[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 65.389812][ T27] audit: type=1800 audit(1576100481.283:25): pid=9015 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 65.410067][ T27] audit: type=1800 audit(1576100481.283:26): pid=9015 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 65.463202][ T27] audit: type=1800 audit(1576100481.293:27): pid=9015 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.142' (ECDSA) to the list of known hosts. 2019/12/11 21:41:31 fuzzer started 2019/12/11 21:41:33 dialing manager at 10.128.0.26:33577 2019/12/11 21:41:33 syscalls: 2701 2019/12/11 21:41:33 code coverage: enabled 2019/12/11 21:41:33 comparison tracing: enabled 2019/12/11 21:41:33 extra coverage: enabled 2019/12/11 21:41:33 setuid sandbox: enabled 2019/12/11 21:41:33 namespace sandbox: enabled 2019/12/11 21:41:33 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/11 21:41:33 fault injection: enabled 2019/12/11 21:41:33 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/11 21:41:33 net packet injection: enabled 2019/12/11 21:41:33 net device setup: enabled 2019/12/11 21:41:33 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/12/11 21:41:33 devlink PCI setup: PCI device 0000:00:10.0 is not available 21:43:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000000)=""/56, 0x38}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x2a80, 0x0, 0x0, 0x800e00506) shutdown(r1, 0x0) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) recvmsg(r3, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) shutdown(r2, 0x0) 21:43:27 executing program 1: ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000000)) syz_open_dev$usbfs(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000140)={{0x6, @rose}, [@rose, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @rose, @null]}, 0x48) listen(r0, 0x0) unshare(0x40000000) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46000900000000000000000000000000000000009a00000000000000004000000000000000000000000000000000000000000038000000040000000000000000c6dcf5a900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff000000000000000000004d422a18b3b82e77a3cf35f2d7e77ded4ddfc7e9d565e5"], 0x278) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3}}], 0x10) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgrp(0x0) getgid() syzkaller login: [ 191.548891][ T9184] IPVS: ftp: loaded support on port[0] = 21 21:43:27 executing program 2: unshare(0x40000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000240)={0x0, 0x9}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000002c0)={r1, 0x5}, 0x8) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket(0x0, 0x100006, 0x8) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000000300)=0x5, 0x4) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf0") pipe(0x0) socketpair(0x8, 0xa, 0x7, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_hci_HCI_TIME_STAMP(r3, 0x0, 0x3, &(0x7f0000000100)=0x3, 0x4) r4 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1}, 0xc) [ 191.740092][ T9184] chnl_net:caif_netlink_parms(): no params data found [ 191.824565][ T9187] IPVS: ftp: loaded support on port[0] = 21 [ 191.843027][ T9184] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.870145][ T9184] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.890590][ T9184] device bridge_slave_0 entered promiscuous mode [ 191.923266][ T9184] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.949031][ T9184] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.957092][ T9184] device bridge_slave_1 entered promiscuous mode 21:43:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x3, 0x0) setsockopt$inet_int(r0, 0x0, 0x12, &(0x7f0000000000)=0xbca, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x38}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@ipv4_newaddr={0x34, 0x14, 0x1, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IFA_CACHEINFO={0x14, 0x6, {0x1, 0x5}}]}, 0x34}}, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8}]]}}}]}, 0x38}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@ipv4_newaddr={0x34, 0x14, 0x1, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IFA_CACHEINFO={0x14, 0x6, {0x1, 0x5}}]}, 0x34}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', r2}) [ 192.032294][ T9184] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 192.051486][ T9184] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 192.111567][ T9184] team0: Port device team_slave_0 added [ 192.128591][ T9189] IPVS: ftp: loaded support on port[0] = 21 [ 192.131195][ T9184] team0: Port device team_slave_1 added [ 192.233981][ T9184] device hsr_slave_0 entered promiscuous mode 21:43:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) lseek(r0, 0x2, 0x0) [ 192.290837][ T9184] device hsr_slave_1 entered promiscuous mode [ 192.390738][ T9191] IPVS: ftp: loaded support on port[0] = 21 [ 192.552760][ T9194] IPVS: ftp: loaded support on port[0] = 21 [ 192.561143][ T9184] netdevsim netdevsim0 netdevsim0: renamed from eth0 21:43:28 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x4e) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x578c96c34028f057, 0x0, 0x0, 0x800e00525) shutdown(r1, 0x0) [ 192.640794][ T9187] chnl_net:caif_netlink_parms(): no params data found [ 192.653950][ T9184] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 192.734573][ T9184] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 192.782813][ T9184] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 192.880917][ T9196] IPVS: ftp: loaded support on port[0] = 21 [ 192.973401][ T9189] chnl_net:caif_netlink_parms(): no params data found [ 192.992546][ T9187] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.001693][ T9187] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.010411][ T9187] device bridge_slave_0 entered promiscuous mode [ 193.027298][ T9187] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.035819][ T9187] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.043894][ T9187] device bridge_slave_1 entered promiscuous mode [ 193.107285][ T9187] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 193.133307][ T9189] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.141635][ T9189] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.150246][ T9189] device bridge_slave_0 entered promiscuous mode [ 193.158743][ T9191] chnl_net:caif_netlink_parms(): no params data found [ 193.168877][ T9187] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 193.182881][ T9189] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.190383][ T9189] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.198220][ T9189] device bridge_slave_1 entered promiscuous mode [ 193.277422][ T9187] team0: Port device team_slave_0 added [ 193.288155][ T9187] team0: Port device team_slave_1 added [ 193.304222][ T9189] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 193.356145][ T9189] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 193.372030][ T9194] chnl_net:caif_netlink_parms(): no params data found [ 193.445240][ T9191] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.452508][ T9191] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.463027][ T9191] device bridge_slave_0 entered promiscuous mode [ 193.472491][ T9189] team0: Port device team_slave_0 added [ 193.478425][ T9191] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.485774][ T9191] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.494027][ T9191] device bridge_slave_1 entered promiscuous mode [ 193.573219][ T9187] device hsr_slave_0 entered promiscuous mode [ 193.631425][ T9187] device hsr_slave_1 entered promiscuous mode [ 193.669164][ T9187] debugfs: Directory 'hsr0' with parent '/' already present! [ 193.683192][ T9189] team0: Port device team_slave_1 added [ 193.691235][ T9191] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 193.707460][ T9191] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 193.738339][ T9196] chnl_net:caif_netlink_parms(): no params data found [ 193.796712][ T9191] team0: Port device team_slave_0 added [ 193.842826][ T9189] device hsr_slave_0 entered promiscuous mode [ 193.879613][ T9189] device hsr_slave_1 entered promiscuous mode [ 193.919142][ T9189] debugfs: Directory 'hsr0' with parent '/' already present! [ 193.930687][ T9194] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.937799][ T9194] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.946867][ T9194] device bridge_slave_0 entered promiscuous mode [ 193.955840][ T9194] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.963326][ T9194] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.971980][ T9194] device bridge_slave_1 entered promiscuous mode [ 193.983736][ T9184] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.997886][ T9191] team0: Port device team_slave_1 added [ 194.050794][ T9187] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 194.082508][ T9187] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 194.132348][ T9194] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 194.144525][ T9194] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 194.171545][ T9196] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.179514][ T9196] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.187211][ T9196] device bridge_slave_0 entered promiscuous mode [ 194.202988][ T9187] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 194.262153][ T3697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 194.271770][ T3697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 194.294180][ T9196] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.302030][ T9196] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.310085][ T9196] device bridge_slave_1 entered promiscuous mode [ 194.325290][ T9187] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 194.393561][ T9194] team0: Port device team_slave_0 added [ 194.405069][ T9194] team0: Port device team_slave_1 added [ 194.416746][ T9184] 8021q: adding VLAN 0 to HW filter on device team0 [ 194.482490][ T9191] device hsr_slave_0 entered promiscuous mode [ 194.539454][ T9191] device hsr_slave_1 entered promiscuous mode [ 194.589216][ T9191] debugfs: Directory 'hsr0' with parent '/' already present! [ 194.604993][ T9189] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 194.681700][ T9189] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 194.721766][ T9189] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 194.767438][ T9189] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 194.842337][ T9196] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 194.855092][ T2951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 194.864719][ T2951] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 194.873797][ T2951] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.884669][ T2951] bridge0: port 1(bridge_slave_0) entered forwarding state [ 194.982508][ T9194] device hsr_slave_0 entered promiscuous mode [ 195.019633][ T9194] device hsr_slave_1 entered promiscuous mode [ 195.060301][ T9194] debugfs: Directory 'hsr0' with parent '/' already present! [ 195.069537][ T9196] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 195.085939][ T9197] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 195.094506][ T9197] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 195.103458][ T9197] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 195.112349][ T9197] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.119488][ T9197] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.175428][ T9196] team0: Port device team_slave_0 added [ 195.190728][ T9197] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 195.205617][ T9197] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 195.223139][ T9196] team0: Port device team_slave_1 added [ 195.231737][ T9191] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 195.306823][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 195.316235][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 195.330367][ T9191] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 195.413345][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 195.422068][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 195.433491][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 195.444781][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 195.456813][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 195.470024][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 195.482622][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 195.494827][ T9194] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 195.554275][ T9194] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 195.621830][ T9191] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 195.681390][ T9191] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 195.755105][ T9184] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 195.779365][ T9194] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 195.854920][ T9196] device hsr_slave_0 entered promiscuous mode [ 195.899843][ T9196] device hsr_slave_1 entered promiscuous mode [ 195.940040][ T9196] debugfs: Directory 'hsr0' with parent '/' already present! [ 195.948591][ T9194] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 196.076710][ T9187] 8021q: adding VLAN 0 to HW filter on device bond0 [ 196.101975][ T3697] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 196.112805][ T3697] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 196.172334][ T9203] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 196.181831][ T9203] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 196.195010][ T9187] 8021q: adding VLAN 0 to HW filter on device team0 [ 196.206326][ T9196] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 196.231755][ T9196] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 196.293454][ T9196] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 196.365202][ T9189] 8021q: adding VLAN 0 to HW filter on device bond0 [ 196.379480][ T9184] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 196.401438][ T9196] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 196.498781][ T9189] 8021q: adding VLAN 0 to HW filter on device team0 [ 196.516053][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 196.525968][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 196.537602][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.546852][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.555286][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 196.564402][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 196.574196][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.582503][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.592980][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 196.602178][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 196.611145][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 196.620330][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 196.629609][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 196.637992][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.645213][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.654736][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 196.663125][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 196.680003][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 196.690342][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 