fc878c24a3ea9499e7f64973bfd3aed50b4546b708ee57d6a58887332a56f7124c8f28a50be3cc83d8f98c903fa737f007f5211c8de7278dcb7318062417b9f2a8214c613e37ef16604759a5624ade9966ac7e344bfc849af3e4b9f9ea4ae153f3c06386234872f73138a828617fe7e7a72fe8fcdec295cb0a5762d12cec98fbce2f88d898526968b1e611a3ef912747b007a656c19401a0eaae188fb2efb6ef609442f40f8e0fcb4f15780492f6d021e652d704581496efb5294730671e67c85d34e9ae1ba95c7cebf2211869abf42f51271c4eb3f2aa560890812c53612e7cc51282d3ab68d8a223b2e74057cdaf12cf1902fb711e7a1f1fafb0163200e7a1ca163037ffcca8a5370434867fef22219d8488f630081c53039aa392b3160571cbd4488528d210b3116daedb0134fdac986aa135c78737062fc2ac2319e6eda57cec9791df645e6ad7ef2da754825463ab854b5936e920b6f6afadd269c5ed4a28b1e90c64792670e97815f9c4d625f0eba5fb3165f227ced2ee5262b62b8c7ed21cc719b32991012fc1784e1703cdacbb0a2d75f7f5c3695211f560c3a8ec95701c650826ec64ad4fc0051cbc09ddf8f7e0b146f6b11598b11f0c8000f8af1a41f5fcfd7273cec4ab58f3c5dd59ec948c3faa8ea0e0fa3b2d517f3447c1927530fcde1ac50406eed63e215cd497856c07b328e58d6456909538169704de088428247e745fb41ab99d1f8f61110006a5f48d8d8ff39171effae7e2d413a88b171572c71aa0358590525dd40187f67cad1188927d3762cb2624fbbe611c3eb2bc2486f0313ec2ef99d0185841832dcce666a59cdf9f6076ec8959e51ed752d940eb27b9ef43db8308bd40135da6089af89f6f78e1facc4fcc0970bb3040cbf87280045af7253285f0c85f7e8219fe2b846403395500eab76c7437c7ac65c0f665de077b6bbdd71c33a0bbc767bb92424341ee40a0f4ab87688209b9ff579d6dc1c95b66e49f79a846d169377e0fe8e0563a2ae2cbb0084ec91c0e2a20b27645aab4151832d10a59bc114f055ed56f09528cd753afaec6b4e19cfebdd44c8b86e6005aa728738d3fa5b60d3ca99de4fffee70f28d688f6a3cfe2e45ff67f88d853dade2b9929501e6dd21c005c8017d7ec3e31b17b1d4a8b9e20e38a3772b66331cf946c3de61004fed90c3c063ecb4171c53772715fb8d20f39803e8a526acf86fc96ed8cac3805bdf0cdd0650e098476c5742de9f7602e869350d2c663ab7a66cce7e491b41b7f5139a84bcc754e6890dd214a228e5c38a5c374728878f7a398710b9508b95f559f4ba1ef1c3eba24a1eb1950b244de9e02d35e8e212d98ec6b052afab51a1b2c70d0a7f38ec58d9e4977b49cdce6b7488b3523cbfd998c67c2630144a5f551096e8a945c3134701300b4e18b10389473abde16afc907b204796ee1ef8a8c1363f4a1921b79ee1a847ec6b191ade98925e0b4c29d3d923d0f41e4e3fcab4a47bb5f18d6aa2d405c1d6493855cdc7a238b4bcf5150481e229d08d91c4c868f143961cc42305edef8227ae4e889f9a23ca09a26efa340e4474f79a643bbd2256a727f1ec8f14f9a5900b4147a16d12e1e27f0a5d391f41d991099f99c9ede1f8cf080e477626acce0589bff5f552bf47f31a45ce819680b280a9d17dd6278e57de608ce2bc605b635de0a4e0ddb3479304bdee930c0c67f080b1fd99508a49dd7d75b42e6ac2429c8818bda7e0ce58169e725e19bd8444acdf01e5dd2bbb20f6cb810daa3a5d5ebb510dbd5ac664590acbd8da65230c2022ad5e108204d38f754c82467957e5b6b5a054667bf82d426037bf60e6b8163174bec4dda3da6211781dff749fc309d268293396cd7bfbca38900d76d43075c938606d179abc83de6c3efac8ac4b025b7177519e03cbbfb4d3405c6508a267cda55ee22c59c00fd76d1d2669753894125e4363678df1a34c8d93a55537ebf60c862aceb92401340214c8c0a0ca620221be5755edbbb07ac18ab1b21646eaed521301218206b9d3b3c097e1ab088ee48234ca9dfd48a5eb221c77d2f88fcb6186075ccdaa12b9a877c7efe3c9cc9a5ced0038ec093f78f0004cc5e7abc25bd1fdfa43f4e63cf1fb0f100cb10ce3d585d82b35edd3f97f53a0e38128b855d3c1ecd8f5d81d76ab52f94f64bf92f957e6f7c36dcb0fa68e292179567ab72e5c69bf447c50a715264acff42745c9df1fa56f0a58553f2670a8ce8601d051b15e9da298e45064ab18da50dbcf79b6bb9743bdca696bbb304cbf0c25a7fbdb33a8db7d7bb90e3fbcfb7381eb138b7586bf404975ec4b4e46739fa86acc2972934912b8e25262b2a657a647c7428432c0d9bffcce5c74070ff1c9d63ac884b5b6cfe4e54a8fe4e6b183186c0520ce773a4cd7ddd43ab06f0ba553f77ec9394fa63d9d28f72c64013805c841ca4369be87a4c40717139e154b7fcc8a5947fa4003ebdb357e09d785d22c59e8d054d32e21e9089f038302eadc8eb143032a51808d79553758d4066ba9210eaa7f440d0a74b52e254ab999b8fb2af2e5fe0d52539e06bfd777746a656030d7069eee0aa921f19e05475d39f887e37f606d67855e876363514e0b3e336be2909f9a070e7b8c0fbd59f4a5a1aa2a0f72e51bb3aadfdac8b8666a2979eec004db3559a8ed7432185e911ed01f8938e93ed4b8ab73722e9df0b4073acaee28a98518c56941c8369d1b7ae116e9302da122dfd8d5b8586236a3f85d3b740fc392cf361434913000b82a565d9c2de7b17138ecad6186d619a1197d3bb66709301b7dc015a433af883a50fb6c5b93f1f3db5255d56f98a0aa7eb14a32e6cdc2178081e05219e8c4a3060d9a8cd4f792364deee49a826b1a180f3b1ba0240609a3b04171dae4d55a0f72fc8a01f5d24f1095442a22523d9dd5d63c36821863ab72a3a1b9d5e1d71eedfbf3bf10647ea9dd503123cc8599cd05f3ef99493c4475ea83f38f6d1f7368340c3c8e863cdf37b2bf837421c2c0644f4efc954eccc318557c09c149db46a436c1bf7bd33639207cea25548bd45f1cd09bd8a30d6e7735b082b833fcfe755391d30cfb0d5d7af05ed1780b1996bbf227d43fb35e327b944808f2fdae528b74f0a6f36d61c8f7a45b839ff5de100fc4d8dc36a50f6bdbe9e325f2240038d70d9659eb8f6a8604ae7cd0c3e78c3e17c6f89af2324dce0d3a4999231a9759a2587a697b7fa7a6eddcb3e056bca9d6cf9e9388ec572971baa8164f", 0x1000}, {&(0x7f0000000040)="68faa566", 0x4}], 0x3, &(0x7f00000013c0)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r1]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x60, 0x800}}, {{&(0x7f0000001440)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001800)=[{&(0x7f00000014c0)="ae1609b30cbfad9261bdde7163a8d56283005e81b2e42240058b1bcde0bf3473ab5b049fd8143267e07474404ee4de5ba78adae1f8cbeebd702aa6705fa3ade43c63b65c79f4808e8cecc0d7562aa90ccd80f9b47ba401d3db5b879a6d6e38221585307d3cb923d30535521c26c248447d4c056d3b072747b35565e9b5f82f1945e7b184bf27b036227593e4ed1f04ce4c26ea00fcb849098af991ddbdaab6cb2b87564228ee11adc4a6e37f4c28a44ef02ee3e87f028b765fc8d4206c0ecb259264434b41e148a0fc284b37d5627dee64e20cb4b8c4707dd4b827fcf873a0b5ec97eb5bdb6948075fa545", 0xeb}, {&(0x7f00000015c0)="4cfca29f0594b038c011b2ecb9d66f2ed8ba97d4413db6f15f8a22ed7c2d3d09d6956f4cf62bfc43b3b3c2789bbcf3c11b9d5434a0fa905d88c5211c51230f7db3951ad27bea42c96455c2d6bb193d8c92d71c3e5c7580cad45828aa7ecef83ef73e2f9d9a0b9605e3af499c19c04be282c7b6c955634bdc74c3ace7de7c25293dbab96f893ddb0f9cd48604194fc028ba36131d0f58d8f008c3af0b524f9ab32ba333194580a639df82cb4f1e76538f07e0c6a7a210c534280752c84d48de5532e9385de9", 0xc5}, {&(0x7f00000016c0)="1920eb494486c10e9ba29c65f699730555d5fe7ff49cadb83436f9111da055950e321447086af0c8efc9ea86bcfa5a28c3de358a75eb09b0cb0d1abe29666282098f4cdd2453c94a50325971a790c98c11133ae20dcd27c53ab9e6d67f44aa06fb0fc9f64c06fe8267791444aeb36ba244c04678d9b120b721e3470bda3b22f86f8e58b25a8ef81ef74ad15b765af855d35ab8d0d7f7ad45579e073b426775700789ac303472025e2aa5543851a7cb4398456d280d7d68204405c8154b", 0xbd}, {&(0x7f0000001780)="1c794fc7b5bf3c5a9ce916bd0f62510d767d48fb4567339f8462c0eeff0823c7ae78ee567bb2f348976807e975be7427c86c6e8c2775a0fc9bd460c05c1db5c7070463d962bab61777486f68db25c3f0901f563d666b490a5218efa1d332a19b4d082b6469aa95ddd27a1eaa96", 0x6d}], 0x4, &(0x7f0000001b40)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x14, 0x1, 0x1, [r1]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}], 0x90, 0x1}}, {{&(0x7f0000001c00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001cc0)=[{&(0x7f0000001c80)="1115e47e24240061665cbcbeaad31fccaa626e7cd2ab", 0x16}], 0x1, &(0x7f0000002040)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r3, r3, 0xffffffffffffffff, r1]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r2, 0x0, 0xee01}}}, @rights={{0x24, 0x1, 0x1, [r1, r0, r0, 0xffffffffffffffff, r3]}}, @cred={{0x1c, 0x1, 0x2, {r2}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}], 0x128, 0x4000}}, {{&(0x7f0000002180)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002300)=[{&(0x7f0000002200)="dbd269c5d45fc0aa7a853753c612c329a2d2756472ada40f13174faeb1ccbcf239ea21b84abc4001e556e77c9b593ec96611704fb5cea07a030e2c529babde6d22388ac01fc98db612dc329b85674dc3", 0x50}, {&(0x7f0000002280)="1349d8f02c3e209e8d01fbb56652633b553608330102c66abfe22e2305e01110bc8ce407f7a5181bf669a9b79a49447cddbf626054048bdb46c44104a0b473280824c4b49e92f986632869abdb3c1b8c73c3", 0x52}], 0x2, &(0x7f0000002440)=[@cred={{0x1c, 0x1, 0x2, {r2, 0x0, 0xffffffffffffffff}}}, @rights={{0x28, 0x1, 0x1, [r1, r4, r3, r5, r1, r1]}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee00, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r11, r12, r13}}}, @cred={{0x1c, 0x1, 0x2, {r2, r14}}}, @rights={{0x1c, 0x1, 0x1, [r15, r16, r1]}}], 0xc8, 0x14}}], 0x4, 0x8040000) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r17, 0x8914, &(0x7f0000000080)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) 19:36:32 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x82990200, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:36:32 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xac, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xac}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:32 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, 0x0, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:32 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, 0x0) [ 881.492718] audit: type=1804 audit(1669232192.919:1751): pid=388 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir1849430255/syzkaller.ZZTaSn/0/bus" dev="sda1" ino=14457 res=1 [ 881.571926] audit: type=1804 audit(1669232192.999:1752): pid=399 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir1849430255/syzkaller.ZZTaSn/1/bus" dev="sda1" ino=14468 res=1 [ 881.658583] device veth0_to_bond entered promiscuous mode 19:36:33 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 881.765222] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 881.781064] audit: type=1804 audit(1669232193.009:1753): pid=399 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir1849430255/syzkaller.ZZTaSn/1/bus" dev="sda1" ino=14468 res=1 [ 881.787446] team0: Device macvtap51 failed to register rx_handler [ 881.861709] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 881.912173] audit: type=1804 audit(1669232193.099:1754): pid=399 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir1849430255/syzkaller.ZZTaSn/1/bus" dev="sda1" ino=14468 res=1 19:36:33 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, 0x0, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 882.105872] audit: type=1804 audit(1669232193.149:1755): pid=410 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/117/bus" dev="sda1" ino=14488 res=1 [ 882.130682] audit: type=1804 audit(1669232193.159:1756): pid=412 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir4247018496/syzkaller.Rf6NE1/50/bus" dev="sda1" ino=14474 res=1 [ 882.131087] device veth0_to_bond left promiscuous mode [ 882.161562] audit: type=1804 audit(1669232193.279:1757): pid=400 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir2693782222/syzkaller.HDrBKC/516/bus" dev="sda1" ino=14457 res=1 [ 882.344332] audit: type=1804 audit(1669232193.659:1758): pid=409 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir2693782222/syzkaller.HDrBKC/516/bus" dev="sda1" ino=14457 res=1 19:36:34 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r2 = getpid() (async) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) r5 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000002340), 0x304002, 0x0) (async) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000600000000000001060bc50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='rxrpc_local\x00', r6}, 0x10) (async) r8 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r8, r7, 0x0, 0x1, &(0x7f00000001c0)='\x00'}, 0x30) (async) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000600000000000001060bc50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='rxrpc_local\x00', r9}, 0x10) (async) r11 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r11, r10, 0x0, 0x1, &(0x7f00000001c0)='\x00'}, 0x30) fstat(0xffffffffffffffff, &(0x7f0000002380)={0x0, 0x0, 0x0, 0x0, 0x0}) (async) r13 = getgid() getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)=0x0) ioprio_get$uid(0x3, r14) (async) r15 = ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) (async) r16 = openat$cgroup_subtree(r1, &(0x7f0000002400), 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002540)=[{{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000180)="21b39ff22dd0ad9dc6af9bab5912b96b31b931f06e1bbe8cb61040deec94650b9bdf073ac2c9bc5fbff817af737f1c326eb07a08c58f2683b5bea9b0da0d472ffa5c0e309e1ae8723d8130e6cc8b5ee59a8e6ada5dfb6a06751b04c795cf702800fdef1e874b95dbe46fa17e39da75a42509c56ced0f29bdada5c342268182fecb06a92e49a70c9c128a3d1e8905f80a93df1f0fa876c26bbbe37c4567ec7fc2bc18f70bb35a67b2e29ff9d57e96aca9ac92c783302847fc0170671d3def69f64c6795e87fe304fa675271ee5a4a8ff798482db68edd27937dcdc340abbebd57", 0xe0}, {&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000000040)="68faa566", 0x4}], 0x3, &(0x7f00000013c0)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r1]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x60, 0x800}}, {{&(0x7f0000001440)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001800)=[{&(0x7f00000014c0)="ae1609b30cbfad9261bdde7163a8d56283005e81b2e42240058b1bcde0bf3473ab5b049fd8143267e07474404ee4de5ba78adae1f8cbeebd702aa6705fa3ade43c63b65c79f4808e8cecc0d7562aa90ccd80f9b47ba401d3db5b879a6d6e38221585307d3cb923d30535521c26c248447d4c056d3b072747b35565e9b5f82f1945e7b184bf27b036227593e4ed1f04ce4c26ea00fcb849098af991ddbdaab6cb2b87564228ee11adc4a6e37f4c28a44ef02ee3e87f028b765fc8d4206c0ecb259264434b41e148a0fc284b37d5627dee64e20cb4b8c4707dd4b827fcf873a0b5ec97eb5bdb6948075fa545", 0xeb}, {&(0x7f00000015c0)="4cfca29f0594b038c011b2ecb9d66f2ed8ba97d4413db6f15f8a22ed7c2d3d09d6956f4cf62bfc43b3b3c2789bbcf3c11b9d5434a0fa905d88c5211c51230f7db3951ad27bea42c96455c2d6bb193d8c92d71c3e5c7580cad45828aa7ecef83ef73e2f9d9a0b9605e3af499c19c04be282c7b6c955634bdc74c3ace7de7c25293dbab96f893ddb0f9cd48604194fc028ba36131d0f58d8f008c3af0b524f9ab32ba333194580a639df82cb4f1e76538f07e0c6a7a210c534280752c84d48de5532e9385de9", 0xc5}, {&(0x7f00000016c0)="1920eb494486c10e9ba29c65f699730555d5fe7ff49cadb83436f9111da055950e321447086af0c8efc9ea86bcfa5a28c3de358a75eb09b0cb0d1abe29666282098f4cdd2453c94a50325971a790c98c11133ae20dcd27c53ab9e6d67f44aa06fb0fc9f64c06fe8267791444aeb36ba244c04678d9b120b721e3470bda3b22f86f8e58b25a8ef81ef74ad15b765af855d35ab8d0d7f7ad45579e073b426775700789ac303472025e2aa5543851a7cb4398456d280d7d68204405c8154b", 0xbd}, {&(0x7f0000001780)="1c794fc7b5bf3c5a9ce916bd0f62510d767d48fb4567339f8462c0eeff0823c7ae78ee567bb2f348976807e975be7427c86c6e8c2775a0fc9bd460c05c1db5c7070463d962bab61777486f68db25c3f0901f563d666b490a5218efa1d332a19b4d082b6469aa95ddd27a1eaa96", 0x6d}], 0x4, &(0x7f0000001b40)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x14, 0x1, 0x1, [r1]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}], 0x90, 0x1}}, {{&(0x7f0000001c00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001cc0)=[{&(0x7f0000001c80)="1115e47e24240061665cbcbeaad31fccaa626e7cd2ab", 0x16}], 0x1, &(0x7f0000002040)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r3, r3, 0xffffffffffffffff, r1]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r2, 0x0, 0xee01}}}, @rights={{0x24, 0x1, 0x1, [r1, r0, r0, 0xffffffffffffffff, r3]}}, @cred={{0x1c, 0x1, 0x2, {r2}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}], 0x128, 0x4000}}, {{&(0x7f0000002180)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002300)=[{&(0x7f0000002200)="dbd269c5d45fc0aa7a853753c612c329a2d2756472ada40f13174faeb1ccbcf239ea21b84abc4001e556e77c9b593ec96611704fb5cea07a030e2c529babde6d22388ac01fc98db612dc329b85674dc3", 0x50}, {&(0x7f0000002280)="1349d8f02c3e209e8d01fbb56652633b553608330102c66abfe22e2305e01110bc8ce407f7a5181bf669a9b79a49447cddbf626054048bdb46c44104a0b473280824c4b49e92f986632869abdb3c1b8c73c3", 0x52}], 0x2, &(0x7f0000002440)=[@cred={{0x1c, 0x1, 0x2, {r2, 0x0, 0xffffffffffffffff}}}, @rights={{0x28, 0x1, 0x1, [r1, r4, r3, r5, r1, r1]}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee00, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r11, r12, r13}}}, @cred={{0x1c, 0x1, 0x2, {r2, r14}}}, @rights={{0x1c, 0x1, 0x1, [r15, r16, r1]}}], 0xc8, 0x14}}], 0x4, 0x8040000) (async) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r17, 0x8914, &(0x7f0000000080)) (async) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) 19:36:34 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, 0x0, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 882.582016] audit: type=1804 audit(1669232193.749:1759): pid=412 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir4247018496/syzkaller.Rf6NE1/50/bus" dev="sda1" ino=14474 res=1 19:36:34 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040), 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:34 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, 0x0) 19:36:34 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xac, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xac}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:34 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x82f89d30, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:36:34 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r2 = getpid() (async) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) (rerun: 32) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) (async) r5 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000002340), 0x304002, 0x0) (async) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000600000000000001060bc50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='rxrpc_local\x00', r6}, 0x10) (async) r8 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r8, r7, 0x0, 0x1, &(0x7f00000001c0)='\x00'}, 0x30) (async, rerun: 64) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000600000000000001060bc50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) (rerun: 64) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='rxrpc_local\x00', r9}, 0x10) r11 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r11, r10, 0x0, 0x1, &(0x7f00000001c0)='\x00'}, 0x30) (async) fstat(0xffffffffffffffff, &(0x7f0000002380)={0x0, 0x0, 0x0, 0x0, 0x0}) (async, rerun: 64) r13 = getgid() (async, rerun: 64) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)=0x0) ioprio_get$uid(0x3, r14) r15 = ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) r16 = openat$cgroup_subtree(r1, &(0x7f0000002400), 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002540)=[{{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000180)="21b39ff22dd0ad9dc6af9bab5912b96b31b931f06e1bbe8cb61040deec94650b9bdf073ac2c9bc5fbff817af737f1c326eb07a08c58f2683b5bea9b0da0d472ffa5c0e309e1ae8723d8130e6cc8b5ee59a8e6ada5dfb6a06751b04c795cf702800fdef1e874b95dbe46fa17e39da75a42509c56ced0f29bdada5c342268182fecb06a92e49a70c9c128a3d1e8905f80a93df1f0fa876c26bbbe37c4567ec7fc2bc18f70bb35a67b2e29ff9d57e96aca9ac92c783302847fc0170671d3def69f64c6795e87fe304fa675271ee5a4a8ff798482db68edd27937dcdc340abbebd57", 0xe0}, {&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000000040)="68faa566", 0x4}], 0x3, &(0x7f00000013c0)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r1]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x60, 0x800}}, {{&(0x7f0000001440)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001800)=[{&(0x7f00000014c0)="ae1609b30cbfad9261bdde7163a8d56283005e81b2e42240058b1bcde0bf3473ab5b049fd8143267e07474404ee4de5ba78adae1f8cbeebd702aa6705fa3ade43c63b65c79f4808e8cecc0d7562aa90ccd80f9b47ba401d3db5b879a6d6e38221585307d3cb923d30535521c26c248447d4c056d3b072747b35565e9b5f82f1945e7b184bf27b036227593e4ed1f04ce4c26ea00fcb849098af991ddbdaab6cb2b87564228ee11adc4a6e37f4c28a44ef02ee3e87f028b765fc8d4206c0ecb259264434b41e148a0fc284b37d5627dee64e20cb4b8c4707dd4b827fcf873a0b5ec97eb5bdb6948075fa545", 0xeb}, {&(0x7f00000015c0)="4cfca29f0594b038c011b2ecb9d66f2ed8ba97d4413db6f15f8a22ed7c2d3d09d6956f4cf62bfc43b3b3c2789bbcf3c11b9d5434a0fa905d88c5211c51230f7db3951ad27bea42c96455c2d6bb193d8c92d71c3e5c7580cad45828aa7ecef83ef73e2f9d9a0b9605e3af499c19c04be282c7b6c955634bdc74c3ace7de7c25293dbab96f893ddb0f9cd48604194fc028ba36131d0f58d8f008c3af0b524f9ab32ba333194580a639df82cb4f1e76538f07e0c6a7a210c534280752c84d48de5532e9385de9", 0xc5}, {&(0x7f00000016c0)="1920eb494486c10e9ba29c65f699730555d5fe7ff49cadb83436f9111da055950e321447086af0c8efc9ea86bcfa5a28c3de358a75eb09b0cb0d1abe29666282098f4cdd2453c94a50325971a790c98c11133ae20dcd27c53ab9e6d67f44aa06fb0fc9f64c06fe8267791444aeb36ba244c04678d9b120b721e3470bda3b22f86f8e58b25a8ef81ef74ad15b765af855d35ab8d0d7f7ad45579e073b426775700789ac303472025e2aa5543851a7cb4398456d280d7d68204405c8154b", 0xbd}, {&(0x7f0000001780)="1c794fc7b5bf3c5a9ce916bd0f62510d767d48fb4567339f8462c0eeff0823c7ae78ee567bb2f348976807e975be7427c86c6e8c2775a0fc9bd460c05c1db5c7070463d962bab61777486f68db25c3f0901f563d666b490a5218efa1d332a19b4d082b6469aa95ddd27a1eaa96", 0x6d}], 0x4, &(0x7f0000001b40)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x14, 0x1, 0x1, [r1]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}], 0x90, 0x1}}, {{&(0x7f0000001c00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001cc0)=[{&(0x7f0000001c80)="1115e47e24240061665cbcbeaad31fccaa626e7cd2ab", 0x16}], 0x1, &(0x7f0000002040)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r3, r3, 0xffffffffffffffff, r1]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r2, 0x0, 0xee01}}}, @rights={{0x24, 0x1, 0x1, [r1, r0, r0, 0xffffffffffffffff, r3]}}, @cred={{0x1c, 0x1, 0x2, {r2}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}], 0x128, 0x4000}}, {{&(0x7f0000002180)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002300)=[{&(0x7f0000002200)="dbd269c5d45fc0aa7a853753c612c329a2d2756472ada40f13174faeb1ccbcf239ea21b84abc4001e556e77c9b593ec96611704fb5cea07a030e2c529babde6d22388ac01fc98db612dc329b85674dc3", 0x50}, {&(0x7f0000002280)="1349d8f02c3e209e8d01fbb56652633b553608330102c66abfe22e2305e01110bc8ce407f7a5181bf669a9b79a49447cddbf626054048bdb46c44104a0b473280824c4b49e92f986632869abdb3c1b8c73c3", 0x52}], 0x2, &(0x7f0000002440)=[@cred={{0x1c, 0x1, 0x2, {r2, 0x0, 0xffffffffffffffff}}}, @rights={{0x28, 0x1, 0x1, [r1, r4, r3, r5, r1, r1]}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee00, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r11, r12, r13}}}, @cred={{0x1c, 0x1, 0x2, {r2, r14}}}, @rights={{0x1c, 0x1, 0x1, [r15, r16, r1]}}], 0xc8, 0x14}}], 0x4, 0x8040000) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r17, 0x8914, &(0x7f0000000080)) (async) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) 19:36:34 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040), 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 883.420047] device veth0_to_bond entered promiscuous mode [ 883.467058] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 883.514793] team0: Device macvtap51 failed to register rx_handler [ 883.567333] device veth0_to_bond left promiscuous mode [ 883.597859] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:36:35 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x83990200, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:36:35 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040), 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 884.981206] device veth0_to_bond entered promiscuous mode [ 884.998537] team0: Device macvtap51 failed to register rx_handler [ 885.018210] device veth0_to_bond left promiscuous mode [ 886.437582] IPVS: ftp: loaded support on port[0] = 21 [ 886.733286] chnl_net:caif_netlink_parms(): no params data found [ 886.769610] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 886.776966] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 886.787502] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 886.794702] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 886.803120] device bridge_slave_1 left promiscuous mode [ 886.809496] bridge0: port 2(bridge_slave_1) entered disabled state [ 886.817850] device bridge_slave_0 left promiscuous mode [ 886.823306] bridge0: port 1(bridge_slave_0) entered disabled state [ 886.833184] device veth1_macvtap left promiscuous mode [ 886.838662] device veth0_macvtap left promiscuous mode [ 886.844158] device veth1_vlan left promiscuous mode [ 886.849384] device veth0_vlan left promiscuous mode [ 888.373547] Bluetooth: hci3: command 0x0409 tx timeout [ 890.453374] Bluetooth: hci3: command 0x041b tx timeout [ 891.189617] device hsr_slave_1 left promiscuous mode [ 891.197393] device hsr_slave_0 left promiscuous mode [ 891.215882] team0 (unregistering): Port device team_slave_1 removed [ 891.226580] team0 (unregistering): Port device team_slave_0 removed [ 891.238233] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 891.248356] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 891.279845] bond0 (unregistering): Released all slaves [ 891.303086] bridge0: port 1(bridge_slave_0) entered blocking state [ 891.309652] bridge0: port 1(bridge_slave_0) entered disabled state [ 891.317580] device bridge_slave_0 entered promiscuous mode [ 891.325886] bridge0: port 2(bridge_slave_1) entered blocking state [ 891.332430] bridge0: port 2(bridge_slave_1) entered disabled state [ 891.340687] device bridge_slave_1 entered promiscuous mode [ 891.362364] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 891.373927] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 891.392572] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 891.400124] team0: Port device team_slave_0 added [ 891.407329] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 891.417872] team0: Port device team_slave_1 added [ 891.446277] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 891.452544] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 891.479620] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 891.492436] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 891.500080] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 891.526314] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 891.548184] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 891.556295] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 891.590466] device hsr_slave_0 entered promiscuous mode [ 891.601825] device hsr_slave_1 entered promiscuous mode [ 891.614053] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 891.621656] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 891.762564] bridge0: port 2(bridge_slave_1) entered blocking state [ 891.768994] bridge0: port 2(bridge_slave_1) entered forwarding state [ 891.872816] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 891.885430] 8021q: adding VLAN 0 to HW filter on device bond0 [ 891.902061] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 891.917945] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 891.927440] bridge0: port 2(bridge_slave_1) entered disabled state [ 891.941197] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 891.952714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 891.965968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 891.976418] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 891.982491] 8021q: adding VLAN 0 to HW filter on device team0 [ 892.002648] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 892.011095] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 892.027464] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 892.036553] bridge0: port 1(bridge_slave_0) entered blocking state [ 892.043012] bridge0: port 1(bridge_slave_0) entered forwarding state [ 892.079435] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 892.087493] bridge0: port 2(bridge_slave_1) entered blocking state [ 892.093920] bridge0: port 2(bridge_slave_1) entered forwarding state [ 892.108841] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 892.118343] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 892.138424] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 892.145865] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 892.159560] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 892.170614] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 892.177837] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 892.189624] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 892.236163] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 892.250028] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 892.257509] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 892.267689] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 892.283874] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 892.348490] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 892.366736] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 892.378177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 892.389798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 892.467736] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 892.480688] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 892.488593] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 892.501932] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 892.508614] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 892.517330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 892.526541] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 892.534065] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 892.534158] Bluetooth: hci3: command 0x040f tx timeout [ 892.547397] device veth0_vlan entered promiscuous mode [ 892.557498] device veth1_vlan entered promiscuous mode [ 892.564013] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 892.572947] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 892.585666] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 892.595764] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 892.602713] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 892.610165] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 892.617935] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 892.626007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 892.636060] device veth0_macvtap entered promiscuous mode [ 892.644244] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 892.655138] device veth1_macvtap entered promiscuous mode [ 892.661264] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 892.674234] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 892.684209] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 892.693873] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 892.704506] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 892.713825] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 892.723675] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 892.732880] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 892.742764] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 892.752369] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 892.762587] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 892.771907] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 892.781659] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 892.791934] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 892.799537] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 892.806930] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 892.815154] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 892.822445] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 892.830715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 892.841810] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 892.853807] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 892.862983] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 892.872837] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 892.882044] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 892.891931] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 892.901221] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 892.911166] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 892.920382] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 892.930355] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 892.941672] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 892.949676] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 892.957342] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 892.966015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 893.088442] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 893.095903] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 893.121831] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 893.126457] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 893.140441] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 893.152065] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 893.161051] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 893.175783] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 893.217185] kauditd_printk_skb: 9 callbacks suppressed [ 893.217198] audit: type=1804 audit(1669232204.649:1769): pid=766 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3075755876/syzkaller.zMJ441/0/bus" dev="sda1" ino=14492 res=1 [ 893.252416] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 893.252839] audit: type=1804 audit(1669232204.679:1770): pid=766 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3075755876/syzkaller.zMJ441/0/bus" dev="sda1" ino=14492 res=1 19:36:44 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:44 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:44 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xac, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xac}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:44 executing program 1: unshare(0x60020200) timer_settime(0x0, 0x0, 0x0, 0x0) unshare(0x0) pipe(0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) eventfd(0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f00000002c0)=0x0) r1 = signalfd(r0, &(0x7f0000000080)={[0x80000001]}, 0x8) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000440)={0x2, 0x0, &(0x7f0000000300)=""/85, &(0x7f0000000380)=""/130, &(0x7f0000000580)=""/162, 0x7002}) 19:36:44 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x5}}, './file0\x00'}) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r2) socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) 19:36:44 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x84990200, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) [ 893.317600] audit: type=1804 audit(1669232204.749:1771): pid=766 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3075755876/syzkaller.zMJ441/0/bus" dev="sda1" ino=14492 res=1 [ 893.425382] IPVS: ftp: loaded support on port[0] = 21 [ 893.472764] device veth0_to_bond entered promiscuous mode [ 893.480083] audit: type=1804 audit(1669232204.919:1772): pid=784 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir2693782222/syzkaller.HDrBKC/518/bus" dev="sda1" ino=14506 res=1 [ 893.513376] team0: Device macvtap51 failed to register rx_handler [ 893.538944] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:36:45 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:45 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 893.598267] device veth0_to_bond left promiscuous mode [ 893.610044] audit: type=1804 audit(1669232204.919:1773): pid=787 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/123/bus" dev="sda1" ino=14509 res=1 19:36:45 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x5}}, './file0\x00'}) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r2) socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) getpid() (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) (async) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x5}}, './file0\x00'}) (async) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r2) (async) socket$nl_route(0x10, 0x3, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) (async) 19:36:45 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x85990200, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:36:45 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 893.855267] audit: type=1804 audit(1669232204.969:1774): pid=783 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3075755876/syzkaller.zMJ441/1/bus" dev="sda1" ino=14492 res=1 [ 893.979168] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:36:45 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 894.127587] audit: type=1804 audit(1669232204.969:1775): pid=783 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3075755876/syzkaller.zMJ441/1/bus" dev="sda1" ino=14492 res=1 [ 894.226344] audit: type=1804 audit(1669232205.039:1776): pid=783 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3075755876/syzkaller.zMJ441/1/bus" dev="sda1" ino=14492 res=1 [ 894.251198] audit: type=1804 audit(1669232205.189:1777): pid=803 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3075755876/syzkaller.zMJ441/2/bus" dev="sda1" ino=14507 res=1 [ 894.281645] audit: type=1804 audit(1669232205.219:1778): pid=803 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3075755876/syzkaller.zMJ441/2/bus" dev="sda1" ino=14507 res=1 19:36:45 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 894.574624] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:36:46 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x84990200, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:36:46 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 894.860958] device veth0_to_bond entered promiscuous mode [ 894.868209] team0: Device macvtap51 failed to register rx_handler [ 894.876029] device veth0_to_bond left promiscuous mode [ 894.916935] device veth0_to_bond entered promiscuous mode [ 894.932731] team0: Device macvtap1 failed to register rx_handler [ 894.942449] device veth0_to_bond left promiscuous mode [ 895.031116] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 897.305368] IPVS: ftp: loaded support on port[0] = 21 19:36:49 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xac, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xac}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:49 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x86990200, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:36:49 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x5}}, './file0\x00'}) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r2) socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) getpid() (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) (async) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x5}}, './file0\x00'}) (async) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r2) (async) socket$nl_route(0x10, 0x3, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) (async) 19:36:49 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:49 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 897.686280] chnl_net:caif_netlink_parms(): no params data found [ 897.906343] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 897.991996] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 898.227714] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:36:49 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000180)) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xac, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid}]}, 0xac}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 898.484337] device veth0_to_bond entered promiscuous mode [ 898.511423] team0: Device macvtap51 failed to register rx_handler [ 898.533988] kauditd_printk_skb: 12 callbacks suppressed [ 898.534001] audit: type=1804 audit(1669232209.960:1791): pid=1024 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir4247018496/syzkaller.Rf6NE1/53/bus" dev="sda1" ino=14533 res=1 [ 898.539739] device veth0_to_bond left promiscuous mode 19:36:50 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000180)) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 898.736148] audit: type=1804 audit(1669232210.170:1792): pid=1051 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir2693782222/syzkaller.HDrBKC/521/bus" dev="sda1" ino=14469 res=1 [ 898.770615] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 898.835342] audit: type=1804 audit(1669232210.270:1793): pid=1064 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/129/bus" dev="sda1" ino=14530 res=1 [ 898.975211] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 899.016545] Bluetooth: hci1: command 0x0406 tx timeout [ 899.063009] audit: type=1804 audit(1669232210.480:1794): pid=1064 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/129/bus" dev="sda1" ino=14530 res=1 [ 899.262997] Bluetooth: hci3: command 0x0409 tx timeout [ 899.411736] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 899.435739] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 899.447529] audit: type=1804 audit(1669232210.880:1795): pid=1049 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir2693782222/syzkaller.HDrBKC/521/bus" dev="sda1" ino=14469 res=1 [ 899.479080] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 899.491849] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 899.529179] device bridge_slave_1 left promiscuous mode [ 899.534965] bridge0: port 2(bridge_slave_1) entered disabled state [ 899.549600] device bridge_slave_0 left promiscuous mode [ 899.555473] bridge0: port 1(bridge_slave_0) entered disabled state [ 899.573148] device veth1_macvtap left promiscuous mode [ 899.578571] device veth0_macvtap left promiscuous mode [ 899.590185] device veth1_vlan left promiscuous mode [ 899.595914] device veth0_vlan left promiscuous mode [ 901.332664] Bluetooth: hci3: command 0x041b tx timeout [ 903.412533] Bluetooth: hci3: command 0x040f tx timeout [ 904.208447] device hsr_slave_1 left promiscuous mode [ 904.217850] device hsr_slave_0 left promiscuous mode [ 904.236331] team0 (unregistering): Port device team_slave_1 removed [ 904.246351] team0 (unregistering): Port device team_slave_0 removed [ 904.256873] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 904.268466] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 904.299989] bond0 (unregistering): Released all slaves [ 904.327872] bridge0: port 1(bridge_slave_0) entered blocking state [ 904.334886] bridge0: port 1(bridge_slave_0) entered disabled state [ 904.342162] device bridge_slave_0 entered promiscuous mode [ 904.351260] bridge0: port 2(bridge_slave_1) entered blocking state [ 904.359360] bridge0: port 2(bridge_slave_1) entered disabled state [ 904.366996] device bridge_slave_1 entered promiscuous mode [ 904.390929] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 904.404133] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 904.463787] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 904.471453] team0: Port device team_slave_0 added [ 904.493905] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 904.501601] team0: Port device team_slave_1 added [ 904.522253] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 904.528628] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 904.555312] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 904.568018] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 904.574875] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 904.601292] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 904.618506] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 904.626632] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 904.658689] device hsr_slave_0 entered promiscuous mode [ 904.665278] device hsr_slave_1 entered promiscuous mode [ 904.671761] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 904.686437] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 904.821060] bridge0: port 2(bridge_slave_1) entered blocking state [ 904.827495] bridge0: port 2(bridge_slave_1) entered forwarding state [ 904.834322] bridge0: port 1(bridge_slave_0) entered blocking state [ 904.840694] bridge0: port 1(bridge_slave_0) entered forwarding state [ 904.916333] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 904.927837] 8021q: adding VLAN 0 to HW filter on device bond0 [ 904.941575] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 904.958593] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 904.968780] bridge0: port 1(bridge_slave_0) entered disabled state [ 904.979965] bridge0: port 2(bridge_slave_1) entered disabled state [ 904.990933] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 905.006238] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 905.016963] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 905.031336] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 905.041758] 8021q: adding VLAN 0 to HW filter on device team0 [ 905.059807] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 905.070765] bridge0: port 1(bridge_slave_0) entered blocking state [ 905.077348] bridge0: port 1(bridge_slave_0) entered forwarding state [ 905.109917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 905.118100] bridge0: port 2(bridge_slave_1) entered blocking state [ 905.124529] bridge0: port 2(bridge_slave_1) entered forwarding state [ 905.159900] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 905.168680] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 905.178643] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 905.191615] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 905.202649] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 905.208768] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 905.216943] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 905.225333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 905.291504] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 905.306107] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 905.318480] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 905.329341] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 905.351614] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 905.427056] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 905.441187] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 905.450399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 905.459008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 905.491948] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 905.498940] Bluetooth: hci3: command 0x0419 tx timeout [ 905.506088] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 905.513086] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 905.522143] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 905.529615] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 905.537517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 905.546590] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 905.558724] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 905.567165] device veth0_vlan entered promiscuous mode [ 905.579515] device veth1_vlan entered promiscuous mode [ 905.585854] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 905.596108] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 905.608314] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 905.618933] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 905.626101] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 905.633829] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 905.641058] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 905.649744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 905.660163] device veth0_macvtap entered promiscuous mode [ 905.666751] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 905.676242] device veth1_macvtap entered promiscuous mode [ 905.682745] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 905.691943] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 905.701833] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 905.711429] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 905.721425] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 905.730654] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 905.740737] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 905.749937] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 905.759709] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 905.769003] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 905.778817] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 905.788024] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 905.797803] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 905.808423] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 905.815891] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 905.823605] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 905.830979] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 905.838568] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 905.846731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 905.859971] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 905.870747] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 905.880859] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 905.892001] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 905.902659] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 905.913000] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 905.922131] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 905.932878] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 905.942129] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 905.953201] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 905.963778] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 905.970800] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 905.978033] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 905.986424] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 906.112086] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 906.119914] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 906.134154] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 906.141066] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 906.167684] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 906.174766] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 906.183580] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 906.191075] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 906.239125] audit: type=1804 audit(1669232217.670:1796): pid=1217 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir757643249/syzkaller.UP2XQA/0/bus" dev="sda1" ino=13921 res=1 [ 906.242065] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:36:57 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000180)) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:57 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getpid() r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) r1 = openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000100)={0x1f, 0x1, 0x8, 0x2, 0x2}) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.time_recursive\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$pppoe(0x18, 0x1, 0x0) r5 = fcntl$getown(r2, 0x9) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x80, 0x0) r7 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r7, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r7) fcntl$setown(r4, 0x8, r5) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) 19:36:57 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x87990200, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:36:57 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xac, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xac}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:57 