196.701790][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 196.711185][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.718618][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.748828][ T9194] 8021q: adding VLAN 0 to HW filter on device bond0 [ 196.795978][ T3697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 196.805611][ T3697] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 196.823165][ T3697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 196.833579][ T3697] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 196.842778][ T3697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 196.851719][ T3697] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 196.860740][ T3697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 196.873906][ T9187] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 196.890461][ T9187] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 196.908828][ T9194] 8021q: adding VLAN 0 to HW filter on device team0 [ 196.918788][ T9191] 8021q: adding VLAN 0 to HW filter on device bond0 [ 196.933249][ T9206] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 21:43:32 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x1, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) r0 = getpid() tkill(r0, 0x9) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0xdb) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) [ 196.942620][ T9206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 196.951540][ T9206] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 196.962255][ T9206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 196.970563][ T9206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 197.026694][ T3697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 197.044179][ T3697] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 197.059890][ T3697] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.067054][ T3697] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.075017][ T3697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 197.085464][ T3697] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.097997][ T3697] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.105153][ T3697] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.113649][ T3697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 197.121778][ T3697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 197.133402][ T3697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 197.142604][ T3697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 197.152311][ T3697] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 197.187470][ C0] hrtimer: interrupt took 41778 ns [ 197.190118][ T9191] 8021q: adding VLAN 0 to HW filter on device team0 [ 197.247104][ T9202] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 197.257605][ T9202] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 197.276187][ T9202] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 197.285687][ T9202] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 197.298717][ T9202] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 197.314926][ T9202] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 197.324982][ T9202] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 197.340491][ T9202] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 197.354752][ T9202] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 197.364796][ T9202] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 197.378295][ T9202] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 197.388145][ T9202] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 197.406897][ T9187] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 197.431425][ T9206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 197.445908][ T9206] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 197.460317][ T9189] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 197.520590][ T9206] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 197.528496][ T9206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 197.542335][ T9206] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 197.553721][ T9206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 21:43:33 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003e39405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492bd3aa3d41fd983f79e65199615607672c59957ab35f4ad614fd33cebbc150bb2b03b5b2461179f5f90bba00", 0x64}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x2, &(0x7f00000000c0)=@gcm_256={{}, "b81cefe44eaac171", "672c7e7b1b92b68c118c2c998dbd06cedfb7c5cbcc766d84eb975916b6ddc16c", "4dc90fba", "f3b2dacd291ff247"}, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 197.563650][ T9206] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 197.572440][ T9206] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.572478][ T9206] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.572893][ T9206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 197.596089][ T9206] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.604922][ T9206] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.612079][ T9206] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.639698][ T9206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 197.652199][ T9202] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 21:43:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002900)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/28, 0x1c}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_targets\x00') preadv(r0, &(0x7f00000017c0), 0x244, 0x0) [ 197.697914][ T9202] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 197.714082][ T9202] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 197.737973][ T9202] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 197.774379][ T9202] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 197.801468][ T9202] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 21:43:33 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x59, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @initdev}, 0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect(r0, &(0x7f0000000180)=@un=@file={0x0, './file0\x00'}, 0x80) [ 197.820258][ T9203] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 197.834844][ T9203] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 197.847103][ T9194] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 197.877977][ T9196] 8021q: adding VLAN 0 to HW filter on device bond0 [ 197.908174][ T9232] IPVS: ftp: loaded support on port[0] = 21 [ 197.928289][ T9197] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 197.937649][ T9197] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 197.952162][ T9197] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 197.962751][ T9197] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 197.974016][ T9197] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 198.006935][ T9202] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 198.016138][ T9202] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 198.035649][ T9189] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 198.049655][ T9203] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 198.058072][ T9203] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 198.083315][ T9191] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 198.102139][ T9196] 8021q: adding VLAN 0 to HW filter on device team0 21:43:34 executing program 0: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'icmp6\x00'}, &(0x7f0000000040)=0x1e) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000140)={0x0, 'bcsh0\x00', {0x4}}) [ 198.129146][ T9203] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 198.137186][ T9203] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 198.157282][ T9203] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 198.177210][ T9203] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 198.226996][ T9203] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 198.255118][ T9203] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 198.285295][ T9203] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.292523][ T9203] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.318113][ T9232] IPVS: ftp: loaded support on port[0] = 21 [ 198.332345][ T9245] IPVS: ftp: loaded support on port[0] = 21 [ 198.343896][ T9194] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 198.375576][ T9197] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 198.394384][ T9197] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 198.420033][ T9197] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 198.439063][ T9197] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.446590][ T9197] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.459542][ T9197] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 21:43:34 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) r1 = dup3(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r2 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x31a) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0) getrlimit(0x2, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x375) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x3, 0x0, 0x0, 0x401, 0x3, 0x3e, 0x3, 0x2b0, 0x38, 0x32e, 0x0, 0x3, 0x20, 0x1, 0x2, 0xff}, [{0x6474e551, 0x5, 0x1, 0x8, 0xffffffff, 0x3, 0x8, 0x3}]}, 0x58) preadv(r3, &(0x7f0000001940)=[{&(0x7f0000000180)=""/96, 0x60}], 0x1, 0x4c) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000002c0)={'mangle\x00', 0x65, "17eb6330732e979a8abcc27b96cee58bf409de0544e0c92601fc6797f6c9de5b8037783ee966ac07a21a1ffb1c7145ff2a6f38c44495bb70069783f49c742ebb0a0baa8984a95ea25c709f3b22e12f7232e98e234862cd3b264f2db2c94a32a3a0be7bfded"}, &(0x7f0000000380)=0x89) r4 = memfd_create(&(0x7f0000000200)='\x00', 0x5) ftruncate(r4, 0xc00000) read(r4, &(0x7f00000000c0)=""/48, 0xfffffca3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)=@filter={'filter\x00', 0xe, 0x4, 0x378, 0x1f8, 0x2e0, 0x1f8, 0x0, 0xc0, 0x2e0, 0x2e0, 0x2e0, 0x2e0, 0x2e0, 0x4, &(0x7f0000000200), {[{{@ip={@empty, @dev={0xac, 0x14, 0x14, 0x23}, 0x0, 0xffffff00, 'ip6erspan0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0xb7, 0x0, 0x24}, 0x0, 0x98, 0xc0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x8001, 0x8, 0x5}, {0x5, 0x5, 0xa7}}}}, {{@uncond, 0x0, 0x110, 0x138, 0x0, {}, [@common=@unspec=@connlabel={0x28, 'connlabel\x00', 0x0, {0x2, 0x7}}, @common=@osf={0x50, 'osf\x00', 0x0, {'syz1\x00', 0x6, 0x8}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ip={@empty, @empty, 0xffffffff, 0xff, 'veth0_to_bond\x00', 'hsr0\x00', {0x1fe}, {0x1fe}, 0x629a6a9a9b18f9e8, 0x2, 0x40}, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x1, 0x8, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x5}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d8) r5 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$describe(0x6, r5, &(0x7f0000000080)=""/200, 0xc8) [ 198.498798][ T2951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 198.530201][ T2951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 198.543834][ T2951] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 198.552969][ C1] sd 0:0:1:0: [sg0] tag#6615 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 198.563688][ C1] sd 0:0:1:0: [sg0] tag#6615 CDB: Test Unit Ready [ 198.570235][ C1] sd 0:0:1:0: [sg0] tag#6615 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 198.579889][ C1] sd 0:0:1:0: [sg0] tag#6615 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 198.589555][ C1] sd 0:0:1:0: [sg0] tag#6615 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 198.599190][ C1] sd 0:0:1:0: [sg0] tag#6615 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 198.608880][ C1] sd 0:0:1:0: [sg0] tag#6615 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 198.618605][ C1] sd 0:0:1:0: [sg0] tag#6615 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 198.628281][ C1] sd 0:0:1:0: [sg0] tag#6615 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 198.637920][ C1] sd 0:0:1:0: [sg0] tag#6615 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 198.647575][ C1] sd 0:0:1:0: [sg0] tag#6615 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 198.657309][ C1] sd 0:0:1:0: [sg0] tag#6615 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 198.666942][ C1] sd 0:0:1:0: [sg0] tag#6615 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 198.676584][ C1] sd 0:0:1:0: [sg0] tag#6615 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 198.686222][ C1] sd 0:0:1:0: [sg0] tag#6615 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 198.695978][ C1] sd 0:0:1:0: [sg0] tag#6615 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 198.705825][ C1] sd 0:0:1:0: [sg0] tag#6615 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 [ 198.753448][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 198.769261][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 198.777097][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 198.791395][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 198.813865][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 198.830816][ T9191] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 198.903089][ T9197] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 198.918137][ T9197] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 198.946699][ T9197] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 198.956106][ T9197] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 198.983336][ T9196] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 199.049245][ C1] sd 0:0:1:0: [sg0] tag#6616 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 199.059834][ C1] sd 0:0:1:0: [sg0] tag#6616 CDB: Test Unit Ready [ 199.066316][ C1] sd 0:0:1:0: [sg0] tag#6616 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 199.075967][ C1] sd 0:0:1:0: [sg0] tag#6616 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 199.085602][ C1] sd 0:0:1:0: [sg0] tag#6616 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 199.085627][ C1] sd 0:0:1:0: [sg0] tag#6616 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 199.085650][ C1] sd 0:0:1:0: [sg0] tag#6616 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 199.085673][ C1] sd 0:0:1:0: [sg0] tag#6616 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 199.085703][ C1] sd 0:0:1:0: [sg0] tag#6616 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 199.085728][ C1] sd 0:0:1:0: [sg0] tag#6616 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 199.085749][ C1] sd 0:0:1:0: [sg0] tag#6616 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 199.085780][ C1] sd 0:0:1:0: [sg0] tag#6616 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 199.085801][ C1] sd 0:0:1:0: [sg0] tag#6616 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 199.085825][ C1] sd 0:0:1:0: [sg0] tag#6616 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 199.085851][ C1] sd 0:0:1:0: [sg0] tag#6616 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 199.085876][ C1] sd 0:0:1:0: [sg0] tag#6616 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 199.085902][ C1] sd 0:0:1:0: [sg0] tag#6616 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 [ 199.174841][ T9202] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 199.227901][ T9245] IPVS: ftp: loaded support on port[0] = 21 [ 199.250795][ T9202] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 21:43:35 