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:57 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000180)) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xac, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid}]}, 0xac}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 906.285109] audit: type=1804 audit(1669232217.720:1797): pid=1217 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir757643249/syzkaller.UP2XQA/0/bus" dev="sda1" ino=13921 res=1 [ 906.383723] device veth0_to_bond entered promiscuous mode [ 906.418677] audit: type=1804 audit(1669232217.850:1798): pid=1235 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir757643249/syzkaller.UP2XQA/1/bus" dev="sda1" ino=14243 res=1 [ 906.450209] team0: Device macvtap51 failed to register rx_handler [ 906.520248] device veth0_to_bond left promiscuous mode [ 906.547932] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 906.596364] audit: type=1804 audit(1669232217.890:1799): pid=1237 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/130/bus" dev="sda1" ino=14257 res=1 19:36:58 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) getpid() (async) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) (async) r1 = openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000100)={0x1f, 0x1, 0x8, 0x2, 0x2}) (async) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) (async) openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.time_recursive\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) (async) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) r4 = socket$pppoe(0x18, 0x1, 0x0) (async) r5 = fcntl$getown(r2, 0x9) (async) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x80, 0x0) (async) r7 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r7, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) (async) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r7) fcntl$setown(r4, 0x8, r5) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) 19:36:58 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x0) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:58 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x88600000, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:36:58 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000180)) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 906.908433] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 906.929028] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 906.931944] device veth0_to_bond entered promiscuous mode [ 906.965786] audit: type=1804 audit(1669232217.910:1800): pid=1238 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir2693782222/syzkaller.HDrBKC/522/bus" dev="sda1" ino=14242 res=1 [ 906.990779] audit: type=1804 audit(1669232217.930:1801): pid=1239 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir4247018496/syzkaller.Rf6NE1/54/bus" dev="sda1" ino=14194 res=1 [ 907.016984] audit: type=1804 audit(1669232218.060:1802): pid=1237 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/130/bus" dev="sda1" ino=14257 res=1 19:36:58 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x0) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 907.069824] audit: type=1804 audit(1669232218.090:1803): pid=1235 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir757643249/syzkaller.UP2XQA/1/bus" dev="sda1" ino=14243 res=1 [ 907.137967] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 907.171005] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 907.180035] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 907.200132] team0: Device macvtap51 failed to register rx_handler 19:36:58 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x0) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 907.328351] audit: type=1804 audit(1669232218.340:1804): pid=1255 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir757643249/syzkaller.UP2XQA/2/bus" dev="sda1" ino=14049 res=1 [ 907.359025] device veth0_to_bond left promiscuous mode 19:36:58 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) getpid() r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) (async) r1 = openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000100)={0x1f, 0x1, 0x8, 0x2, 0x2}) (async) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) (async) openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.time_recursive\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$pppoe(0x18, 0x1, 0x0) (async) r5 = fcntl$getown(r2, 0x9) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x80, 0x0) (async) r7 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r7, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) (async) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r7) (async) fcntl$setown(r4, 0x8, r5) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) [ 907.558921] audit: type=1804 audit(1669232218.430:1805): pid=1255 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir757643249/syzkaller.UP2XQA/2/bus" dev="sda1" ino=14049 res=1 19:36:59 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 907.798987] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:36:59 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000180)) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xac, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid}]}, 0xac}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:59 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xac, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xac}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:36:59 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 908.250656] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:36:59 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 908.477463] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:36:59 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x88990200, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) [ 908.652519] device veth0_to_bond entered promiscuous mode [ 908.697192] team0: Device macvtap51 failed to register rx_handler [ 908.803617] device veth0_to_bond left promiscuous mode 19:37:00 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:00 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getpid() sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xa86ae2085afb68cd}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="54000000180000042abd7000fedbdf25022000000002c80700000000080010000500000006001c004e230000060015000600000006001500000000e152befd285081c8dd72891a791b3c0008000500e000000105001b000600000005001b0006000000"], 0x54}, 0x1, 0x0, 0x0, 0x40014}, 0x20000000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair(0x25, 0x6, 0x0, &(0x7f0000000000)) socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) 19:37:00 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:00 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 911.721792] IPVS: ftp: loaded support on port[0] = 21 [ 911.917806] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 911.927597] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 911.936304] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 911.943364] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 911.951299] device bridge_slave_1 left promiscuous mode [ 911.957602] bridge0: port 2(bridge_slave_1) entered disabled state [ 911.965123] device bridge_slave_0 left promiscuous mode [ 911.970582] bridge0: port 1(bridge_slave_0) entered disabled state [ 911.980244] device veth1_macvtap left promiscuous mode [ 911.985793] device veth0_macvtap left promiscuous mode [ 911.991116] device veth1_vlan left promiscuous mode [ 911.997460] device veth0_vlan left promiscuous mode [ 913.651990] Bluetooth: hci3: command 0x0409 tx timeout [ 914.372008] Bluetooth: hci2: command 0x0406 tx timeout [ 915.731813] Bluetooth: hci3: command 0x041b tx timeout [ 916.257917] device hsr_slave_1 left promiscuous mode [ 916.265631] device hsr_slave_0 left promiscuous mode [ 916.280529] team0 (unregistering): Port device team_slave_1 removed [ 916.293009] team0 (unregistering): Port device team_slave_0 removed [ 916.304729] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 916.314881] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 916.345321] bond0 (unregistering): Released all slaves [ 916.359791] chnl_net:caif_netlink_parms(): no params data found [ 916.410655] bridge0: port 1(bridge_slave_0) entered blocking state [ 916.417357] bridge0: port 1(bridge_slave_0) entered disabled state [ 916.426015] device bridge_slave_0 entered promiscuous mode [ 916.433972] bridge0: port 2(bridge_slave_1) entered blocking state [ 916.440389] bridge0: port 2(bridge_slave_1) entered disabled state [ 916.448993] device bridge_slave_1 entered promiscuous mode [ 916.483126] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 916.498920] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 916.528912] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 916.543021] team0: Port device team_slave_0 added [ 916.548868] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 916.562916] team0: Port device team_slave_1 added [ 916.585133] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 916.591400] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 916.617908] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 916.630426] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 916.637320] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 916.664511] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 916.680452] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 916.688974] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 916.714444] device hsr_slave_0 entered promiscuous mode [ 916.720758] device hsr_slave_1 entered promiscuous mode [ 916.728331] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 916.736227] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 916.831171] bridge0: port 2(bridge_slave_1) entered blocking state [ 916.837641] bridge0: port 2(bridge_slave_1) entered forwarding state [ 916.844423] bridge0: port 1(bridge_slave_0) entered blocking state [ 916.850797] bridge0: port 1(bridge_slave_0) entered forwarding state [ 916.903846] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 916.909951] 8021q: adding VLAN 0 to HW filter on device bond0 [ 916.921366] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 916.933228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 916.941586] bridge0: port 1(bridge_slave_0) entered disabled state [ 916.963708] bridge0: port 2(bridge_slave_1) entered disabled state [ 916.998032] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 917.009845] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 917.017523] 8021q: adding VLAN 0 to HW filter on device team0 [ 917.029296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 917.038172] bridge0: port 1(bridge_slave_0) entered blocking state [ 917.044796] bridge0: port 1(bridge_slave_0) entered forwarding state [ 917.078646] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 917.087472] bridge0: port 2(bridge_slave_1) entered blocking state [ 917.093896] bridge0: port 2(bridge_slave_1) entered forwarding state [ 917.111769] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 917.130616] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 917.146777] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 917.159377] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 917.172907] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 917.180275] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 917.199318] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 917.208255] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 917.222400] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 917.279916] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 917.288916] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 917.296312] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 917.308092] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 917.369855] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 917.383427] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 917.391081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 917.400892] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 917.466511] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 917.474253] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 917.481308] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 917.493866] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 917.500584] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 917.509920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 917.518503] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 917.526595] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 917.536135] device veth0_vlan entered promiscuous mode [ 917.548159] device veth1_vlan entered promiscuous mode [ 917.554692] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 917.568440] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 917.591122] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 917.603399] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 917.610307] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 917.618156] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 917.626598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 917.634732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 917.645134] device veth0_macvtap entered promiscuous mode [ 917.651518] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 917.664280] device veth1_macvtap entered promiscuous mode [ 917.670635] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 917.680576] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 917.692180] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 917.701463] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 917.712557] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 917.722696] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 917.734099] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 917.744104] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 917.754320] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 917.764297] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 917.774606] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 917.784619] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 917.794754] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 917.805991] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 917.811908] Bluetooth: hci3: command 0x040f tx timeout [ 917.814838] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 917.826547] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 917.835146] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 917.843573] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 917.851412] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 917.861800] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 917.871856] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 917.880963] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 917.891167] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 917.900959] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 917.910751] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 917.919987] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 917.930036] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 917.939229] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 917.948980] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 917.959144] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 917.966357] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 917.973678] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 917.981711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 918.102519] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 918.113387] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 918.120527] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 918.149494] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 918.160512] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 918.175101] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 918.182907] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 918.189657] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 918.237241] kauditd_printk_skb: 19 callbacks suppressed [ 918.237253] audit: type=1804 audit(1669232229.671:1825): pid=1628 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3310168257/syzkaller.rYas6k/0/bus" dev="sda1" ino=14542 res=1 [ 918.252197] net_ratelimit: 2 callbacks suppressed [ 918.252206] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:37:09 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(0xffffffffffffffff, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:09 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000180)) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xac, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid}]}, 0xac}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:09 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:09 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000180)) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xac, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid}]}, 0xac}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:09 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x88a8ffff, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:37:09 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) getpid() sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xa86ae2085afb68cd}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="54000000180000042abd7000fedbdf25022000000002c80700000000080010000500000006001c004e230000060015000600000006001500000000e152befd285081c8dd72891a791b3c0008000500e000000105001b000600000005001b0006000000"], 0x54}, 0x1, 0x0, 0x0, 0x40014}, 0x20000000) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) (async) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair(0x25, 0x6, 0x0, &(0x7f0000000000)) (async) socket$nl_route(0x10, 0x3, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) [ 918.307655] audit: type=1804 audit(1669232229.741:1826): pid=1628 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3310168257/syzkaller.rYas6k/0/bus" dev="sda1" ino=14542 res=1 [ 918.416861] device veth0_to_bond entered promiscuous mode [ 918.451163] audit: type=1804 audit(1669232229.881:1827): pid=1649 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3310168257/syzkaller.rYas6k/1/bus" dev="sda1" ino=14569 res=1 [ 918.502367] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:37:10 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 918.540400] team0: Device macvtap51 failed to register rx_handler [ 918.602043] audit: type=1804 audit(1669232229.941:1828): pid=1645 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/138/bus" dev="sda1" ino=14568 res=1 [ 918.627722] device veth0_to_bond left promiscuous mode 19:37:10 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) getpid() (async) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xa86ae2085afb68cd}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="54000000180000042abd7000fedbdf25022000000002c80700000000080010000500000006001c004e230000060015000600000006001500000000e152befd285081c8dd72891a791b3c0008000500e000000105001b000600000005001b0006000000"], 0x54}, 0x1, 0x0, 0x0, 0x40014}, 0x20000000) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) (async) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair(0x25, 0x6, 0x0, &(0x7f0000000000)) socket$nl_route(0x10, 0x3, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) 19:37:10 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x89000000, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) [ 918.858490] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:37:10 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 918.975848] audit: type=1804 audit(1669232229.951:1829): pid=1652 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir4247018496/syzkaller.Rf6NE1/56/bus" dev="sda1" ino=14553 res=1 [ 918.976090] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:37:10 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(0xffffffffffffffff, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 919.003623] audit: type=1804 audit(1669232230.141:1830): pid=1655 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3310168257/syzkaller.rYas6k/1/bus" dev="sda1" ino=14569 res=1 19:37:10 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000180)) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xac, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid}]}, 0xac}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:10 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 919.248100] audit: type=1804 audit(1669232230.271:1831): pid=1641 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir2693782222/syzkaller.HDrBKC/524/bus" dev="sda1" ino=14567 res=1 [ 919.304692] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 919.529502] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 919.609130] audit: type=1804 audit(1669232230.351:1832): pid=1664 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/139/bus" dev="sda1" ino=14514 res=1 [ 919.707596] audit: type=1804 audit(1669232230.541:1833): pid=1677 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/140/bus" dev="sda1" ino=14546 res=1 [ 919.766008] audit: type=1804 audit(1669232230.641:1834): pid=1684 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir4247018496/syzkaller.Rf6NE1/56/bus" dev="sda1" ino=14553 res=1 19:37:11 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x0) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) 19:37:11 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x89990200, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:37:11 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(0xffffffffffffffff, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:11 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) 19:37:11 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:12 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 920.796516] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 920.807514] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:37:12 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xac, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xac}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:12 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:12 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xac, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xac}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 921.435362] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:37:13 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:13 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xac, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xac}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:13 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:14 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xac, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xac}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 923.077327] device veth0_to_bond entered promiscuous mode [ 923.104355] team0: Device macvtap51 failed to register rx_handler [ 923.133950] device veth0_to_bond left promiscuous mode [ 923.135777] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:37:14 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x8a990200, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) [ 923.549360] device veth0_to_bond entered promiscuous mode [ 923.557341] team0: Device macvtap51 failed to register rx_handler [ 923.564684] device veth0_to_bond left promiscuous mode [ 924.713717] IPVS: ftp: loaded support on port[0] = 21 [ 925.009807] chnl_net:caif_netlink_parms(): no params data found [ 925.052920] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 925.059645] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 925.068700] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 925.075708] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 925.084138] device bridge_slave_1 left promiscuous mode [ 925.089938] bridge0: port 2(bridge_slave_1) entered disabled state [ 925.098390] device bridge_slave_0 left promiscuous mode [ 925.105001] bridge0: port 1(bridge_slave_0) entered disabled state [ 925.115957] device veth1_macvtap left promiscuous mode [ 925.121518] device veth0_macvtap left promiscuous mode [ 925.126844] device veth1_vlan left promiscuous mode [ 925.132023] device veth0_vlan left promiscuous mode [ 926.611205] Bluetooth: hci3: command 0x0409 tx timeout [ 928.691085] Bluetooth: hci3: command 0x041b tx timeout [ 929.475066] device hsr_slave_1 left promiscuous mode [ 929.483895] device hsr_slave_0 left promiscuous mode [ 929.500788] team0 (unregistering): Port device team_slave_1 removed [ 929.513061] team0 (unregistering): Port device team_slave_0 removed [ 929.524077] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 929.534921] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 929.565904] bond0 (unregistering): Released all slaves [ 929.599874] bridge0: port 1(bridge_slave_0) entered blocking state [ 929.607381] bridge0: port 1(bridge_slave_0) entered disabled state [ 929.616173] device