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) r1 = dup3(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r2 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x31a) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0) getrlimit(0x2, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x375) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x3, 0x0, 0x0, 0x401, 0x3, 0x3e, 0x3, 0x2b0, 0x38, 0x32e, 0x0, 0x3, 0x20, 0x1, 0x2, 0xff}, [{0x6474e551, 0x5, 0x1, 0x8, 0xffffffff, 0x3, 0x8, 0x3}]}, 0x58) preadv(r3, &(0x7f0000001940)=[{&(0x7f0000000180)=""/96, 0x60}], 0x1, 0x4c) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000002c0)={'mangle\x00', 0x65, "17eb6330732e979a8abcc27b96cee58bf409de0544e0c92601fc6797f6c9de5b8037783ee966ac07a21a1ffb1c7145ff2a6f38c44495bb70069783f49c742ebb0a0baa8984a95ea25c709f3b22e12f7232e98e234862cd3b264f2db2c94a32a3a0be7bfded"}, &(0x7f0000000380)=0x89) r4 = memfd_create(&(0x7f0000000200)='\x00', 0x5) ftruncate(r4, 0xc00000) read(r4, &(0x7f00000000c0)=""/48, 0xfffffca3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)=@filter={'filter\x00', 0xe, 0x4, 0x378, 0x1f8, 0x2e0, 0x1f8, 0x0, 0xc0, 0x2e0, 0x2e0, 0x2e0, 0x2e0, 0x2e0, 0x4, &(0x7f0000000200), {[{{@ip={@empty, @dev={0xac, 0x14, 0x14, 0x23}, 0x0, 0xffffff00, 'ip6erspan0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0xb7, 0x0, 0x24}, 0x0, 0x98, 0xc0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x8001, 0x8, 0x5}, {0x5, 0x5, 0xa7}}}}, {{@uncond, 0x0, 0x110, 0x138, 0x0, {}, [@common=@unspec=@connlabel={0x28, 'connlabel\x00', 0x0, {0x2, 0x7}}, @common=@osf={0x50, 'osf\x00', 0x0, {'syz1\x00', 0x6, 0x8}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ip={@empty, @empty, 0xffffffff, 0xff, 'veth0_to_bond\x00', 'hsr0\x00', {0x1fe}, {0x1fe}, 0x629a6a9a9b18f9e8, 0x2, 0x40}, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x1, 0x8, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x5}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d8) r5 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$describe(0x6, r5, &(0x7f0000000080)=""/200, 0xc8) [ 199.384980][ T9196] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 199.452247][ C1] sd 0:0:1:0: [sg0] tag#6617 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 199.462939][ C1] sd 0:0:1:0: [sg0] tag#6617 CDB: Test Unit Ready [ 199.469652][ C1] sd 0:0:1:0: [sg0] tag#6617 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 199.479480][ C1] sd 0:0:1:0: [sg0] tag#6617 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 199.489492][ C1] sd 0:0:1:0: [sg0] tag#6617 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 199.499404][ C1] sd 0:0:1:0: [sg0] tag#6617 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 199.510095][ C1] sd 0:0:1:0: [sg0] tag#6617 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 199.522753][ C1] sd 0:0:1:0: [sg0] tag#6617 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 199.532690][ C1] sd 0:0:1:0: [sg0] tag#6617 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 199.542804][ C1] sd 0:0:1:0: [sg0] tag#6617 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 199.552531][ C1] sd 0:0:1:0: [sg0] tag#6617 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 199.564390][ C1] sd 0:0:1:0: [sg0] tag#6617 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 199.578015][ C1] sd 0:0:1:0: [sg0] tag#6617 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 199.590266][ C1] sd 0:0:1:0: [sg0] tag#6617 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 199.600544][ C1] sd 0:0:1:0: [sg0] tag#6617 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 199.610886][ C1] sd 0:0:1:0: [sg0] tag#6617 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 199.621143][ C1] sd 0:0:1:0: [sg0] tag#6617 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 21:43:36 executing program 1: ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000000)) syz_open_dev$usbfs(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000140)={{0x6, @rose}, [@rose, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @rose, @null]}, 0x48) listen(r0, 0x0) unshare(0x40000000) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46000900000000000000000000000000000000009a00000000000000004000000000000000000000000000000000000000000038000000040000000000000000c6dcf5a900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff000000000000000000004d422a18b3b82e77a3cf35f2d7e77ded4ddfc7e9d565e5"], 0x278) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3}}], 0x10) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgrp(0x0) getgid() [ 201.108493][ T9305] IPVS: ftp: loaded support on port[0] = 21 [ 201.189208][ T659] tipc: TX() has been purged, node left! 21:43:38 executing program 2: unshare(0x40000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000240)={0x0, 0x9}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000002c0)={r1, 0x5}, 0x8) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket(0x0, 0x100006, 0x8) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000000300)=0x5, 0x4) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf0") pipe(0x0) socketpair(0x8, 0xa, 0x7, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_hci_HCI_TIME_STAMP(r3, 0x0, 0x3, &(0x7f0000000100)=0x3, 0x4) r4 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1}, 0xc) 21:43:38 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) r1 = dup3(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r2 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x31a) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0) getrlimit(0x2, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x375) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x3, 0x0, 0x0, 0x401, 0x3, 0x3e, 0x3, 0x2b0, 0x38, 0x32e, 0x0, 0x3, 0x20, 0x1, 0x2, 0xff}, [{0x6474e551, 0x5, 0x1, 0x8, 0xffffffff, 0x3, 0x8, 0x3}]}, 0x58) preadv(r3, &(0x7f0000001940)=[{&(0x7f0000000180)=""/96, 0x60}], 0x1, 0x4c) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000002c0)={'mangle\x00', 0x65, "17eb6330732e979a8abcc27b96cee58bf409de0544e0c92601fc6797f6c9de5b8037783ee966ac07a21a1ffb1c7145ff2a6f38c44495bb70069783f49c742ebb0a0baa8984a95ea25c709f3b22e12f7232e98e234862cd3b264f2db2c94a32a3a0be7bfded"}, &(0x7f0000000380)=0x89) r4 = memfd_create(&(0x7f0000000200)='\x00', 0x5) ftruncate(r4, 0xc00000) read(r4, &(0x7f00000000c0)=""/48, 0xfffffca3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)=@filter={'filter\x00', 0xe, 0x4, 0x378, 0x1f8, 0x2e0, 0x1f8, 0x0, 0xc0, 0x2e0, 0x2e0, 0x2e0, 0x2e0, 0x2e0, 0x4, &(0x7f0000000200), {[{{@ip={@empty, @dev={0xac, 0x14, 0x14, 0x23}, 0x0, 0xffffff00, 'ip6erspan0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0xb7, 0x0, 0x24}, 0x0, 0x98, 0xc0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x8001, 0x8, 0x5}, {0x5, 0x5, 0xa7}}}}, {{@uncond, 0x0, 0x110, 0x138, 0x0, {}, [@common=@unspec=@connlabel={0x28, 'connlabel\x00', 0x0, {0x2, 0x7}}, @common=@osf={0x50, 'osf\x00', 0x0, {'syz1\x00', 0x6, 0x8}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ip={@empty, @empty, 0xffffffff, 0xff, 'veth0_to_bond\x00', 'hsr0\x00', {0x1fe}, {0x1fe}, 0x629a6a9a9b18f9e8, 0x2, 0x40}, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x1, 0x8, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x5}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d8) r5 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$describe(0x6, r5, &(0x7f0000000080)=""/200, 0xc8) 21:43:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8000699030000070500150007008178a8001600400004000200000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 21:43:38 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000012c0)='\f', 0x1, 0x11, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) 21:43:38 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0xa, 0x1, 0x0) r4 = dup3(r1, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ppoll(&(0x7f0000000140)=[{r0}, {r2}, {r1}], 0x3, &(0x7f00000000c0), 0x0, 0x0) 21:43:38 executing program 1: ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000000)) syz_open_dev$usbfs(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000140)={{0x6, @rose}, [@rose, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @rose, @null]}, 0x48) listen(r0, 0x0) unshare(0x40000000) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46000900000000000000000000000000000000009a00000000000000004000000000000000000000000000000000000000000038000000040000000000000000c6dcf5a900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff000000000000000000004d422a18b3b82e77a3cf35f2d7e77ded4ddfc7e9d565e5"], 0x278) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3}}], 0x10) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgrp(0x0) getgid() [ 202.925966][ T9310] IPv6: NLM_F_CREATE should be specified when creating new route 21:43:38 executing program 3: ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000000)) syz_open_dev$usbfs(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000140)={{0x6, @rose}, [@rose, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @rose, @null]}, 0x48) listen(r0, 0x0) unshare(0x40000000) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46000900000000000000000000000000000000009a00000000000000004000000000000000000000000000000000000000000038000000040000000000000000c6dcf5a900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff000000000000000000004d422a18b3b82e77a3cf35f2d7e77ded4ddfc7e9d565e5"], 0x278) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3}}], 0x10) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgrp(0x0) getgid() [ 202.971533][ C1] sd 0:0:1:0: [sg0] tag#6618 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 202.982574][ C1] sd 0:0:1:0: [sg0] tag#6618 CDB: Test Unit Ready [ 202.989089][ C1] sd 0:0:1:0: [sg0] tag#6618 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 202.998713][ C1] sd 0:0:1:0: [sg0] tag#6618 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 203.008364][ C1] sd 0:0:1:0: [sg0] tag#6618 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 203.018032][ C1] sd 0:0:1:0: [sg0] tag#6618 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 203.027698][ C1] sd 0:0:1:0: [sg0] tag#6618 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 203.037333][ C1] sd 0:0:1:0: [sg0] tag#6618 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 203.047134][ C1] sd 0:0:1:0: [sg0] tag#6618 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 203.056946][ C1] sd 0:0:1:0: [sg0] tag#6618 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 21:43:38 executing program 5: ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000000)) syz_open_dev$usbfs(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000140)={{0x6, @rose}, [@rose, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @rose, @null]}, 0x48) listen(r0, 0x0) unshare(0x40000000) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46000900000000000000000000000000000000009a00000000000000004000000000000000000000000000000000000000000038000000040000000000000000c6dcf5a900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff000000000000000000004d422a18b3b82e77a3cf35f2d7e77ded4ddfc7e9d565e5"], 0x278) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3}}], 0x10) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgrp(0x0) getgid() [ 203.066769][ C1] sd 0:0:1:0: [sg0] tag#6618 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 203.076532][ C1] sd 0:0:1:0: [sg0] tag#6618 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 203.086174][ C1] sd 0:0:1:0: [sg0] tag#6618 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 203.095848][ C1] sd 0:0:1:0: [sg0] tag#6618 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 203.105504][ C1] sd 0:0:1:0: [sg0] tag#6618 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 203.115164][ C1] sd 0:0:1:0: [sg0] tag#6618 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 203.124923][ C1] sd 0:0:1:0: [sg0] tag#6618 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 [ 203.136535][ T9322] IPVS: ftp: loaded support on port[0] = 21 [ 203.145966][ T9320] IPVS: ftp: loaded support on port[0] = 21 21:43:39 executing program 0: ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000000)) syz_open_dev$usbfs(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000140)={{0x6, @rose}, [@rose, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @rose, @null]}, 0x48) listen(r0, 0x0) unshare(0x40000000) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46000900000000000000000000000000000000009a00000000000000004000000000000000000000000000000000000000000038000000040000000000000000c6dcf5a900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff000000000000000000004d422a18b3b82e77a3cf35f2d7e77ded4ddfc7e9d565e5"], 0x278) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3}}], 0x10) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgrp(0x0) getgid() 21:43:39 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d00800002400ffffe57f00002005ffffa6fffff7", @ANYRES32, @ANYRES64], 0x3}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x14) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 203.359848][ T9335] IPVS: ftp: loaded support on port[0] = 21 21:43:39 executing program 1: ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000000)) syz_open_dev$usbfs(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000140)={{0x6, @rose}, [@rose, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @rose, @null]}, 0x48) listen(r0, 0x0) unshare(0x40000000) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46000900000000000000000000000000000000009a00000000000000004000000000000000000000000000000000000000000038000000040000000000000000c6dcf5a900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff000000000000000000004d422a18b3b82e77a3cf35f2d7e77ded4ddfc7e9d565e5"], 0x278) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3}}], 0x10) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgrp(0x0) getgid() [ 203.509955][ T9331] IPVS: ftp: loaded support on port[0] = 21 21:43:39 executing program 2: unshare(0x40000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000240)={0x0, 0x9}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000002c0)={r1, 0x5}, 0x8) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket(0x0, 0x100006, 0x8) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000000300)=0x5, 0x4) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf0") pipe(0x0) socketpair(0x8, 0xa, 0x7, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_hci_HCI_TIME_STAMP(r3, 0x0, 0x3, &(0x7f0000000100)=0x3, 0x4) r4 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1}, 0xc) [ 203.577498][ T9347] netlink: 2220 bytes leftover after parsing attributes in process `syz-executor.4'. [ 203.583899][ T9348] IPVS: ftp: loaded support on port[0] = 21 [ 203.673365][ T9351] IPVS: ftp: loaded support on port[0] = 21 [ 203.713652][ T9353] IPVS: ftp: loaded support on port[0] = 21 21:43:39 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) getpid() sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0xdb) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 21:43:39 executing program 5: ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000000)) syz_open_dev$usbfs(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000140)={{0x6, @rose}, [@rose, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @rose, @null]}, 0x48) listen(r0, 