bridge_slave_0 entered promiscuous mode [ 929.623583] bridge0: port 2(bridge_slave_1) entered blocking state [ 929.629959] bridge0: port 2(bridge_slave_1) entered disabled state [ 929.637480] device bridge_slave_1 entered promiscuous mode [ 929.659821] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 929.669441] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 929.689575] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 929.697947] team0: Port device team_slave_0 added [ 929.704435] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 929.713609] team0: Port device team_slave_1 added [ 929.731066] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 929.737327] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 929.762840] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 929.774877] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 929.781217] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 929.806905] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 929.822641] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 929.831196] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 929.855983] device hsr_slave_0 entered promiscuous mode [ 929.862368] device hsr_slave_1 entered promiscuous mode [ 929.868671] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 929.877776] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 929.982960] bridge0: port 2(bridge_slave_1) entered blocking state [ 929.989345] bridge0: port 2(bridge_slave_1) entered forwarding state [ 929.996068] bridge0: port 1(bridge_slave_0) entered blocking state [ 930.002479] bridge0: port 1(bridge_slave_0) entered forwarding state [ 930.054291] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 930.060394] 8021q: adding VLAN 0 to HW filter on device bond0 [ 930.072918] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 930.088459] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 930.095159] bridge0: port 1(bridge_slave_0) entered disabled state [ 930.108720] bridge0: port 2(bridge_slave_1) entered disabled state [ 930.118014] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 930.132913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 930.140025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 930.157348] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 930.165011] 8021q: adding VLAN 0 to HW filter on device team0 [ 930.176866] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 930.185845] bridge0: port 1(bridge_slave_0) entered blocking state [ 930.192297] bridge0: port 1(bridge_slave_0) entered forwarding state [ 930.211568] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 930.220863] bridge0: port 2(bridge_slave_1) entered blocking state [ 930.227218] bridge0: port 2(bridge_slave_1) entered forwarding state [ 930.255419] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 930.265639] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 930.287157] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 930.297251] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 930.308076] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 930.315215] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 930.325326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 930.334594] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 930.347374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 930.390665] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 930.400185] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 930.407013] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 930.414448] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 930.427840] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 930.486211] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 930.497991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 930.560542] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 930.577318] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 930.585960] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 930.602740] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 930.609353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 930.624176] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 930.636032] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 930.646659] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 930.659112] device veth0_vlan entered promiscuous mode [ 930.677775] device veth1_vlan entered promiscuous mode [ 930.684975] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 930.698345] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 930.718974] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 930.736070] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 930.744543] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 930.753875] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 930.761357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 930.769033] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 930.771141] Bluetooth: hci3: command 0x040f tx timeout [ 930.785938] device veth0_macvtap entered promiscuous mode [ 930.793222] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 930.803493] device veth1_macvtap entered promiscuous mode [ 930.810011] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 930.819982] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 930.831519] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 930.843501] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 930.853661] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 930.863293] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 930.873232] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 930.882770] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 930.892804] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 930.902229] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 930.912194] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 930.921717] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 930.932320] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 930.944078] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 930.951412] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 930.958694] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 930.966772] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 930.974490] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 930.982685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 930.993511] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 931.003751] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 931.014216] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 931.024191] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 931.033394] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 931.044284] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 931.053496] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 931.063300] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 931.072901] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 931.082831] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 931.093496] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 931.100404] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 931.109653] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 931.117736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 931.289218] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 931.296459] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 931.318492] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 931.322076] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 931.332513] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 931.348204] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 931.355482] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 931.363845] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 931.396777] kauditd_printk_skb: 17 callbacks suppressed [ 931.396792] audit: type=1804 audit(1669232242.832:1852): pid=2072 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3262842408/syzkaller.fua9q1/0/bus" dev="sda1" ino=14401 res=1 [ 931.397710] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 931.560843] audit: type=1804 audit(1669232242.992:1853): pid=2075 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3262842408/syzkaller.fua9q1/0/bus" dev="sda1" ino=14401 res=1 19:37:23 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:23 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xac, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xac}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:23 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:23 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xac, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xac}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:23 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x0) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) 19:37:23 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x8b010000, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) [ 932.384021] audit: type=1804 audit(1669232243.822:1854): pid=2090 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3262842408/syzkaller.fua9q1/1/bus" dev="sda1" ino=14594 res=1 [ 932.392549] device veth0_to_bond entered promiscuous mode [ 932.429761] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 932.456980] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 932.556783] audit: type=1804 audit(1669232243.872:1855): pid=2088 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir4247018496/syzkaller.Rf6NE1/59/bus" dev="sda1" ino=14614 res=1 [ 932.602036] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 932.737962] team0: Device macvtap51 failed to register rx_handler [ 932.774523] ieee802154 phy0 wpan0: encryption failed: -22 19:37:24 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 932.776011] audit: type=1804 audit(1669232243.912:1856): pid=2093 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/147/bus" dev="sda1" ino=14604 res=1 [ 932.780133] ieee802154 phy1 wpan1: encryption failed: -22 [ 932.821917] device veth0_to_bond left promiscuous mode [ 932.852173] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:37:24 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 933.001350] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 933.035909] audit: type=1804 audit(1669232244.022:1857): pid=2099 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3262842408/syzkaller.fua9q1/1/bus" dev="sda1" ino=14594 res=1 19:37:24 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x0) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) [ 933.168681] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 933.186388] audit: type=1804 audit(1669232244.132:1858): pid=2093 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/147/bus" dev="sda1" ino=14604 res=1 19:37:24 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r5, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) [ 933.323853] audit: type=1804 audit(1669232244.412:1859): pid=2088 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir4247018496/syzkaller.Rf6NE1/59/bus" dev="sda1" ino=14614 res=1 19:37:24 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) [ 933.516607] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 933.532779] audit: type=1804 audit(1669232244.592:1860): pid=2115 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/148/bus" dev="sda1" ino=14597 res=1 19:37:25 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 933.697385] audit: type=1804 audit(1669232244.802:1861): pid=2113 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/148/bus" dev="sda1" ino=14597 res=1 [ 933.731222] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 933.879454] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:37:25 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:25 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:25 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x8b990200, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:37:25 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) [ 934.305935] device veth0_to_bond entered promiscuous mode [ 934.432943] team0: Device macvtap51 failed to register rx_handler [ 934.440047] device veth0_to_bond left promiscuous mode 19:37:26 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) 19:37:26 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x8c990200, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) [ 937.352094] IPVS: ftp: loaded support on port[0] = 21 [ 937.632753] chnl_net:caif_netlink_parms(): no params data found [ 937.794985] bridge0: port 1(bridge_slave_0) entered blocking state [ 937.802209] bridge0: port 1(bridge_slave_0) entered disabled state [ 937.809290] device bridge_slave_0 entered promiscuous mode [ 937.817411] bridge0: port 2(bridge_slave_1) entered blocking state [ 937.824223] bridge0: port 2(bridge_slave_1) entered disabled state [ 937.832143] device bridge_slave_1 entered promiscuous mode [ 937.852519] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 937.867219] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 937.877219] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 937.886884] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 937.895835] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 937.904663] device bridge_slave_1 left promiscuous mode [ 937.910118] bridge0: port 2(bridge_slave_1) entered disabled state [ 937.918400] device bridge_slave_0 left promiscuous mode [ 937.924344] bridge0: port 1(bridge_slave_0) entered disabled state [ 937.934488] device veth1_macvtap left promiscuous mode [ 937.939777] device veth0_macvtap left promiscuous mode [ 937.945225] device veth1_vlan left promiscuous mode [ 937.950302] device veth0_vlan left promiscuous mode [ 939.250438] Bluetooth: hci3: command 0x0409 tx timeout [ 941.330279] Bluetooth: hci3: command 0x041b tx timeout [ 942.313069] device hsr_slave_1 left promiscuous mode [ 942.321751] device hsr_slave_0 left promiscuous mode [ 942.338241] team0 (unregistering): Port device team_slave_1 removed [ 942.347653] team0 (unregistering): Port device team_slave_0 removed [ 942.358139] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 942.368575] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 942.400164] bond0 (unregistering): Released all slaves [ 942.413384] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 942.434493] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 942.442454] team0: Port device team_slave_0 added [ 942.448361] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 942.456169] team0: Port device team_slave_1 added [ 942.474373] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 942.480949] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 942.507189] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 942.519187] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 942.525522] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 942.551257] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 942.565715] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 942.574493] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 942.594711] device hsr_slave_0 entered promiscuous mode [ 942.600647] device hsr_slave_1 entered promiscuous mode [ 942.606757] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 942.615397] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 942.721920] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 942.768303] 8021q: adding VLAN 0 to HW filter on device bond0 [ 942.778669] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 942.789437] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 942.798820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 942.807376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 942.818746] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 942.827165] 8021q: adding VLAN 0 to HW filter on device team0 [ 942.838481] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 942.846847] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 942.856089] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 942.878467] bridge0: port 1(bridge_slave_0) entered blocking state [ 942.884905] bridge0: port 1(bridge_slave_0) entered forwarding state [ 942.896785] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 942.905507] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 942.914095] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 942.924796] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 942.935645] bridge0: port 2(bridge_slave_1) entered blocking state [ 942.942076] bridge0: port 2(bridge_slave_1) entered forwarding state [ 942.972335] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 942.981647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 942.993267] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 943.001493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 943.017202] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 943.032419] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 943.051345] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 943.059238] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 943.067906] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 943.078713] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 943.085973] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 943.144132] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 943.153662] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 943.159915] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 943.167803] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 943.179741] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 943.237614] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 943.255384] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 943.319344] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 943.335386] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 943.344748] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 943.359140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 943.369576] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 943.383235] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 943.396485] device veth0_vlan entered promiscuous mode [ 943.410347] Bluetooth: hci3: command 0x040f tx timeout [ 943.415125] device veth1_vlan entered promiscuous mode [ 943.425689] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 943.439249] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 943.464485] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 943.475057] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 943.483696] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 943.493017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 943.504846] device veth0_macvtap entered promiscuous mode [ 943.513208] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 943.523321] device veth1_macvtap entered promiscuous mode [ 943.529759] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 943.548432] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 943.559737] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 943.577969] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 943.589131] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 943.599412] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 943.610262] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 943.619388] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 943.630521] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 943.641693] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 943.652074] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 943.665786] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 943.675560] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 943.691760] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 943.698872] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 943.712628] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 943.724256] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 943.734618] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 943.749055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 943.761159] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 943.771644] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 943.781634] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 943.792407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 943.801626] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 943.811481] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 943.820688] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 943.830641] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 943.841373] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 943.851227] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 943.862234] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 943.869770] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 943.880686] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 943.888836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 944.027791] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 944.034813] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 944.051964] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 944.061278] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 944.095618] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 944.103631] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 944.111064] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 944.120638] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 944.159039] kauditd_printk_skb: 14 callbacks suppressed [ 944.159054] audit: type=1804 audit(1669232255.592:1876): pid=2450 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir2073225363/syzkaller.t6UfHe/0/bus" dev="sda1" ino=13922 res=1 [ 944.163272] net_ratelimit: 5 callbacks suppressed [ 944.163282] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 944.267694] audit: type=1804 audit(1669232255.702:1877): pid=2452 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir2073225363/syzkaller.t6UfHe/0/bus" dev="sda1" ino=13922 res=1 19:37:36 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:36 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) 19:37:36 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:36 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x8d990200, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:37:36 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:36 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, 0x0) [ 945.088743] device veth0_to_bond entered promiscuous mode [ 945.098782] team0: Device macvtap51 failed to register rx_handler [ 945.134512] audit: type=1804 audit(1669232256.572:1878): pid=2469 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir2073225363/syzkaller.t6UfHe/1/bus" dev="sda1" ino=14290 res=1 [ 945.186298] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 945.231339] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 945.278730] device veth0_to_bond left promiscuous mode [ 945.318390] audit: type=1804 audit(1669232256.602:1879): pid=2470 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/151/bus" dev="sda1" ino=14210 res=1 [ 945.391636] audit: type=1804 audit(1669232256.762:1880): pid=2470 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/151/bus" dev="sda1" ino=14210 res=1 [ 945.490147] Bluetooth: hci3: command 0x0419 tx timeout [ 945.557207] audit: type=1804 audit(1669232256.902:1881): pid=2473 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir2073225363/syzkaller.t6UfHe/1/bus" dev="sda1" ino=14290 res=1 [ 945.593285] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 945.598260] audit: type=1804 audit(1669232256.973:1882): pid=2465 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir4247018496/syzkaller.Rf6NE1/62/bus" dev="sda1" ino=14258 res=1 [ 945.605038] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 945.640673] audit: type=1804 audit(1669232256.993:1883): pid=2461 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir341425662/syzkaller.qJXiPn/464/bus" dev="sda1" ino=14244 res=1 [ 945.685488] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 945.775096] audit: type=1804 audit(1669232256.993:1884): pid=2460 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir2693782222/syzkaller.HDrBKC/531/bus" dev="sda1" ino=14193 res=1 [ 945.801536] audit: type=1804 audit(1669232257.203:1885): pid=2475 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir2693782222/syzkaller.HDrBKC/531/bus" dev="sda1" ino=14193 res=1 19:37:37 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x0) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:37 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 946.124038] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:37:37 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, 0x0) [ 946.550031] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:37:38 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x8e990200, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:37:38 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:38 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x0) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 946.944960] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:37:38 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 