0x0) unshare(0x40000000) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46000900000000000000000000000000000000009a00000000000000004000000000000000000000000000000000000000000038000000040000000000000000c6dcf5a900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff000000000000000000004d422a18b3b82e77a3cf35f2d7e77ded4ddfc7e9d565e5"], 0x278) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3}}], 0x10) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgrp(0x0) getgid() 21:43:39 executing program 3: ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000000)) syz_open_dev$usbfs(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000140)={{0x6, @rose}, [@rose, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @rose, @null]}, 0x48) listen(r0, 0x0) unshare(0x40000000) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46000900000000000000000000000000000000009a00000000000000004000000000000000000000000000000000000000000038000000040000000000000000c6dcf5a900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff000000000000000000004d422a18b3b82e77a3cf35f2d7e77ded4ddfc7e9d565e5"], 0x278) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3}}], 0x10) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgrp(0x0) getgid() 21:43:40 executing program 2: unshare(0x40000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000240)={0x0, 0x9}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000002c0)={r1, 0x5}, 0x8) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket(0x0, 0x100006, 0x8) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000000300)=0x5, 0x4) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf0") pipe(0x0) socketpair(0x8, 0xa, 0x7, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_hci_HCI_TIME_STAMP(r3, 0x0, 0x3, &(0x7f0000000100)=0x3, 0x4) r4 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1}, 0xc) 21:43:40 executing program 1: ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000000)) syz_open_dev$usbfs(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000140)={{0x6, @rose}, [@rose, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @rose, @null]}, 0x48) listen(r0, 0x0) unshare(0x40000000) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46000900000000000000000000000000000000009a00000000000000004000000000000000000000000000000000000000000038000000040000000000000000c6dcf5a900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff000000000000000000004d422a18b3b82e77a3cf35f2d7e77ded4ddfc7e9d565e5"], 0x278) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3}}], 0x10) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgrp(0x0) [ 204.204480][ T9365] IPVS: ftp: loaded support on port[0] = 21 21:43:40 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) [ 204.257866][ T9364] IPVS: ftp: loaded support on port[0] = 21 [ 204.345957][ T9378] IPVS: ftp: loaded support on port[0] = 21 [ 204.363528][ T9379] IPVS: ftp: loaded support on port[0] = 21 [ 204.450587][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:43:40 executing program 0: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0, 0x2fb, 0x0, 0xfc76}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/wireless\x00') preadv(r0, &(0x7f00000017c0), 0x1a0, 0xf0ffff) 21:43:40 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x80000000000005, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000140)={0x9, @vbi}) 21:43:40 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 21:43:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80041270, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') r4 = syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') sendfile(r4, r3, 0x0, 0x80000000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 21:43:40 executing program 5: ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000000)) syz_open_dev$usbfs(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000140)={{0x6, @rose}, [@rose, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @rose, @null]}, 0x48) listen(r0, 0x0) unshare(0x40000000) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46000900000000000000000000000000000000009a00000000000000004000000000000000000000000000000000000000000038000000040000000000000000c6dcf5a900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff000000000000000000004d422a18b3b82e77a3cf35f2d7e77ded4ddfc7e9d565e5"], 0x278) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3}}], 0x10) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgrp(0x0) getgid() [ 204.958675][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:43:40 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0x1850c6, 0x0) r1 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b603803123f6ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c26a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) write$P9_RLERRORu(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='$'], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x10000) 21:43:40 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_config_ext={0x81, 0x1}, 0x408, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x8000, 0x0, 0x7ff, 0x3, 0x5}) io_setup(0x7, &(0x7f0000000100)=0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='uid_map\x00') sendfile(r2, r3, &(0x7f0000000040)=0x100000, 0x8001) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setsockopt$inet_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f0000000040)=@gcm_256={{}, "018000da7d469c04", "02a839a6c7986edc3f8a6200c88e37de79b97525cedefaa0bded32e7d887ec99", "0000ef00", "00943f4aece800"}, 0x38) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r4, &(0x7f0000000440)=[{&(0x7f00000002c0)="0a99b3e3930870dcd4c6d68e6abe088af4ccdbe6dc85ed63bcee4834cd53f8a19cfad53574230c17377bd7b3eb23d9008f0c69b08db538753bcf550f05d219f8c6ca03228dd8d293261ba079190f47d70c95a97fe5d4cb7511e180f73e8ef5e2f7ee4f47c1a036e37e87414e615396eeb918828e", 0x74}, {&(0x7f0000000840)="b5252522629f34a16eef84ce1b0063a44d2793e337dc2c6bb2d88107b89a1516610f2003d59c73b5c7e008a287d2a1d473414b1adeb4ca87742298b064ae974e919c80525175804799682d67fca4f9defe5754c03f", 0x55}], 0x2) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r4, &(0x7f0000000740)="81838ea59a01f3def2f74b864fabdfd6d9016709aa568a1dd2af7e570c81431e0fe705be1de9535af1e1520ec38fce0389a39beff538dfb438a3c93448cad104f9d66117e97aff934914e356c48414e3df401e01bd42f65e63bae1243fbd819eb3c0d4401e2d9a6d4c24f442d625e0cbbea614d2085696d3946370c4ecd2318b5b6e4ea8d18e8a9843641268a71cb4feb04dccd83672a7351545702bbbf3151d1fc2e68cfc8e4393d7d43d0dfe9fd96feb636ae44f501db5b0f651c2ea16a3b08888e63f5d43c24ef0", 0xc9, 0x0, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000640)=ANY=[], 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r4, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) io_submit(r1, 0x0, &(0x7f0000000240)) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) 21:43:41 executing program 3: ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000000)) syz_open_dev$usbfs(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000140)={{0x6, @rose}, [@rose, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @rose, @null]}, 0x48) listen(r0, 0x0) unshare(0x40000000) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46000900000000000000000000000000000000009a00000000000000004000000000000000000000000000000000000000000038000000040000000000000000c6dcf5a900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff000000000000000000004d422a18b3b82e77a3cf35f2d7e77ded4ddfc7e9d565e5"], 0x278) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3}}], 0x10) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgrp(0x0) getgid() 21:43:41 executing program 1: ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000000)) syz_open_dev$usbfs(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000140)={{0x6, @rose}, [@rose, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @rose, @null]}, 