947.022823] device veth0_to_bond entered promiscuous mode [ 947.100508] team0: Device macvtap51 failed to register rx_handler [ 947.127818] device veth0_to_bond left promiscuous mode [ 947.151006] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:37:38 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) 19:37:39 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x0) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:39 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:39 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x8f990200, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:37:39 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) [ 948.499467] device veth0_to_bond entered promiscuous mode [ 948.506274] team0: Device macvtap51 failed to register rx_handler [ 948.527473] device veth0_to_bond left promiscuous mode 19:37:40 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) 19:37:40 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:40 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 949.308937] kauditd_printk_skb: 23 callbacks suppressed [ 949.308952] audit: type=1804 audit(1669232260.733:1909): pid=2558 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir2693782222/syzkaller.HDrBKC/533/bus" dev="sda1" ino=13839 res=1 [ 949.341886] net_ratelimit: 8 callbacks suppressed [ 949.341897] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:37:40 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 949.456869] audit: type=1804 audit(1669232260.773:1910): pid=2569 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/155/bus" dev="sda1" ino=14178 res=1 [ 949.514920] audit: type=1804 audit(1669232260.943:1911): pid=2571 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/155/bus" dev="sda1" ino=14178 res=1 [ 949.681395] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:37:41 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) 19:37:41 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:41 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:41 executing program 3: unshare(0x60020200) timer_settime(0x0, 0x0, 0x0, 0x0) unshare(0x0) pipe(0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) r1 = eventfd(0x10004) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)=r1) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1, r1}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000180)=""/56, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000006c0)=ANY=[]) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f00000002c0)=&(0x7f00000001c0)) r2 = signalfd(r0, &(0x7f0000000080)={[0x80000001]}, 0x8) ioctl$VHOST_SET_VRING_ADDR(r2, 0x4028af11, &(0x7f0000000440)={0x2, 0x0, &(0x7f0000000300)=""/85, &(0x7f0000000380)=""/130, &(0x7f0000000580)=""/162, 0x7002}) 19:37:41 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x90990200, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) [ 950.105897] audit: type=1804 audit(1669232261.543:1912): pid=2587 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/156/bus" dev="sda1" ino=13839 res=1 [ 950.135557] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 950.192073] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 950.240739] IPVS: ftp: loaded support on port[0] = 21 [ 950.300591] device veth0_to_bond entered promiscuous mode [ 950.333500] audit: type=1804 audit(1669232261.673:1913): pid=2600 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/156/bus" dev="sda1" ino=13839 res=1 [ 950.365356] team0: Device macvtap51 failed to register rx_handler 19:37:41 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:41 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 950.438494] device veth0_to_bond left promiscuous mode [ 950.490147] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 950.517317] audit: type=1804 audit(1669232261.913:1914): pid=2586 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir341425662/syzkaller.qJXiPn/466/bus" dev="sda1" ino=14162 res=1 [ 950.654262] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 950.776242] audit: type=1804 audit(1669232262.023:1915): pid=2609 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir2073225363/syzkaller.t6UfHe/8/bus" dev="sda1" ino=14210 res=1 19:37:42 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) 19:37:42 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 951.010181] audit: type=1804 audit(1669232262.023:1916): pid=2612 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/157/bus" dev="sda1" ino=14178 res=1 [ 951.035265] audit: type=1804 audit(1669232262.133:1917): pid=2613 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir341425662/syzkaller.qJXiPn/466/bus" dev="sda1" ino=14162 res=1 [ 951.061079] audit: type=1804 audit(1669232262.173:1918): pid=2612 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/157/bus" dev="sda1" ino=14178 res=1 19:37:42 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:42 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 951.497875] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:37:43 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, 0x0, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:43 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, 0x0) [ 951.580365] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:37:43 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x91990200, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:37:43 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, 0x0, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 951.975991] device veth0_to_bond entered promiscuous mode [ 952.040609] team0: Device macvtap51 failed to register rx_handler [ 952.094557] device veth0_to_bond left promiscuous mode [ 952.249695] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:37:45 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, 0x0) 19:37:45 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:45 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, 0x0, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:45 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x92000000, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:37:45 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) 19:37:45 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, 0x0) [ 953.731676] device veth0_to_bond entered promiscuous mode [ 953.740467] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 953.810980] team0: Device macvtap51 failed to register rx_handler 19:37:45 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040), 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:45 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 953.890013] device veth0_to_bond left promiscuous mode 19:37:45 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040), 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 954.469726] kauditd_printk_skb: 20 callbacks suppressed [ 954.469739] audit: type=1804 audit(1669232265.903:1939): pid=2687 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir4247018496/syzkaller.Rf6NE1/66/bus" dev="sda1" ino=14563 res=1 19:37:45 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 954.741617] net_ratelimit: 4 callbacks suppressed [ 954.741627] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 954.843505] audit: type=1804 audit(1669232266.053:1940): pid=2706 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir2073225363/syzkaller.t6UfHe/15/bus" dev="sda1" ino=14623 res=1 19:37:46 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(0xffffffffffffffff, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:46 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040), 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 955.114276] audit: type=1804 audit(1669232266.113:1941): pid=2688 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir2693782222/syzkaller.HDrBKC/535/bus" dev="sda1" ino=14624 res=1 [ 955.246231] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 955.306904] audit: type=1804 audit(1669232266.173:1942): pid=2711 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/161/bus" dev="sda1" ino=14635 res=1 [ 955.346240] audit: type=1804 audit(1669232266.173:1943): pid=2706 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir2073225363/syzkaller.t6UfHe/15/bus" dev="sda1" ino=14623 res=1 [ 955.369897] audit: type=1804 audit(1669232266.273:1944): pid=2713 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/161/bus" dev="sda1" ino=14635 res=1 [ 955.397120] audit: type=1804 audit(1669232266.663:1945): pid=2719 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/162/bus" dev="sda1" ino=14635 res=1 [ 955.500741] audit: type=1804 audit(1669232266.723:1946): pid=2719 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/162/bus" dev="sda1" ino=14635 res=1 [ 955.560709] audit: type=1804 audit(1669232266.943:1947): pid=2722 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir2073225363/syzkaller.t6UfHe/16/bus" dev="sda1" ino=14623 res=1 19:37:47 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x3c, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:37:47 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(0xffffffffffffffff, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:47 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:47 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, 0x0) 19:37:47 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x92990200, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:37:47 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, 0x0) [ 955.939846] device veth0_to_bond entered promiscuous mode 19:37:47 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(0xffffffffffffffff, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 955.974498] audit: type=1804 audit(1669232267.413:1948): pid=2743 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/163/bus" dev="sda1" ino=14646 res=1 [ 955.999399] team0: Device macvtap51 failed to register rx_handler [ 956.007728] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 956.067787] device veth0_to_bond left promiscuous mode 19:37:47 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 956.188802] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 956.220464] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:37:47 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r5}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 956.267753] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 956.451817] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:37:48 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r5}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:48 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:48 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 957.011659] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 957.072914] device veth0_to_bond entered promiscuous mode [ 957.112424] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 957.156377] team0: Device macvtap1 failed to register rx_handler [ 957.198843] device veth0_to_bond left promiscuous mode 19:37:49 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xac, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xac}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:49 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r5}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:49 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) 19:37:49 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xac, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r5}]}, 0xac}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:49 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x93990200, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) [ 957.838993] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:37:49 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:49 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 958.006689] device veth0_to_bond entered promiscuous mode [ 958.075080] team0: Device macvtap51 failed to register rx_handler 19:37:49 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, 0x0) 19:37:49 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 958.225415] device veth0_to_bond left promiscuous mode 19:37:49 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xac, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r5}]}, 0xac}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:49 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:50 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:50 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:50 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000180)) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:50 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(0x0, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:50 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 959.513239] kauditd_printk_skb: 43 callbacks suppressed [ 959.513253] audit: type=1804 audit(1669232270.953:1992): pid=2861 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir4247018496/syzkaller.Rf6NE1/70/bus" dev="sda1" ino=14662 res=1 19:37:51 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x94010000, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:37:51 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000180)) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:51 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, 0x0) [ 960.002554] device veth0_to_bond entered promiscuous mode [ 960.014921] audit: type=1804 audit(1669232271.453:1993): pid=2885 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir2073225363/syzkaller.t6UfHe/24/bus" dev="sda1" ino=14652 res=1 [ 960.019117] net_ratelimit: 14 callbacks suppressed [ 960.019126] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 960.069033] audit: type=1804 audit(1669232271.503:1994): pid=2858 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir2693782222/syzkaller.HDrBKC/538/bus" dev="sda1" ino=14648 res=1 [ 960.171198] audit: type=1804 audit(1669232271.603:1995): pid=2887 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir4247018496/syzkaller.Rf6NE1/71/bus" dev="sda1" ino=14654 res=1 [ 960.212878] team0: Device macvtap51 failed to register rx_handler [ 960.254615] audit: type=1804 audit(1669232271.693:1996): pid=2878 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir2073225363/syzkaller.t6UfHe/24/bus" dev="sda1" ino=14652 res=1 [ 960.281558] device veth0_to_bond left promiscuous mode 19:37:51 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xac, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xac}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:51 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(0x0, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:51 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000180)) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 960.492231] audit: type=1804 audit(1669232271.933:1997): pid=2892 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/172/bus" dev="sda1" ino=14166 res=1 [ 960.524248] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 960.621754] audit: type=1804 audit(1669232272.063:1998): pid=2897 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir341425662/syzkaller.qJXiPn/472/bus" dev="sda1" ino=14642 res=1 [ 960.652538] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:37:52 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xac, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xac}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 960.661733] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 960.783933] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 960.825284] audit: type=1804 audit(1669232272.093:1999): pid=2899 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir2073225363/syzkaller.t6UfHe/25/bus" dev="sda1" ino=14663 res=1 19:37:52 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 961.010351] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 961.137402] audit: type=1804 audit(1669232272.233:2000): pid=2903 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir2073225363/syzkaller.t6UfHe/25/bus" dev="sda1" ino=14663 res=1 [ 961.239746] audit: type=1804 audit(1669232272.363:2001): pid=2912 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir341425662/syzkaller.qJXiPn/472/bus" dev="sda1" ino=14642 res=1 19:37:52 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(0x0, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 961.616843] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:37:53 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x94990200, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) [ 962.192773] device veth0_to_bond entered promiscuous mode [ 962.265930] team0: Device macvtap51 failed to register rx_handler 19:37:53 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, 0x0) [ 962.308461] device veth0_to_bond left promiscuous mode 19:37:53 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 962.524312] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:37:54 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(0x0, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:54 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, 0x0) [ 962.643573] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:37:54 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 962.879081] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:37:54 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:37:55 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, 0x0) 19:37:55 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, 0x0) 19:37:55 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x4008000) [ 966.470818] IPVS: ftp: loaded support on port[0] = 21 [ 966.764719] chnl_net:caif_netlink_parms(): no params data found [ 966.807445] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 966.815424] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 966.824142] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 966.832112] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 966.840873] device bridge_slave_1 left promiscuous mode [ 966.846379] bridge0: port 2(bridge_slave_1) entered disabled state [ 966.854068] device bridge_slave_0 left promiscuous mode [ 966.859874] bridge0: port 1(bridge_slave_0) entered disabled state [ 966.869401] device veth1_macvtap left promiscuous mode [ 966.874711] device veth0_macvtap left promiscuous mode [ 966.881063] device veth1_vlan left promiscuous mode [ 966.886282] device veth0_vlan left promiscuous mode [ 968.448676] Bluetooth: hci3: command 0x0409 tx timeout [ 970.528553] Bluetooth: hci3: command 0x041b tx timeout [ 971.235778] device hsr_slave_1 left promiscuous mode [ 971.243649] device hsr_slave_0 left promiscuous mode [ 971.260204] team0 (unregistering): Port device team_slave_1 removed [ 971.270845] team0 (unregistering): Port device team_slave_0 removed [ 971.282510] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 971.293949] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 971.323959] bond0 (unregistering): Released all slaves [ 971.346789] bridge0: port 1(bridge_slave_0) entered blocking state [ 971.355614] bridge0: port 1(bridge_slave_0) entered disabled state [ 971.363188] device bridge_slave_0 entered promiscuous mode [ 971.371971] bridge0: port 2(bridge_slave_1) entered blocking state [ 971.378365] bridge0: port 2(bridge_slave_1) entered disabled state [ 971.387218] device bridge_slave_1 entered promiscuous mode [ 971.410162] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 971.419588] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 971.436792] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 971.444225] team0: Port device team_slave_0 added [ 971.450516] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 971.457803] team0: Port device team_slave_1 added [ 971.484932] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 971.491776] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 971.518081] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 971.530826] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 971.537089] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 971.563604] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 971.579526] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 971.588262] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 971.614304] device hsr_slave_0 entered promiscuous mode [ 971.620700] device hsr_slave_1 entered promiscuous mode [ 971.626996] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 971.636208] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 971.760488] bridge0: port 2(bridge_slave_1) entered blocking state [ 971.767048] bridge0: port 2(bridge_slave_1) entered forwarding state [ 971.855501] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 971.872353] 8021q: adding VLAN 0 to HW filter on device bond0 [ 971.905608] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 971.920979] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 971.927342] bridge0: port 2(bridge_slave_1) entered disabled state [ 971.941761] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 971.953963] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 971.964046] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 971.979000] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 971.985275] 8021q: adding VLAN 0 to HW filter on device team0 [ 972.003014] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 972.015141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 972.024570] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 972.038759] bridge0: port 1(bridge_slave_0) entered blocking state [ 972.045120] bridge0: port 1(bridge_slave_0) entered forwarding state [ 972.070951] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 972.080391] bridge0: port 2(bridge_slave_1) entered blocking state [ 972.086745] bridge0: port 2(bridge_slave_1) entered forwarding state [ 972.095501] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 972.106379] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 972.123843] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 972.133971] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 972.145856] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 972.153670] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 972.162379] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 972.171163] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 972.183672] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 972.238286] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 972.247503] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 972.255001] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 972.263648] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 972.285857] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 972.351140] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 972.363941] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 972.371386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 972.381407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 972.440117] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 972.447496] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 972.456172] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 972.468188] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 972.475606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 972.485162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 972.495009] device veth0_vlan entered promiscuous mode [ 972.503285] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 972.513117] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 972.525979] device veth1_vlan entered promiscuous mode [ 972.533911] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 972.545222] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 972.560585] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 972.572612] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 972.580162] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 972.587668] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 972.595776] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 972.603951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 972.613685] Bluetooth: hci3: command 0x040f tx timeout [ 972.616043] device veth0_macvtap entered promiscuous mode [ 972.625867] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 972.636471] device veth1_macvtap entered promiscuous mode [ 972.642878] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 972.652881] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 972.663057] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 972.672147] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 972.682025] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 972.691516] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 972.701391] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 972.710844] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 972.720661] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 972.729869] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 972.739772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 972.749062] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 972.758837] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 972.769586] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 972.776565] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 