0x48) listen(r0, 0x0) unshare(0x40000000) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46000900000000000000000000000000000000009a00000000000000004000000000000000000000000000000000000000000038000000040000000000000000c6dcf5a900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff000000000000000000004d422a18b3b82e77a3cf35f2d7e77ded4ddfc7e9d565e5"], 0x278) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3}}], 0x10) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgrp(0x0) [ 205.114977][ T9412] IPVS: ftp: loaded support on port[0] = 21 21:43:41 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x80000000000005, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000000)={0x0, 0x31364d4e, 0x0, 0x0, 0x0, @stepwise}) [ 205.212531][ T27] kauditd_printk_skb: 3 callbacks suppressed [ 205.212544][ T27] audit: type=1800 audit(1576100621.083:31): pid=9420 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16566 res=0 [ 205.377479][ T27] audit: type=1804 audit(1576100621.103:32): pid=9420 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir234266344/syzkaller.vIF3uV/5/file0" dev="sda1" ino=16566 res=1 21:43:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8400ae8e, &(0x7f0000000080)) [ 205.437001][ T9433] IPVS: ftp: loaded support on port[0] = 21 [ 205.465655][ T9434] IPVS: ftp: loaded support on port[0] = 21 [ 205.584814][ T9442] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 205.614936][ T27] audit: type=1800 audit(1576100621.503:33): pid=9420 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file0" dev="sda1" ino=16566 res=0 21:43:41 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0x1850c6, 0x0) r1 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x600) write$P9_RLERRORu(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='$'], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x10000) [ 205.748129][ T27] audit: type=1800 audit(1576100621.633:34): pid=9449 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16566 res=0 [ 205.814339][ T27] audit: type=1804 audit(1576100621.653:35): pid=9449 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir234266344/syzkaller.vIF3uV/6/file0" dev="sda1" ino=16566 res=1 [ 205.815246][ T9440] list_del corruption. prev->next should be ffff888096bf83b0, but was ffff88821b810250 [ 205.849670][ T9440] ------------[ cut here ]------------ [ 205.855149][ T9440] kernel BUG at lib/list_debug.c:51! [ 205.860531][ T9440] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 205.866611][ T9440] CPU: 1 PID: 9440 Comm: syz-executor.0 Not tainted 5.5.0-rc1-next-20191211-syzkaller #0 [ 205.876423][ T9440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 205.881136][ T9434] kobject: 'sit0' (000000000234d402): kobject_add_internal: parent: 'net', set: 'devices' [ 205.886626][ T9440] RIP: 0010:__list_del_entry_valid.cold+0xf/0x4f [ 205.886639][ T9440] Code: e8 c9 00 cb fd 0f 0b 48 89 f1 48 c7 c7 c0 10 70 88 4c 89 e6 e8 b5 00 cb fd 0f 0b 4c 89 f6 48 c7 c7 60 12 70 88 e8 a4 00 cb fd <0f> 0b 4c 89 ea 4c 89 f6 48 c7 c7 a0 11 70 88 e8 90 00 cb fd 0f 0b [ 205.886645][ T9440] RSP: 0018:ffffc90001c27c00 EFLAGS: 00010282 [ 205.886655][ T9440] RAX: 0000000000000054 RBX: ffff8882199d0a20 RCX: 0000000000000000 [ 205.886661][ T9440] RDX: 0000000000000000 RSI: ffffffff815e8576 RDI: fffff52000384f72 [ 205.886676][ T9440] RBP: ffffc90001c27c18 R08: 0000000000000054 R09: fffffbfff165a7a6 [ 205.886683][ T9440] R10: fffffbfff165a7a5 R11: ffffffff8b2d3d2f R12: ffff8882199d0b20 [ 205.886698][ T9440] R13: ffff88821b810250 R14: ffff888096bf83b0 R15: ffff888096bf83b0 [ 205.908218][ T9434] kobject: 'sit0' (000000000234d402): kobject_uevent_env [ 205.922518][ T9440] FS: 0000000002535940(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 205.922525][ T9440] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 205.922532][ T9440] CR2: 0000001b32033000 CR3: 00000000a32c9000 CR4: 00000000001426e0 [ 205.922542][ T9440] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 205.922549][ T9440] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 205.922554][ T9440] Call Trace: [ 205.922577][ T9440] __dentry_kill+0x1fd/0x600 [ 205.922596][ T9440] ? dput+0x38/0xe10 [ 205.943990][ T9434] kobject: 'sit0' (000000000234d402): fill_kobj_path: path = '/devices/virtual/net/sit0' [ 205.944629][ T9440] ? dput+0x38/0xe10 [ 205.961545][ T9434] kobject: 'queues' (000000009ea2eb17): kobject_add_internal: parent: 'sit0', set: '' [ 205.968503][ T9440] dput+0x62f/0xe10 [ 205.968522][ T9440] simple_recursive_removal+0x5bc/0x6d0 [ 205.968534][ T9440] ? debugfs_rename+0x7f0/0x7f0 [ 205.968552][ T9440] debugfs_remove+0x5e/0x80 [ 205.991144][ T9434] kobject: 'queues' (000000009ea2eb17): kobject_uevent_env [ 205.991209][ T9440] kvm_put_kvm+0x136/0xcc0 [ 206.082579][ T9440] ? kvm_irqfd_release+0xe2/0x120 [ 206.087587][ T9440] ? kvm_irqfd_release+0xe2/0x120 [ 206.092603][ T9440] kvm_vm_release+0x44/0x60 [ 206.097098][ T9440] __fput+0x2ff/0x890 [ 206.101067][ T9440] ? kvm_dev_ioctl+0x17d0/0x17d0 [ 206.106005][ T9440] ____fput+0x16/0x20 [ 206.109972][ T9440] task_work_run+0x145/0x1c0 [ 206.114550][ T9440] exit_to_usermode_loop+0x316/0x380 [ 206.119840][ T9440] do_syscall_64+0x676/0x790 [ 206.124429][ T9440] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 206.130310][ T9440] RIP: 0033:0x4143e1 [ 206.134193][ T9440] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 206.153780][ T9440] RSP: 002b:00007ffe6e026050 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 206.162187][ T9440] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 00000000004143e1 [ 206.170154][ T9440] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 206.178121][ T9440] RBP: 0000000000000001 R08: 00000000fc2b66a5 R09: 00000000fc2b66a9 [ 206.186871][ T9440] R10: 00007ffe6e026130 R11: 0000000000000293 R12: 000000000075c9a0 [ 206.194834][ T9440] R13: 000000000075c9a0 R14: 0000000000760710 R15: 000000000075bfd4 [ 206.202793][ T9440] Modules linked in: [ 206.206743][ T9440] ---[ end trace 1423f7e8dc240879 ]--- [ 206.212257][ T9440] RIP: 0010:__list_del_entry_valid.cold+0xf/0x4f [ 206.218627][ T9440] Code: e8 c9 00 cb fd 0f 0b 48 89 f1 48 c7 c7 c0 10 70 88 4c 89 e6 e8 b5 00 cb fd 0f 0b 4c 89 f6 48 c7 c7 60 12 70 88 e8 a4 00 cb fd <0f> 0b 4c 89 ea 4c 89 f6 48 c7 c7 a0 11 70 88 e8 90 00 cb fd 0f 0b [ 206.238345][ T9440] RSP: 0018:ffffc90001c27c00 EFLAGS: 00010282 [ 206.244455][ T9440] RAX: 0000000000000054 RBX: ffff8882199d0a20 RCX: 0000000000000000 [ 206.252487][ T9440] RDX: 0000000000000000 RSI: ffffffff815e8576 RDI: fffff52000384f72 [ 206.260685][ T9440] RBP: ffffc90001c27c18 R08: 0000000000000054 R09: fffffbfff165a7a6 [ 206.268760][ T9440] R10: fffffbfff165a7a5 R11: ffffffff8b2d3d2f R12: ffff8882199d0b20 [ 206.269960][ T9434] kobject: 'queues' (000000009ea2eb17): kobject_uevent_env: filter function caused the event to drop! [ 206.276775][ T9440] R13: ffff88821b810250 R14: ffff888096bf83b0 R15: ffff888096bf83b0 [ 206.295746][ T9440] FS: 0000000002535940(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 206.304701][ T9440] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 206.311320][ T9440] CR2: 0000001b32033000 CR3: 00000000a32c9000 CR4: 00000000001426e0 [ 206.313483][ T9434] kobject: 'rx-0' (00000000c5aae7ba): kobject_add_internal: parent: 'queues', set: 'queues' [ 206.319340][ T9440] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 206.319347][ T9440] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 206.319356][ T9440] Kernel panic - not syncing: Fatal exception [ 206.321155][ T9440] Kernel Offset: disabled [ 206.357918][ T9440] Rebooting in 86400 seconds..