972.785041] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 972.793010] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 972.800556] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 972.808600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 972.819722] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 972.829592] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 972.839979] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 972.849981] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 972.859274] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 972.869127] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 972.878242] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 972.888419] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 972.897538] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 972.907844] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 972.919264] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 972.926279] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 972.934563] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 972.942714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 973.064919] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 973.072607] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 973.086375] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 973.096559] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 973.108085] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 973.116085] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 973.124276] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 973.134519] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 973.212160] kauditd_printk_skb: 20 callbacks suppressed [ 973.212173] audit: type=1804 audit(1669232284.654:2022): pid=3274 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3155047248/syzkaller.ihTb3G/0/bus" dev="sda1" ino=13921 res=1 [ 973.213775] net_ratelimit: 6 callbacks suppressed [ 973.213784] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 973.348107] audit: type=1804 audit(1669232284.784:2023): pid=3275 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3155047248/syzkaller.ihTb3G/0/bus" dev="sda1" ino=13921 res=1 19:38:05 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:05 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, 0x0) 19:38:05 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x95990200, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:38:05 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x4008000) 19:38:05 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) 19:38:05 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) [ 974.116416] device veth0_to_bond entered promiscuous mode [ 974.146095] audit: type=1804 audit(1669232285.584:2024): pid=3294 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir341425662/syzkaller.qJXiPn/475/bus" dev="sda1" ino=14177 res=1 [ 974.150894] team0: Device macvtap51 failed to register rx_handler [ 974.151716] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 974.235339] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 974.261451] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 974.263205] device veth0_to_bond left promiscuous mode [ 974.297917] audit: type=1804 audit(1669232285.614:2025): pid=3293 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/178/bus" dev="sda1" ino=14130 res=1 [ 974.320215] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 974.374587] audit: type=1804 audit(1669232285.664:2026): pid=3292 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3155047248/syzkaller.ihTb3G/1/bus" dev="sda1" ino=14257 res=1 [ 974.398906] audit: type=1804 audit(1669232285.684:2027): pid=3295 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir2693782222/syzkaller.HDrBKC/542/bus" dev="sda1" ino=14194 res=1 [ 974.453123] audit: type=1804 audit(1669232285.844:2028): pid=3293 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/178/bus" dev="sda1" ino=14130 res=1 [ 974.587938] audit: type=1804 audit(1669232285.934:2029): pid=3294 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir341425662/syzkaller.qJXiPn/475/bus" dev="sda1" ino=14177 res=1 19:38:06 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x4008000) [ 974.680401] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 974.690354] Bluetooth: hci3: command 0x0419 tx timeout 19:38:06 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) [ 974.747693] audit: type=1804 audit(1669232286.014:2030): pid=3295 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir2693782222/syzkaller.HDrBKC/542/bus" dev="sda1" ino=14194 res=1 [ 974.868724] audit: type=1804 audit(1669232286.074:2031): pid=3298 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3155047248/syzkaller.ihTb3G/1/bus" dev="sda1" ino=14257 res=1 19:38:06 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, 0x0) [ 974.974157] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 975.116430] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 975.150219] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:38:06 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:06 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 975.446474] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:38:07 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:07 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:07 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x96990200, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:38:07 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:07 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, 0x0) [ 976.269633] device veth0_to_bond entered promiscuous mode 19:38:07 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 976.316101] team0: Device macvtap51 failed to register rx_handler [ 976.409174] device veth0_to_bond left promiscuous mode 19:38:07 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:07 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, 0x0) 19:38:08 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:08 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) 19:38:08 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200), 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:08 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:09 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:09 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x97990200, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:38:09 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200), 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:09 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) [ 978.003642] device veth0_to_bond entered promiscuous mode [ 978.011163] team0: Device macvtap51 failed to register rx_handler [ 978.042086] device veth0_to_bond left promiscuous mode [ 978.345468] kauditd_printk_skb: 29 callbacks suppressed [ 978.345484] audit: type=1804 audit(1669232289.784:2061): pid=3406 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/184/bus" dev="sda1" ino=13955 res=1 [ 978.505196] net_ratelimit: 8 callbacks suppressed [ 978.505208] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 978.521360] audit: type=1804 audit(1669232289.864:2062): pid=3393 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir2693782222/syzkaller.HDrBKC/544/bus" dev="sda1" ino=14371 res=1 [ 978.545147] audit: type=1804 audit(1669232289.914:2063): pid=3405 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir341425662/syzkaller.qJXiPn/478/bus" dev="sda1" ino=13986 res=1 [ 978.747245] audit: type=1804 audit(1669232290.184:2064): pid=3412 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir341425662/syzkaller.qJXiPn/478/bus" dev="sda1" ino=13986 res=1 19:38:10 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, 0x0) 19:38:10 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:10 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200), 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:10 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x98990200, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) [ 979.214938] device veth0_to_bond entered promiscuous mode 19:38:10 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) [ 979.288812] team0: Device macvtap51 failed to register rx_handler [ 979.292132] audit: type=1804 audit(1669232290.715:2065): pid=3430 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/185/bus" dev="sda1" ino=14435 res=1 [ 979.329834] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:38:10 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 979.454751] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 979.466349] device veth0_to_bond left promiscuous mode [ 979.490492] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 979.560007] audit: type=1804 audit(1669232290.775:2066): pid=3431 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3155047248/syzkaller.ihTb3G/9/bus" dev="sda1" ino=14436 res=1 19:38:11 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:11 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:11 executing program 2: open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007ffb) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) [ 979.899791] audit: type=1804 audit(1669232290.865:2067): pid=3435 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir2693782222/syzkaller.HDrBKC/545/bus" dev="sda1" ino=14371 res=1 [ 980.029875] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 980.156227] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 980.257894] audit: type=1804 audit(1669232290.925:2068): pid=3428 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir4247018496/syzkaller.Rf6NE1/75/bus" dev="sda1" ino=14466 res=1 19:38:11 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 980.342701] audit: type=1804 audit(1669232290.975:2069): pid=3430 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/185/bus" dev="sda1" ino=14435 res=1 19:38:11 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 980.426906] audit: type=1804 audit(1669232291.115:2070): pid=3442 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir4247018496/syzkaller.Rf6NE1/75/bus" dev="sda1" ino=14466 res=1 [ 980.514237] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:38:12 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:12 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:12 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:12 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007ffb) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) 19:38:12 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x99990200, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:38:12 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 981.293640] device veth0_to_bond entered promiscuous mode [ 981.318369] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 981.414087] team0: Device macvtap51 failed to register rx_handler [ 981.445934] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:38:13 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 981.497342] device veth0_to_bond left promiscuous mode [ 981.594059] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:38:13 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:13 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007ffb) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) 19:38:13 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8901, &(0x7f0000000080)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) 19:38:13 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:13 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007ffb) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) 19:38:13 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:14 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) 19:38:14 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x9a010000, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:38:14 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 983.127990] device veth0_to_bond entered promiscuous mode [ 983.238507] team0: Device macvtap51 failed to register rx_handler [ 983.287154] device veth0_to_bond left promiscuous mode 19:38:14 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 983.445123] kauditd_printk_skb: 32 callbacks suppressed [ 983.445138] audit: type=1804 audit(1669232294.885:2103): pid=3564 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/191/bus" dev="sda1" ino=14495 res=1 [ 983.615054] net_ratelimit: 8 callbacks suppressed [ 983.615066] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:38:15 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x0, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:15 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) [ 983.715194] audit: type=1804 audit(1669232295.045:2104): pid=3567 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3155047248/syzkaller.ihTb3G/17/bus" dev="sda1" ino=14643 res=1 [ 983.827158] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 983.933424] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 984.037817] audit: type=1804 audit(1669232295.245:2105): pid=3571 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/192/bus" dev="sda1" ino=14321 res=1 [ 984.062552] audit: type=1804 audit(1669232295.345:2106): pid=3574 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir4247018496/syzkaller.Rf6NE1/78/bus" dev="sda1" ino=14495 res=1 19:38:15 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x0, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 984.090872] audit: type=1804 audit(1669232295.405:2107): pid=3576 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3155047248/syzkaller.ihTb3G/17/bus" dev="sda1" ino=14643 res=1 [ 984.278154] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 984.382382] audit: type=1804 audit(1669232295.405:2108): pid=3575 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/192/bus" dev="sda1" ino=14321 res=1 [ 984.406295] audit: type=1804 audit(1669232295.695:2109): pid=3581 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/193/bus" dev="sda1" ino=14321 res=1 [ 984.430935] audit: type=1804 audit(1669232295.815:2110): pid=3578 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir4247018496/syzkaller.Rf6NE1/78/bus" dev="sda1" ino=14495 res=1 [ 984.529612] audit: type=1804 audit(1669232295.965:2111): pid=3584 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/193/bus" dev="sda1" ino=14321 res=1 19:38:16 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:16 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x0, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:16 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) [ 984.782911] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 984.838018] audit: type=1804 audit(1669232296.205:2112): pid=3591 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3155047248/syzkaller.ihTb3G/18/bus" dev="sda1" ino=14483 res=1 [ 984.974112] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:38:16 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x9a990200, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:38:16 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 985.269737] device veth0_to_bond entered promiscuous mode [ 985.316334] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 985.320995] team0: Device macvtap51 failed to register rx_handler [ 985.372890] device veth0_to_bond left promiscuous mode 19:38:16 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) (fail_nth: 1) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, 0x0) 19:38:16 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x0, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:16 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) (fail_nth: 1) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xac, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x0, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xac}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 985.456048] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 985.672239] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 985.688127] FAULT_INJECTION: forcing a failure. [ 985.688127] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 985.702783] CPU: 0 PID: 3624 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 985.710612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 985.719974] Call Trace: [ 985.722576] dump_stack+0x1fc/0x2ef [ 985.726236] should_fail.cold+0xa/0xf [ 985.730058] ? setup_fault_attr+0x200/0x200 [ 985.734386] ? __save_stack_trace+0x72/0x190 [ 985.738812] ? deref_stack_reg+0x134/0x1d0 [ 985.743063] ? get_reg+0x176/0x1f0 [ 985.746619] ? crc32c_pcl_intel_update+0x1b9/0x320 [ 985.751574] __alloc_pages_nodemask+0x239/0x2890 [ 985.756352] ? ext4_inode_csum+0x676/0x920 [ 985.760614] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 985.765473] ? __brelse+0x84/0xa0 [ 985.768950] ? mark_held_locks+0xf0/0xf0 [ 985.773036] alloc_pages_current+0x193/0x2a0 [ 985.777460] skb_page_frag_refill+0x258/0x550 [ 985.781973] sk_page_frag_refill+0x4a/0x1d0 [ 985.786395] sk_alloc_sg+0x154/0x850 [ 985.790138] tls_sw_sendpage+0x4e1/0xd00 [ 985.794221] ? lock_downgrade+0x720/0x720 [ 985.798388] ? tls_sw_sendmsg+0x1210/0x1210 [ 985.802981] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 985.808270] ? tls_sw_sendmsg+0x1210/0x1210 [ 985.812693] inet_sendpage+0x164/0x650 [ 985.816590] ? current_time+0x13c/0x1c0 [ 985.820586] ? inet_accept+0x770/0x770 [ 985.824478] sock_sendpage+0xdf/0x140 [ 985.828302] pipe_to_sendpage+0x268/0x330 [ 985.832468] ? sockfs_setattr+0x160/0x160 [ 985.836636] ? direct_splice_actor+0x160/0x160 [ 985.841237] ? splice_from_pipe_next.part.0+0x2ad/0x360 [ 985.846623] __splice_from_pipe+0x389/0x800 [ 985.850962] ? direct_splice_actor+0x160/0x160 [ 985.855569] generic_splice_sendpage+0xd4/0x140 [ 985.860248] ? __splice_from_pipe+0x800/0x800 [ 985.864761] ? security_file_permission+0x1c0/0x220 [ 985.869788] ? __splice_from_pipe+0x800/0x800 [ 985.870479] FAULT_INJECTION: forcing a failure. [ 985.870479] name failslab, interval 1, probability 0, space 0, times 0 [ 985.874297] direct_splice_actor+0x115/0x160 [ 985.874348] splice_direct_to_actor+0x33f/0x8d0 [ 985.894699] ? generic_pipe_buf_nosteal+0x10/0x10 [ 985.899564] ? do_splice_to+0x160/0x160 [ 985.903566] do_splice_direct+0x1a7/0x270 [ 985.907730] ? splice_direct_to_actor+0x8d0/0x8d0 [ 985.912595] ? security_file_permission+0x1c0/0x220 [ 985.917648] do_sendfile+0x550/0xc30 [ 985.921384] ? do_compat_pwritev64+0x1b0/0x1b0 [ 985.925985] ? vfs_write+0x393/0x540 [ 985.929733] __se_sys_sendfile64+0x147/0x160 [ 985.934157] ? __se_sys_sendfile+0x180/0x180 [ 985.938583] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 985.943966] ? trace_hardirqs_off_caller+0x6e/0x210 [ 985.949006] ? do_syscall_64+0x21/0x620 [ 985.953004] do_syscall_64+0xf9/0x620 [ 985.956834] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 985.962040] RIP: 0033:0x7fcec327d109 [ 985.965764] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 985.984673] RSP: 002b:00007fcec17ef168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 985.992392] RAX: ffffffffffffffda RBX: 00007fcec339cf80 RCX: 00007fcec327d109 [ 985.999665] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 986.007025] RBP: 00007fcec17ef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 986.014293] R10: 0000800100020046 R11: 0000000000000246 R12: 0000000000000001 19:38:17 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 986.021563] R13: 00007ffe478ef16f R14: 00007fcec17ef300 R15: 0000000000022000 [ 986.028880] CPU: 1 PID: 3626 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 986.036697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 986.046056] Call Trace: [ 986.048661] dump_stack+0x1fc/0x2ef [ 986.052314] should_fail.cold+0xa/0xf [ 986.056132] ? setup_fault_attr+0x200/0x200 [ 986.060462] ? lock_acquire+0x170/0x3c0 [ 986.064452] __should_failslab+0x115/0x180 [ 986.068700] should_failslab+0x5/0x10 [ 986.072509] kmem_cache_alloc_trace+0x284/0x380 [ 986.077193] alloc_pipe_info+0xb8/0x470 [ 986.081185] splice_direct_to_actor+0x6dd/0x8d0 [ 986.085865] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 986.090635] ? apparmor_getprocattr+0x11e0/0x11e0 [ 986.095490] ? generic_pipe_buf_nosteal+0x10/0x10 [ 986.100342] ? do_splice_to+0x160/0x160 [ 986.104328] ? security_file_permission+0x1c0/0x220 [ 986.109361] do_splice_direct+0x1a7/0x270 [ 986.113525] ? splice_direct_to_actor+0x8d0/0x8d0 [ 986.118388] do_sendfile+0x550/0xc30 [ 986.122126] ? do_compat_pwritev64+0x1b0/0x1b0 [ 986.126719] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 986.131323] ? rcu_nmi_exit+0xb3/0x180 [ 986.135224] __se_sys_sendfile64+0x147/0x160 [ 986.139641] ? __se_sys_sendfile+0x180/0x180 [ 986.144065] ? do_syscall_64+0x4f/0x620 [ 986.148061] do_syscall_64+0xf9/0x620 [ 986.151881] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 986.157076] RIP: 0033:0x7f2e2fd68109 19:38:17 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x0, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 986.160798] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 986.179712] RSP: 002b:00007f2e2e2b9168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 986.187431] RAX: ffffffffffffffda RBX: 00007f2e2fe88050 RCX: 00007f2e2fd68109 [ 986.194705] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000007 [ 986.201978] RBP: 00007f2e2e2b91d0 R08: 0000000000000000 R09: 0000000000000000 [ 986.209265] R10: 0000800100020046 R11: 0000000000000246 R12: 0000000000000001 [ 986.216551] R13: 00007ffd75bf4b9f R14: 00007f2e2e2b9300 R15: 0000000000022000 [ 986.281176] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:38:17 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) (fail_nth: 2) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, 0x0) 19:38:18 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:18 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) (fail_nth: 2) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xac, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x0, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xac}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 986.819031] FAULT_INJECTION: forcing a failure. [ 986.819031] name failslab, interval 1, probability 0, space 0, times 0 [ 986.890644] CPU: 0 PID: 3658 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 986.898484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 986.907842] Call Trace: [ 986.910437] dump_stack+0x1fc/0x2ef [ 986.914072] should_fail.cold+0xa/0xf [ 986.918045] ? setup_fault_attr+0x200/0x200 [ 986.922381] ? lock_acquire+0x170/0x3c0 [ 986.926377] __should_failslab+0x115/0x180 [ 986.930629] should_failslab+0x5/0x10 [ 986.934427] __kmalloc+0x2ab/0x3c0 [ 986.937967] ? alloc_pipe_info+0x193/0x470 [ 986.942209] alloc_pipe_info+0x193/0x470 [ 986.946260] ? alloc_pipe_info+0x2/0x470 [ 986.950320] splice_direct_to_actor+0x6dd/0x8d0 [ 986.954985] ? apparmor_getprocattr+0x11e0/0x11e0 [ 986.959863] ? generic_pipe_buf_nosteal+0x10/0x10 [ 986.964711] ? do_splice_to+0x160/0x160 [ 986.968689] ? security_file_permission+0x1c0/0x220 [ 986.973884] do_splice_direct+0x1a7/0x270 [ 986.978052] ? splice_direct_to_actor+0x8d0/0x8d0 [ 986.982892] ? security_file_permission+0x1c0/0x220 [ 986.987903] do_sendfile+0x550/0xc30 [ 986.991613] ? do_compat_pwritev64+0x1b0/0x1b0 [ 986.996205] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 987.000782] ? rcu_nmi_exit+0xb3/0x180 [ 987.004678] __se_sys_sendfile64+0x147/0x160 [ 987.009086] ? __se_sys_sendfile+0x180/0x180 [ 987.013587] do_syscall_64+0xf9/0x620 [ 987.017387] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 987.022572] RIP: 0033:0x7fcec327d109 [ 987.026304] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 987.045191] RSP: 002b:00007fcec17ce168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 987.052887] RAX: ffffffffffffffda RBX: 00007fcec339d050 RCX: 00007fcec327d109 [ 987.060146] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 987.067402] RBP: 00007fcec17ce1d0 R08: 0000000000000000 R09: 0000000000000000 [ 987.074658] R10: 0000800100020046 R11: 0000000000000246 R12: 0000000000000001 [ 987.081922] R13: 00007ffe478ef16f R14: 00007fcec17ce300 R15: 0000000000022000 [ 987.126356] FAULT_INJECTION: forcing a failure. [ 987.126356] name failslab, interval 1, probability 0, space 0, times 0 19:38:18 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x0, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 987.281948] CPU: 1 PID: 3661 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 987.289795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 987.299150] Call Trace: [ 987.301754] dump_stack+0x1fc/0x2ef [ 987.305385] should_fail.cold+0xa/0xf [ 987.309178] ? setup_fault_attr+0x200/0x200 [ 987.313578] ? lock_acquire+0x170/0x3c0 [ 987.317548] __should_failslab+0x115/0x180 [ 987.321784] should_failslab+0x5/0x10 [ 987.325574] __kmalloc+0x2ab/0x3c0 [ 987.329106] ? alloc_pipe_info+0x193/0x470 [ 987.333337] alloc_pipe_info+0x193/0x470 [ 987.337392] splice_direct_to_actor+0x6dd/0x8d0 [ 987.342081] ? apparmor_getprocattr+0x11e0/0x11e0 [ 987.346917] ? generic_pipe_buf_nosteal+0x10/0x10 [ 987.351750] ? do_splice_to+0x160/0x160 [ 987.355724] ? security_file_permission+0x1c0/0x220 [ 987.360742] do_splice_direct+0x1a7/0x270 [ 987.364880] ? splice_direct_to_actor+0x8d0/0x8d0 [ 987.369722] do_sendfile+0x550/0xc30 [ 987.373431] ? do_compat_pwritev64+0x1b0/0x1b0 [ 987.378002] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 987.382577] ? rcu_nmi_exit+0xb3/0x180 [ 987.386456] __se_sys_sendfile64+0x147/0x160 [ 987.390878] ? __se_sys_sendfile+0x180/0x180 [ 987.395289] ? do_syscall_64+0x4f/0x620 [ 987.399261] do_syscall_64+0xf9/0x620 [ 987.403060] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 987.408238] RIP: 0033:0x7f2e2fd68109 [ 987.411943] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 987.430828] RSP: 002b:00007f2e2e2b9168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 987.438524] RAX: ffffffffffffffda RBX: 00007f2e2fe88050 RCX: 00007f2e2fd68109 [ 987.445783] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 987.453043] RBP: 00007f2e2e2b91d0 R08: 0000000000000000 R09: 0000000000000000 [ 987.460300] R10: 0000800100020046 R11: 0000000000000246 R12: 0000000000000001 [ 987.467561] R13: 00007ffd75bf4b9f R14: 00007f2e2e2b9300 R15: 0000000000022000 19:38:19 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) 19:38:19 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x9b990200, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:38:19 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:19 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) (fail_nth: 3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, 0x0) 19:38:19 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xac, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x0, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xac}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:19 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x0, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 988.039755] device veth0_to_bond entered promiscuous mode [ 988.113805] team0: Device macvtap51 failed to register rx_handler [ 988.132479] FAULT_INJECTION: forcing a failure. [ 988.132479] name failslab, interval 1, probability 0, space 0, times 0 [ 988.231544] device veth0_to_bond left promiscuous mode [ 988.267609] CPU: 0 PID: 3682 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 988.275444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 988.284807] Call Trace: [ 988.287409] dump_stack+0x1fc/0x2ef [ 988.291047] should_fail.cold+0xa/0xf [ 988.294860] ? check_preemption_disabled+0x41/0x280 [ 988.299885] ? setup_fault_attr+0x200/0x200 [ 988.304223] ? is_bpf_text_address+0xfc/0x1b0 [ 988.308721] __should_failslab+0x115/0x180 [ 988.313138] should_failslab+0x5/0x10 [ 988.316934] __kmalloc+0x6d/0x3c0 [ 988.320406] ? gcmaes_encrypt.constprop.0+0x6c2/0xd90 [ 988.325605] gcmaes_encrypt.constprop.0+0x6c2/0xd90 [ 988.330628] ? gcmaes_crypt_by_sg.constprop.0+0x1790/0x1790 [ 988.336333] ? inet_sendpage+0x164/0x650 [ 988.340389] ? sock_sendpage+0xdf/0x140 [ 988.344361] ? pipe_to_sendpage+0x268/0x330 [ 988.348687] ? __splice_from_pipe+0x389/0x800 [ 988.353192] ? generic_splice_sendpage+0xd4/0x140 [ 988.358042] ? direct_splice_actor+0x115/0x160 [ 988.362632] ? splice_direct_to_actor+0x33f/0x8d0 [ 988.367485] ? do_splice_direct+0x1a7/0x270 [ 988.371815] ? do_sendfile+0x550/0xc30 [ 988.375702] ? __se_sys_sendfile64+0x147/0x160 [ 988.380282] ? do_syscall_64+0xf9/0x620 [ 988.384255] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 988.389656] ? __lock_acquire+0x6de/0x3ff0 [ 988.393904] ? __brelse+0x84/0xa0 [ 988.397369] ? generic_gcmaes_encrypt+0x108/0x160 [ 988.402212] ? generic_gcmaes_encrypt+0x108/0x160 [ 988.407052] ? helper_rfc4106_encrypt+0x310/0x310 [ 988.411935] ? gcmaes_wrapper_encrypt+0x157/0x1f0 [ 988.416821] ? tls_push_record+0x9d7/0x1370 [ 988.421157] ? tls_sw_sendpage+0x8c6/0xd00 [ 988.425409] ? tls_sw_sendmsg+0x1210/0x1210 [ 988.429736] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 988.434943] ? tls_sw_sendmsg+0x1210/0x1210 [ 988.439350] ? inet_sendpage+0x164/0x650 [ 988.443413] ? current_time+0x13c/0x1c0 [ 988.447390] ? inet_accept+0x770/0x770 [ 988.451283] ? sock_sendpage+0xdf/0x140 [ 988.455258] ? pipe_to_sendpage+0x268/0x330 [ 988.459573] ? sockfs_setattr+0x160/0x160 [ 988.463721] ? direct_splice_actor+0x160/0x160 [ 988.468302] ? splice_from_pipe_next.part.0+0x2ad/0x360 [ 988.473704] ? __splice_from_pipe+0x389/0x800 [ 988.478207] ? direct_splice_actor+0x160/0x160 [ 988.482791] ? generic_splice_sendpage+0xd4/0x140 [ 988.487635] ? __splice_from_pipe+0x800/0x800 [ 988.492227] ? security_file_permission+0x1c0/0x220 [ 988.497246] ? __splice_from_pipe+0x800/0x800 [ 988.501741] ? direct_splice_actor+0x115/0x160 [ 988.506323] ? splice_direct_to_actor+0x33f/0x8d0 [ 988.511173] ? generic_pipe_buf_nosteal+0x10/0x10 [ 988.516021] ? do_splice_to+0x160/0x160 [ 988.520089] ? do_splice_direct+0x1a7/0x270 [ 988.524409] ? splice_direct_to_actor+0x8d0/0x8d0 [ 988.529253] ? security_file_permission+0x1c0/0x220 [ 988.534273] ? do_sendfile+0x550/0xc30 [ 988.538167] ? do_compat_pwritev64+0x1b0/0x1b0 [ 988.542751] ? vfs_write+0x393/0x540 [ 988.546469] ? __se_sys_sendfile64+0x147/0x160 [ 988.551050] ? __se_sys_sendfile+0x180/0x180 [ 988.555459] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 988.560823] ? trace_hardirqs_off_caller+0x6e/0x210 [ 988.565841] ? do_syscall_64+0x21/0x620 [ 988.569819] ? do_syscall_64+0xf9/0x620 [ 988.573804] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 19:38:20 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x0, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 988.715234] kauditd_printk_skb: 32 callbacks suppressed [ 988.715249] audit: type=1804 audit(1669232300.146:2145): pid=3702 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir4247018496/syzkaller.Rf6NE1/81/bus" dev="sda1" ino=14670 res=1 19:38:20 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 988.882684] net_ratelimit: 9 callbacks suppressed [ 988.882694] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 988.884344] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 988.888436] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 989.075019] audit: type=1804 audit(1669232300.306:2146): pid=3707 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/199/bus" dev="sda1" ino=14211 res=1 19:38:20 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x9c990200, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:38:20 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x0, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 989.321726] audit: type=1804 audit(1669232300.306:2147): pid=3708 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3155047248/syzkaller.ihTb3G/23/bus" dev="sda1" ino=14486 res=1 [ 989.451951] device veth0_to_bond entered promiscuous mode [ 989.460664] audit: type=1804 audit(1669232300.466:2148): pid=3711 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/199/bus" dev="sda1" ino=14211 res=1 19:38:21 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020045) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xac, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x0, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xac}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 989.507133] audit: type=1804 audit(1669232300.596:2149): pid=3712 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3155047248/syzkaller.ihTb3G/23/bus" dev="sda1" ino=14486 res=1 [ 989.516936] team0: Device macvtap51 failed to register rx_handler [ 989.593541] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 989.660849] device veth0_to_bond left promiscuous mode [ 989.691195] audit: type=1804 audit(1669232300.796:2150): pid=3693 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir2693782222/syzkaller.HDrBKC/549/bus" dev="sda1" ino=13956 res=1 [ 989.772403] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:38:21 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 989.867085] audit: type=1804 audit(1669232301.026:2151): pid=3725 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/200/bus" dev="sda1" ino=14337 res=1 [ 989.893734] audit: type=1804 audit(1669232301.066:2152): pid=3731 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir341425662/syzkaller.qJXiPn/484/bus" dev="sda1" ino=13892 res=1 [ 990.093785] audit: type=1804 audit(1669232301.146:2153): pid=3734 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/200/bus" dev="sda1" ino=14337 res=1 [ 990.119711] audit: type=1804 audit(1669232301.196:2154): pid=3733 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir4247018496/syzkaller.Rf6NE1/82/bus" dev="sda1" ino=14681 res=1 [ 990.128282] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:38:21 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) 19:38:21 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, 0x0) 19:38:21 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x0, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:21 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020047) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xac, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x0, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xac}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:21 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 990.533251] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 990.581167] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:38:22 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x0, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 990.763078] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 990.859916] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:38:22 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020060) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xac, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x0, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xac}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:22 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:22 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x9d990200, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) 19:38:22 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100022007) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xac, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x0, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xac}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:23 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x0, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 991.603477] device veth0_to_bond entered promiscuous mode 19:38:23 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x80010002001e) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, 0x0) [ 991.660936] team0: Device macvtap51 failed to register rx_handler [ 991.735753] device veth0_to_bond left promiscuous mode 19:38:23 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) (fail_nth: 1) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) 19:38:23 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:23 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020045) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, 0x0) 19:38:23 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x10717e, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000000)=0x81) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) statx(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0xff, 0x0, 0xe2, 0x42, 0x0, 0x1, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xac9, 0x0, @perf_bp={0x0, 0x5}, 0x5860e, 0x0, 0x0, 0x1, 0x1000, 0x3, 0x3ff, 0x0, 0x6, 0x0, 0x3}, 0x0, 0x1, 0xffffffffffffffff, 0x9) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000440), &(0x7f00000006c0)=0x4) syz_80211_join_ibss(&(0x7f0000000140)='wlan1\x00', &(0x7f0000000040)=@default_ap_ssid, 0x6, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) setreuid(0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000029c0)={0x2020}, 0x2020) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x24, r6, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x3}]}, 0x24}}, 0x0) sendfile(r0, r0, 0x0, 0x8080fffffffe) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r8, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r8, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r9, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r9, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r9, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 19:38:23 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:23 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x9e990200, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) [ 992.552941] device veth0_to_bond entered promiscuous mode [ 992.581484] team0: Device macvtap51 failed to register rx_handler [ 992.610889] device veth0_to_bond left promiscuous mode [ 992.656082] FAULT_INJECTION: forcing a failure. [ 992.656082] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 992.732098] CPU: 0 PID: 3850 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 992.739931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 992.749289] Call Trace: [ 992.751889] dump_stack+0x1fc/0x2ef [ 992.755518] should_fail.cold+0xa/0xf [ 992.759321] ? setup_fault_attr+0x200/0x200 [ 992.763643] ? __lock_acquire+0x6de/0x3ff0 [ 992.767879] ? crc32c_pcl_intel_update+0x1b9/0x320 [ 992.773169] __alloc_pages_nodemask+0x239/0x2890 [ 992.778011] ? ext4_inode_csum+0x676/0x920 [ 992.782259] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 992.787108] ? __brelse+0x84/0xa0 [ 992.790568] ? mark_held_locks+0xf0/0xf0 [ 992.794637] alloc_pages_current+0x193/0x2a0 [ 992.799048] skb_page_frag_refill+0x258/0x550 [ 992.803554] sk_page_frag_refill+0x4a/0x1d0 [ 992.807872] sk_alloc_sg+0x154/0x850 [ 992.811592] tls_sw_sendpage+0x4e1/0xd00 [ 992.815660] ? lock_downgrade+0x720/0x720 [ 992.820067] ? tls_sw_sendmsg+0x1210/0x1210 [ 992.824384] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 992.829570] ? tls_sw_sendmsg+0x1210/0x1210 [ 992.833891] inet_sendpage+0x164/0x650 [ 992.837778] ? current_time+0x13c/0x1c0 [ 992.841923] ? inet_accept+0x770/0x770 [ 992.845803] sock_sendpage+0xdf/0x140 [ 992.849602] pipe_to_sendpage+0x268/0x330 [ 992.853744] ? sockfs_setattr+0x160/0x160 [ 992.857984] ? direct_splice_actor+0x160/0x160 [ 992.862558] ? splice_from_pipe_next.part.0+0x2ad/0x360 [ 992.867942] __splice_from_pipe+0x389/0x800 [ 992.872267] ? direct_splice_actor+0x160/0x160 [ 992.876848] generic_splice_sendpage+0xd4/0x140 [ 992.881513] ? __splice_from_pipe+0x800/0x800 [ 992.886013] ? security_file_permission+0x1c0/0x220 [ 992.891033] ? __splice_from_pipe+0x800/0x800 [ 992.895525] direct_splice_actor+0x115/0x160 [ 992.899943] splice_direct_to_actor+0x33f/0x8d0 [ 992.904615] ? generic_pipe_buf_nosteal+0x10/0x10 [ 992.909501] ? do_splice_to+0x160/0x160 [ 992.913494] do_splice_direct+0x1a7/0x270 [ 992.917665] ? splice_direct_to_actor+0x8d0/0x8d0 [ 992.922523] ? security_file_permission+0x1c0/0x220 [ 992.927642] do_sendfile+0x550/0xc30 [ 992.931388] ? do_compat_pwritev64+0x1b0/0x1b0 [ 992.936084] ? vfs_write+0x393/0x540 [ 992.939804] __se_sys_sendfile64+0x147/0x160 [ 992.944215] ? __se_sys_sendfile+0x180/0x180 [ 992.948625] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 992.953985] ? trace_hardirqs_off_caller+0x6e/0x210 [ 992.959027] ? do_syscall_64+0x21/0x620 [ 992.963002] do_syscall_64+0xf9/0x620 [ 992.966808] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 992.971999] RIP: 0033:0x7f4be5146109 [ 992.975719] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 992.997222] RSP: 002b:00007f4be36b8168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 993.004986] RAX: ffffffffffffffda RBX: 00007f4be5265f80 RCX: 00007f4be5146109 [ 993.012265] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 993.019539] RBP: 00007f4be36b81d0 R08: 0000000000000000 R09: 0000000000000000 [ 993.026890] R10: 0000800100020046 R11: 0000000000000246 R12: 0000000000000001 [ 993.034327] R13: 00007fff44295b5f R14: 00007f4be36b8300 R15: 0000000000022000 19:38:24 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) (fail_nth: 2) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) 19:38:24 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:24 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:25 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020047) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, 0x0) 19:38:25 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa8, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@typed={0x7, 0x4f, 0x0, 0x0, @str='\\\'\x00'}, @generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa8}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 993.730582] kauditd_printk_skb: 38 callbacks suppressed [ 993.730596] audit: type=1804 audit(1669232305.167:2193): pid=3896 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir341425662/syzkaller.qJXiPn/488/bus" dev="sda1" ino=14486 res=1 19:38:25 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xa4, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9", @typed={0x8, 0x3, 0x0, 0x0, @pid=r6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 993.996218] audit: type=1804 audit(1669232305.417:2194): pid=3898 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir341425662/syzkaller.qJXiPn/488/bus" dev="sda1" ino=14486 res=1 19:38:25 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6e) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000000)=0x14) socket(0x1f, 0x4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x9effffff, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NUM_TX_QUEUES={0x8, 0xd, 0x4}]}, 0x4c}}, 0x0) [ 994.199483] audit: type=1804 audit(1669232305.627:2195): pid=3917 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/206/bus" dev="sda1" ino=14004 res=1 19:38:25 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020060) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, 0x0) [ 994.244050] ieee802154 phy0 wpan0: encryption failed: -22 [ 994.249834] ieee802154 phy1 wpan1: encryption failed: -22 [ 994.266661] net_ratelimit: 14 callbacks suppressed [ 994.266689] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 994.368968] audit: type=1804 audit(1669232305.777:2196): pid=3920 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/206/bus" dev="sda1" ino=14004 res=1 19:38:25 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x9c, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9"]}, 0x9c}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) [ 994.515015] audit: type=1804 audit(1669232305.947:2197): pid=3930 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir341425662/syzkaller.qJXiPn/489/bus" dev="sda1" ino=14007 res=1 [ 994.530348] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 994.599332] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 994.717750] audit: type=1804 audit(1669232306.027:2198): pid=3932 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/207/bus" dev="sda1" ino=14004 res=1 [ 994.808720] audit: type=1804 audit(1669232306.107:2199): pid=3933 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir2306275434/syzkaller.1ESn5H/207/bus" dev="sda1" ino=14004 res=1 [ 994.833648] audit: type=1804 audit(1669232306.237:2200): pid=3926 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir341425662/syzkaller.qJXiPn/489/bus" dev="sda1" ino=14007 res=1 [ 994.880875] audit: type=1804 audit(1669232306.317:2201): pid=3937 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir4247018496/syzkaller.Rf6NE1/86/bus" dev="sda1" ino=14215 res=1 [ 994.977581] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:38:26 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x10717e, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) (async) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) (async, rerun: 64) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000000)=0x81) (rerun: 64) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) (async, rerun: 64) statx(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) (rerun: 64) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0xff, 0x0, 0xe2, 0x42, 0x0, 0x1, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xac9, 0x0, @perf_bp={0x0, 0x5}, 0x5860e, 0x0, 0x0, 0x1, 0x1000, 0x3, 0x3ff, 0x0, 0x6, 0x0, 0x3}, 0x0, 0x1, 0xffffffffffffffff, 0x9) (async) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000440), &(0x7f00000006c0)=0x4) syz_80211_join_ibss(&(0x7f0000000140)='wlan1\x00', &(0x7f0000000040)=@default_ap_ssid, 0x6, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) (async) setreuid(0x0, 0x0) (async, rerun: 32) read$FUSE(0xffffffffffffffff, &(0x7f00000029c0)={0x2020}, 0x2020) (async, rerun: 32) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x24, r6, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x3}]}, 0x24}}, 0x0) (async, rerun: 32) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async, rerun: 32) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r8, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r8, 0x0) (async) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r9, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r9, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) setsockopt$inet6_tcp_TLS_TX(r9, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 19:38:26 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x9c, 0x2b, 0x1, 0x70bd2c, 0x25dfdbfc, {0xf}, [@generic="4b6194f576cb4f5e2a43a3cb9d302d1a07b605bf72e13b4e096d5122d55de961b17781ab4d61561317be4ca6da28e073cbe3ff6fd9a0f62ee8c58c489084db74cd89ea51656d60a3f403360a30334b09b7481653e0ae3e5ebb690fc879e6020cfd6a5c0b784d075437157cb25cdf350052e4247527fae93fe564c9206b0da0bc2a3610d0d9"]}, 0x9c}, 0x1, 0x0, 0x0, 0x840}, 0x4008000) 19:38:26 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100022007) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, 0x0) [ 995.292785] audit: type=1800 audit(1669232306.727:2202): pid=3950 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=13960 res=0 [ 995.434159] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 995.461060] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 995.483351] device veth0_to_bond entered promiscuous mode [ 995.535071] team0: Device macvtap51 failed to register rx_handler [ 995.590911] device veth0_to_bond left promiscuous mode [ 995.737280] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 998.096175] IPVS: ftp: loaded support on port[0] = 21 [ 998.392376] chnl_net:caif_netlink_parms(): no params data found [ 998.444970] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 998.451838] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 998.460453] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 998.468562] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 998.476951] device bridge_slave_1 left promiscuous mode [ 998.482402] bridge0: port 2(bridge_slave_1) entered disabled state [ 998.490113] device bridge_slave_0 left promiscuous mode [ 998.496080] bridge0: port 1(bridge_slave_0) entered disabled state [ 998.505411] device veth1_macvtap left promiscuous mode [ 998.510723] device veth0_macvtap left promiscuous mode [ 998.517080] device veth1_vlan left promiscuous mode [ 998.522152] device veth0_vlan left promiscuous mode [ 1000.044937] Bluetooth: hci3: command 0x0409 tx timeout [ 1000.684910] Bluetooth: hci5: command 0x0409 tx timeout [ 1002.124780] Bluetooth: hci3: command 0x041b tx timeout [ 1002.764703] Bluetooth: hci5: command 0x041b tx timeout [ 1002.948078] device hsr_slave_1 left promiscuous mode [ 1002.956548] device hsr_slave_0 left promiscuous mode [ 1002.973558] team0 (unregistering): Port device team_slave_1 removed [ 1002.983019] team0 (unregistering): Port device team_slave_0 removed [ 1002.993104] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1003.003564] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1003.034217] bond0 (unregistering): Released all slaves [ 1003.052928] bridge0: port 1(bridge_slave_0) entered blocking state [ 1003.059565] bridge0: port 1(bridge_slave_0) entered disabled state [ 1003.070401] device bridge_slave_0 entered promiscuous mode [ 1003.080404] bridge0: port 2(bridge_slave_1) entered blocking state [ 1003.083108] IPVS: ftp: loaded support on port[0] = 21 [ 1003.089556] bridge0: port 2(bridge_slave_1) entered disabled state [ 1003.099857] device bridge_slave_1 entered promiscuous mode [ 1003.161302] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1003.175592] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1003.234164] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1003.243941] team0: Port device team_slave_0 added [ 1003.278605] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1003.291789] team0: Port device team_slave_1 added [ 1003.338983] chnl_net:caif_netlink_parms(): no params data found [ 1003.357076] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1003.363345] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1003.395958] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1003.431570] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1003.440459] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1003.472927] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1003.511448] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1003.526327] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1003.580410] device hsr_slave_0 entered promiscuous mode [ 1003.592780] device hsr_slave_1 entered promiscuous mode [ 1003.599844] bridge0: port 1(bridge_slave_0) entered blocking state [ 1003.608208] bridge0: port 1(bridge_slave_0) entered disabled state [ 1003.616857] device bridge_slave_0 entered promiscuous mode [ 1003.624128] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1003.633110] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1003.640657] bridge0: port 2(bridge_slave_1) entered blocking state [ 1003.648041] bridge0: port 2(bridge_slave_1) entered disabled state [ 1003.660691] device bridge_slave_1 entered promiscuous mode [ 1003.692825] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1003.705846] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1003.756119] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1003.766252] team0: Port device team_slave_0 added [ 1003.789880] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1003.798054] team0: Port device team_slave_1 added [ 1003.838130] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1003.845022] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1003.872271] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1003.894112] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1003.903366] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1003.911487] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1003.937715] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1003.966053] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1003.973983] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1004.023192] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1004.030466] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1004.042179] device hsr_slave_0 entered promiscuous mode [ 1004.050225] device hsr_slave_1 entered promiscuous mode [ 1004.061007] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1004.069650] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1004.080404] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1004.089135] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1004.101827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1004.109710] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1004.117885] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1004.128885] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1004.135858] 8021q: adding VLAN 0 to HW filter on device team0 [ 1004.181296] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1004.192591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1004.201278] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1004.204530] Bluetooth: hci3: command 0x040f tx timeout [ 1004.213311] bridge0: port 1(bridge_slave_0) entered blocking state [ 1004.220358] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1004.241323] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1004.249114] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1004.257897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1004.267315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1004.275924] bridge0: port 2(bridge_slave_1) entered blocking state [ 1004.284505] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1004.318180] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1004.328999] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1004.341874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1004.351300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1004.369515] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1004.388834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1004.400899] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1004.413178] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1004.430116] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1004.442174] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1004.460327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1004.469766] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1004.481522] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1004.493396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1004.501443] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1004.517535] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1004.535656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1004.543432] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1004.556973] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1004.563075] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1004.614501] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1004.625352] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1004.635416] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1004.641657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1004.649622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1004.662472] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1004.670662] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1004.677297] 8021q: adding VLAN 0 to HW filter on device team0 [ 1004.686574] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1004.694163] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1004.702537] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1004.709520] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1004.719801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1004.728136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1004.738895] bridge0: port 1(bridge_slave_0) entered blocking state [ 1004.745331] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1004.757956] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1004.767459] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1004.776267] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1004.783598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1004.792414] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1004.800465] bridge0: port 2(bridge_slave_1) entered blocking state [ 1004.806901] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1004.817933] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1004.827824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1004.840216] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1004.848501] Bluetooth: hci5: command 0x040f tx timeout [ 1004.848576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1004.868687] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1004.876483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1004.884606] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1004.892699] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1004.903786] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1004.912097] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1004.920565] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1004.931263] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1004.940059] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1004.947331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1004.955312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1004.968289] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1004.977115] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1004.983997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1004.997306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1005.006940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1005.015164] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1005.025134] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1005.031226] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1005.075743] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1005.084640] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1005.091741] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1005.099226] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1005.110398] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1005.118589] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1005.126469] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1005.136575] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1005.145114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1005.152670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1005.162232] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1005.169968] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1005.179604] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1005.186728] device veth0_vlan entered promiscuous mode [ 1005.201951] device veth1_vlan entered promiscuous mode [ 1005.208407] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1005.221776] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1005.240248] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1005.252524] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1005.261365] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1005.269686] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1005.277816] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1005.286638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1005.298455] device veth0_macvtap entered promiscuous mode [ 1005.305107] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1005.314308] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1005.325805] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1005.332902] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1005.340972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1005.349708] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1005.360154] device veth1_macvtap entered promiscuous mode [ 1005.366906] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1005.378506] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1005.389790] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1005.399638] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1005.411347] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1005.421173] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1005.431867] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1005.441532] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1005.451553] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1005.461019] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1005.471133] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1005.481474] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1005.491342] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1005.501811] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1005.509209] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1005.519113] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1005.526768] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1005.535081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1005.546162] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1005.553385] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1005.560867] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1005.572654] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1005.580722] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1005.590615] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1005.599835] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1005.609598] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1005.618823] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1005.628608] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1005.637857] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1005.647997] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1005.657311] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1005.667502] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1005.678036] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1005.686058] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1005.692719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1005.700452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1005.708517] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1005.716525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1005.728027] device veth0_vlan entered promiscuous mode [ 1005.735667] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1005.742634] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1005.759461] device veth1_vlan entered promiscuous mode [ 1005.766321] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1005.779676] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1005.801433] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1005.812732] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1005.821605] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1005.829444] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1005.837176] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1005.845298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1005.855467] device veth0_macvtap entered promiscuous mode [ 1005.862157] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1005.873759] device veth1_macvtap entered promiscuous mode [ 1005.880279] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1005.895592] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1005.906997] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1005.921366] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1005.931280] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1005.940901] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1005.950922] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1005.960098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1005.970649] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1005.980141] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1005.990468] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1006.000024] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1006.009797] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1006.018997] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1006.029263] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1006.039979] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1006.047606] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1006.056682] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1006.068160] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1006.075896] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1006.083654] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1006.096826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1006.106859] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1006.116043] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1006.127308] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1006.136519] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1006.146672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1006.155926] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1006.165761] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1006.174973] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1006.184744] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1006.193856] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1006.203767] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1006.214827] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1006.221846] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1006.230472] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1006.239227] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1006.285602] Bluetooth: hci3: command 0x0419 tx timeout [ 1006.321319] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 1006.337405] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1006.352668] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1006.389470] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1006.407693] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 1006.417090] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1006.430398] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1006.438793] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1006.551683] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 1006.559399] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1006.585503] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 1006.591940] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1006.596509] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1006.609519] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1006.618068] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1006.626201] kauditd_printk_skb: 5 callbacks suppressed [ 1006.626215] audit: type=1804 audit(1669232318.069:2208): pid=4502 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir3474728447/syzkaller.eQMy8X/0/bus" dev="sda1" ino=13908 res=1 [ 1006.650612] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1006.660621] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1006.679434] FAULT_INJECTION: forcing a failure. [ 1006.679434] name failslab, interval 1, probability 0, space 0, times 0 [ 1006.691371] CPU: 0 PID: 4502 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 1006.699286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1006.708644] Call Trace: [ 1006.711247] dump_stack+0x1fc/0x2ef [ 1006.714889] should_fail.cold+0xa/0xf [ 1006.718699] ? setup_fault_attr+0x200/0x200 [ 1006.723020] ? lock_acquire+0x170/0x3c0 [ 1006.726982] __should_failslab+0x115/0x180 [ 1006.731202] should_failslab+0x5/0x10 [ 1006.734982] __kmalloc+0x2ab/0x3c0 [ 1006.738501] ? tls_push_record+0xff/0x1370 [ 1006.742718] tls_push_record+0xff/0x1370 [ 1006.746760] ? sk_alloc_sg+0x5d8/0x850 [ 1006.750634] tls_sw_sendpage+0x8c6/0xd00 [ 1006.754700] ? tls_sw_sendmsg+0x1210/0x1210 [ 1006.759179] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 1006.764356] ? tls_sw_sendmsg+0x1210/0x1210 [ 1006.768659] inet_sendpage+0x164/0x650 [ 1006.772529] ? current_time+0x13c/0x1c0 [ 1006.776571] ? inet_accept+0x770/0x770 [ 1006.780436] sock_sendpage+0xdf/0x140 [ 1006.784220] pipe_to_sendpage+0x268/0x330 [ 1006.788344] ? sockfs_setattr+0x160/0x160 [ 1006.792470] ? direct_splice_actor+0x160/0x160 [ 1006.797031] ? splice_from_pipe_next.part.0+0x2ad/0x360 [ 1006.802375] __splice_from_pipe+0x389/0x800 [ 1006.806679] ? direct_splice_actor+0x160/0x160 [ 1006.811251] generic_splice_sendpage+0xd4/0x140 [ 1006.815905] ? __splice_from_pipe+0x800/0x800 [ 1006.820384] ? security_file_permission+0x1c0/0x220 [ 1006.825382] ? __splice_from_pipe+0x800/0x800 [ 1006.829861] direct_splice_actor+0x115/0x160 [ 1006.834254] splice_direct_to_actor+0x33f/0x8d0 [ 1006.838903] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1006.843726] ? do_splice_to+0x160/0x160 [ 1006.847693] do_splice_direct+0x1a7/0x270 [ 1006.851821] ? splice_direct_to_actor+0x8d0/0x8d0 [ 1006.856648] ? security_file_permission+0x1c0/0x220 [ 1006.861667] do_sendfile+0x550/0xc30 [ 1006.865365] ? do_compat_pwritev64+0x1b0/0x1b0 [ 1006.869953] ? vfs_write+0x393/0x540 [ 1006.873826] __se_sys_sendfile64+0x147/0x160 [ 1006.878222] ? __se_sys_sendfile+0x180/0x180 [ 1006.882627] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1006.887990] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1006.892999] ? do_syscall_64+0x21/0x620 [ 1006.896961] do_syscall_64+0xf9/0x620 [ 1006.900757] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1006.905930] RIP: 0033:0x7f086ca30109 [ 1006.909631] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1006.928625] RSP: 002b:00007f086afa2168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1006.936323] RAX: ffffffffffffffda RBX: 00007f086cb4ff80 RCX: 00007f086ca30109 [ 1006.943570] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 1006.950821] RBP: 00007f086afa21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1006.958085] R10: 0000800100020046 R11: 0000000000000246 R12: 0000000000000001 [ 1006.965343] R13: 00007ffebde7c84f R14: 00007f086afa2300 R15: 0000000000022000 [ 1006.978857] Bluetooth: hci5: command 0x0419 tx timeout [ 1007.144236] audit: type=1804 audit(1669232318.569:2209): pid=4527 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3474728447/syzkaller.eQMy8X/0/bus" dev="sda1" ino=13908 res=1 [ 1007.164649] kasan: CONFIG_KASAN_INLINE enabled [ 1007.172129] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 1007.246175] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 1007.252448] CPU: 0 PID: 4502 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 1007.260239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1007.269614] RIP: 0010:scatterwalk_copychunks+0x4db/0x6a0 [ 1007.275073] Code: ff df 80 3c 02 00 0f 85 98 01 00 00 49 8d 44 24 08 4d 89 26 48 89 c2 48 89 44 24 18 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 9f 01 00 00 48 b8 00 00 00 00 [ 1007.293972] RSP: 0018:ffff88804ae97238 EFLAGS: 00010202 [ 1007.299330] RAX: dffffc0000000000 RBX: 000000000000401d RCX: ffffc90009b88000 [ 1007.306599] RDX: 0000000000000001 RSI: ffffffff83739e63 RDI: 0000000000000007 [ 1007.313864] RBP: 000000000000401d R08: 0000000000000001 R09: 0000000000000000 [ 1007.321217] R10: 0000000000000007 R11: 0000000000000000 R12: 0000000000000000 [ 1007.328480] R13: 0000000000001000 R14: ffff88804ae972e8 R15: 0000000000000001 [ 1007.335754] FS: 00007f086afa2700(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 [ 1007.343983] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1007.349865] CR2: 0000001b2c638000 CR3: 000000009aba1000 CR4: 00000000003406f0 [ 1007.357135] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1007.364575] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1007.371833] Call Trace: [ 1007.374425] scatterwalk_map_and_copy+0x121/0x1a0 [ 1007.379270] ? scatterwalk_ffwd+0x370/0x370 [ 1007.383607] ? aesni_gcm_enc_avx2+0x196/0x1b0 [ 1007.388082] ? kernel_fpu_enable+0x1f/0x40 [ 1007.392299] ? kernel_fpu_end+0x11b/0x170 [ 1007.396430] ? kernel_fpu_enable+0x40/0x40 [ 1007.400646] gcmaes_encrypt.constprop.0+0x89f/0xd90 [ 1007.405647] ? gcmaes_crypt_by_sg.constprop.0+0x1790/0x1790 [ 1007.411337] ? inet_sendpage+0x164/0x650 [ 1007.415374] ? sock_sendpage+0xdf/0x140 [ 1007.419337] ? pipe_to_sendpage+0x268/0x330 [ 1007.423642] ? __splice_from_pipe+0x389/0x800 [ 1007.428118] ? generic_splice_sendpage+0xd4/0x140 [ 1007.432952] ? direct_splice_actor+0x115/0x160 [ 1007.437517] ? splice_direct_to_actor+0x33f/0x8d0 [ 1007.442337] ? do_splice_direct+0x1a7/0x270 [ 1007.446648] ? do_sendfile+0x550/0xc30 [ 1007.450517] ? __se_sys_sendfile64+0x147/0x160 [ 1007.455076] ? do_syscall_64+0xf9/0x620 [ 1007.459034] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1007.464377] ? usleep_range+0x170/0x170 [ 1007.468334] ? sk_stream_wait_memory+0x9da/0xd60 [ 1007.473071] ? generic_gcmaes_encrypt+0x108/0x160 [ 1007.477890] ? generic_gcmaes_encrypt+0x108/0x160 [ 1007.482708] ? helper_rfc4106_encrypt+0x310/0x310 [ 1007.487534] ? gcmaes_wrapper_encrypt+0x157/0x1f0 [ 1007.492357] ? tls_push_record+0x9d7/0x1370 [ 1007.496662] ? tls_sw_sendpage+0x8c6/0xd00 [ 1007.500880] ? tls_sw_sendmsg+0x1210/0x1210 [ 1007.505181] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 1007.510380] ? tls_sw_sendmsg+0x1210/0x1210 [ 1007.514703] ? inet_sendpage+0x164/0x650 [ 1007.518760] ? current_time+0x13c/0x1c0 [ 1007.522726] ? inet_accept+0x770/0x770 [ 1007.526606] ? sock_sendpage+0xdf/0x140 [ 1007.530570] ? pipe_to_sendpage+0x268/0x330 [ 1007.534877] ? sockfs_setattr+0x160/0x160 [ 1007.539011] ? direct_splice_actor+0x160/0x160 [ 1007.543594] ? splice_from_pipe_next.part.0+0x2ad/0x360 [ 1007.548941] ? __splice_from_pipe+0x389/0x800 [ 1007.553418] ? direct_splice_actor+0x160/0x160 [ 1007.557990] ? generic_splice_sendpage+0xd4/0x140 [ 1007.562817] ? __splice_from_pipe+0x800/0x800 [ 1007.567391] ? security_file_permission+0x1c0/0x220 [ 1007.572387] ? __splice_from_pipe+0x800/0x800 [ 1007.576876] ? direct_splice_actor+0x115/0x160 [ 1007.581529] ? splice_direct_to_actor+0x33f/0x8d0 [ 1007.586356] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1007.591180] ? do_splice_to+0x160/0x160 [ 1007.595136] ? do_splice_direct+0x1a7/0x270 [ 1007.599459] ? splice_direct_to_actor+0x8d0/0x8d0 [ 1007.604293] ? security_file_permission+0x1c0/0x220 [ 1007.609303] ? do_sendfile+0x550/0xc30 [ 1007.613187] ? do_compat_pwritev64+0x1b0/0x1b0 [ 1007.617771] ? vfs_write+0x393/0x540 [ 1007.621481] ? __se_sys_sendfile64+0x147/0x160 [ 1007.626073] ? __se_sys_sendfile+0x180/0x180 [ 1007.630472] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1007.635834] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1007.640840] ? do_syscall_64+0x21/0x620 [ 1007.644797] ? do_syscall_64+0xf9/0x620 [ 1007.648755] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1007.654117] Modules linked in: [ 1007.696858] ---[ end trace ac0cb4986b75700c ]--- [ 1007.701873] RIP: 0010:scatterwalk_copychunks+0x4db/0x6a0 [ 1007.707682] Code: ff df 80 3c 02 00 0f 85 98 01 00 00 49 8d 44 24 08 4d 89 26 48 89 c2 48 89 44 24 18 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 9f 01 00 00 48 b8 00 00 00 00 [ 1007.729759] RSP: 0018:ffff88804ae97238 EFLAGS: 00010202 [ 1007.735521] RAX: dffffc0000000000 RBX: 000000000000401d RCX: ffffc90009b88000 [ 1007.743009] RDX: 0000000000000001 RSI: ffffffff83739e63 RDI: 0000000000000007 [ 1007.750662] RBP: 000000000000401d R08: 0000000000000001 R09: 0000000000000000 [ 1007.758203] R10: 0000000000000007 R11: 0000000000000000 R12: 0000000000000000 [ 1007.765771] R13: 0000000000001000 R14: ffff88804ae972e8 R15: 0000000000000001 [ 1007.773187] FS: 00007f086afa2700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 1007.781763] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1007.787993] CR2: 000000c0146aecd8 CR3: 000000009aba1000 CR4: 00000000003406e0 [ 1007.795521] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1007.802933] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1007.811040] Kernel panic - not syncing: Fatal exception [ 1007.816574] Kernel Offset: disabled [ 1007.820280] Rebooting in 86400 seconds..