Warning: Permanently added '10.128.0.55' (ECDSA) to the list of known hosts. 2019/04/02 09:08:42 fuzzer started 2019/04/02 09:08:44 dialing manager at 10.128.0.26:40131 2019/04/02 09:08:45 syscalls: 1 2019/04/02 09:08:45 code coverage: enabled 2019/04/02 09:08:45 comparison tracing: enabled 2019/04/02 09:08:45 extra coverage: extra coverage is not supported by the kernel 2019/04/02 09:08:45 setuid sandbox: enabled 2019/04/02 09:08:45 namespace sandbox: enabled 2019/04/02 09:08:45 Android sandbox: /sys/fs/selinux/policy does not exist 2019/04/02 09:08:45 fault injection: enabled 2019/04/02 09:08:45 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/04/02 09:08:45 net packet injection: enabled 2019/04/02 09:08:45 net device setup: enabled 09:08:59 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) r2 = socket$inet6(0xa, 0x3, 0x400000000006) ioctl(r2, 0x8912, &(0x7f0000000200)='\x00'/11) unshare(0x40000000) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000280)={'ip&tnl0\x00', {0x2, 0x4e21, @remote}}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000240)={'ifb0\x00', 0xfd}) r4 = socket$inet(0x2, 0x6, 0x0) r5 = accept(r2, &(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000b80)=0xfffffffffffffecc) shutdown(r5, 0x1) getsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, &(0x7f0000002900), &(0x7f0000002940)=0x4) setsockopt$sock_int(r5, 0x1, 0x21, &(0x7f0000000380)=0x1, 0x4) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @remote}, 0x27}) sendto$llc(r5, &(0x7f0000000100)="f970073b521a3a2059fcfb4e8ff5daaa892b23d0d93e42e29fd18b0a0ba812eee04266ea1e381a4bb2e397868f69542dd70dd9c732d82d1fb2fc114f477c5628dfd9882cb1704a9f32aac44aae8374041822b9186cf14d60459bd23b2cdfa2331560f6603715660f40eb2abb6eb4ac55a1b1b79c6b0cf8b2b9318c3851c8c082044b202dfddf065073e5b86df813839f8469d5e3897560064588b8857deb8aa08bb97eab5a3c887c75722b8f29c0676355437301c7bab02cae987fb632bc787275cc10ffa7d27aec6dde9675ce109785c50042c06113974ffe11fc8c778aa09dfb093bb384905f3b6b5899e819b4f5263cb840bd", 0xf4, 0x800, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000700)={0x0, 0x80}, &(0x7f0000000740)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000780)={0x0, @in6={{0xa, 0x4e22, 0x7f, @dev={0xfe, 0x80, [], 0x1f}, 0x38}}, 0x3, 0xffffffffffff8e9c}, &(0x7f0000000840)=0xffffffffffffff48) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f00000008c0)={r6, 0x26e, &(0x7f0000000940)=[@in={0x2, 0x4e22, @rand_addr=0x4b}, @in={0x2, 0x4e20, @rand_addr=0x2}, @in={0x2, 0x4e23, @rand_addr=0xfffffffffffffff9}]}, &(0x7f00000006c0)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000480)={r7, @in={{0x2, 0x4e24, @broadcast}}, 0x5eda, 0x1000000003, 0x3f, 0x1, 0x1d}, &(0x7f0000000540)=0x98) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000000c0)={'lo\x00', {0x2, 0x0, @dev}}) r8 = openat$cgroup(r3, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r8, 0x6, 0x1, 0xffffffff, &(0x7f0000000300)=[0x0, 0x0], 0x2}, 0x20) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000040)=0x80001) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000400)=ANY=[]) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000012c0), &(0x7f0000001300)=0x4) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') ioctl(r0, 0x20000000008912, &(0x7f00000000c0)="0a5c2d0240316285717070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r9, 0x84, 0x13, &(0x7f0000000000), 0x4) syzkaller login: [ 64.724523][ T7784] IPVS: ftp: loaded support on port[0] = 21 09:09:00 executing program 1: unshare(0x2000400) pipe(&(0x7f0000000140)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0x2, &(0x7f0000000340)={r0, 0x50, &(0x7f00000002c0)}, 0x10) [ 64.864168][ T7784] chnl_net:caif_netlink_parms(): no params data found [ 64.943580][ T7784] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.951573][ T7784] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.960195][ T7784] device bridge_slave_0 entered promiscuous mode [ 64.971067][ T7784] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.978382][ T7784] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.986486][ T7784] device bridge_slave_1 entered promiscuous mode [ 65.013085][ T7784] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 65.014742][ T7787] IPVS: ftp: loaded support on port[0] = 21 [ 65.029730][ T7784] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 65.054700][ T7784] team0: Port device team_slave_0 added [ 65.065439][ T7784] team0: Port device team_slave_1 added 09:09:00 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'brod%e\x00\x00d\x00', 0x20, 0x1, 0x388, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001200], 0x0, &(0x7f0000000040), &(0x7f0000001200)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'syz_tun\x00', 'bj\x00G\x00', 'veth0_to_team\x00', 'veth0\x00', @link_local, [], @empty, [], 0x2a8, 0x2a8, 0x2f8, [@bpf0={'bpf\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x210, {{0xffffff7f}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x400) [ 65.139958][ T7784] device hsr_slave_0 entered promiscuous mode [ 65.188168][ T7784] device hsr_slave_1 entered promiscuous mode [ 65.271979][ T7784] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.279335][ T7784] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.287596][ T7784] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.294718][ T7784] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.311192][ T7789] IPVS: ftp: loaded support on port[0] = 21 09:09:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0xfffffffffffffffc, 0x31, 0xffffffffffffffff, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f00000000c0)=0x20, 0x4) [ 65.451888][ T7787] chnl_net:caif_netlink_parms(): no params data found [ 65.561391][ T7787] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.569847][ T7787] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.578307][ T7787] device bridge_slave_0 entered promiscuous mode [ 65.593263][ T7793] IPVS: ftp: loaded support on port[0] = 21 [ 65.612779][ T7784] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.628370][ T7787] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.635505][ T7787] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.644417][ T7787] device bridge_slave_1 entered promiscuous mode [ 65.696588][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.710575][ T3481] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.730183][ T3481] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.739490][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 09:09:01 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x4) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) [ 65.762584][ T7787] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 65.774245][ T7787] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 65.790549][ T7784] 8021q: adding VLAN 0 to HW filter on device team0 [ 65.924107][ T7789] chnl_net:caif_netlink_parms(): no params data found [ 65.945978][ T7787] team0: Port device team_slave_0 added [ 65.957107][ T7790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.972833][ T7790] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.981582][ T7790] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.988753][ T7790] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.014575][ T7787] team0: Port device team_slave_1 added [ 66.034047][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 66.048493][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.060252][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.067409][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.076300][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 66.089713][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 09:09:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008a00)=[{{0x0, 0xfffffffffffffec6, &(0x7f0000000540)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000000680)=""/120, 0x78}, {&(0x7f0000000400)=""/230, 0xffffff6f}], 0x3}}], 0x4000246, 0x0, &(0x7f0000008bc0)) [ 66.112285][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 66.123079][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 66.143461][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 66.158588][ T7799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 66.170113][ T7799] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 66.205028][ T7798] IPVS: ftp: loaded support on port[0] = 21 [ 66.231421][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 66.242501][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 66.309850][ T7787] device hsr_slave_0 entered promiscuous mode [ 66.378596][ T7787] device hsr_slave_1 entered promiscuous mode [ 66.426765][ T7789] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.433898][ T7789] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.443561][ T7789] device bridge_slave_0 entered promiscuous mode [ 66.453002][ T7789] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.460316][ T7789] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.468145][ T7789] device bridge_slave_1 entered promiscuous mode [ 66.517307][ T7799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 66.526048][ T7799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 66.557786][ T7784] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 66.576587][ T7801] IPVS: ftp: loaded support on port[0] = 21 [ 66.591501][ T7789] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 66.601944][ T7793] chnl_net:caif_netlink_parms(): no params data found [ 66.625798][ T7789] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 66.701840][ T7784] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 66.714106][ T7789] team0: Port device team_slave_0 added [ 66.724868][ T7789] team0: Port device team_slave_1 added [ 66.736234][ T7793] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.744865][ T7793] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.752996][ T7793] device bridge_slave_0 entered promiscuous mode [ 66.760999][ T7793] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.768332][ T7793] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.776376][ T7793] device bridge_slave_1 entered promiscuous mode [ 66.849643][ T7789] device hsr_slave_0 entered promiscuous mode [ 66.887081][ T7789] device hsr_slave_1 entered promiscuous mode [ 66.987329][ T7793] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 67.024221][ T7787] 8021q: adding VLAN 0 to HW filter on device bond0 [ 67.063365][ T7793] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 67.094292][ T7805] IPVS: ftp: loaded support on port[0] = 21 [ 67.128172][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 67.138226][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 67.149431][ T7787] 8021q: adding VLAN 0 to HW filter on device team0 [ 67.157985][ T7793] team0: Port device team_slave_0 added [ 67.168615][ T7798] chnl_net:caif_netlink_parms(): no params data found [ 67.246310][ T7793] team0: Port device team_slave_1 added [ 67.378736][ T7801] chnl_net:caif_netlink_parms(): no params data found [ 67.405474][ T7794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 67.427809][ T7794] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 67.436437][ T7794] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.443595][ T7794] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.519784][ T7793] device hsr_slave_0 entered promiscuous mode [ 67.557194][ T7793] device hsr_slave_1 entered promiscuous mode [ 67.675583][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 67.684662][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 67.693816][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 67.702941][ T3481] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.710099][ T3481] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.718914][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 67.791098][ T7799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 67.795004][ T7809] IPVS: ftp: loaded support on port[0] = 21 [ 67.825903][ T7798] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.834495][ T7798] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.843827][ T7798] device bridge_slave_0 entered promiscuous mode [ 67.875526][ T7801] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.896828][ T7801] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.915738][ T7801] device bridge_slave_0 entered promiscuous mode [ 67.940262][ T7799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 67.951855][ T7799] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 67.976279][ T7798] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.987088][ T7798] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.995069][ T7798] device bridge_slave_1 entered promiscuous mode [ 68.017358][ T7801] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.026301][ T7801] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.035866][ T7801] device bridge_slave_1 entered promiscuous mode [ 68.051136][ T7799] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 68.065639][ T7799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 68.077412][ T7799] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 68.110424][ T7789] 8021q: adding VLAN 0 to HW filter on device bond0 [ 68.160625][ T7801] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 68.172790][ T7801] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 68.198878][ T7798] bond0: Enslaving bond_slave_0 as an active interface with an up link 09:09:03 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) r2 = socket$inet6(0xa, 0x3, 0x400000000006) ioctl(r2, 0x8912, &(0x7f0000000200)='\x00'/11) unshare(0x40000000) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000280)={'ip&tnl0\x00', {0x2, 0x4e21, @remote}}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000240)={'ifb0\x00', 0xfd}) r4 = socket$inet(0x2, 0x6, 0x0) r5 = accept(r2, &(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000b80)=0xfffffffffffffecc) shutdown(r5, 0x1) getsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, &(0x7f0000002900), &(0x7f0000002940)=0x4) setsockopt$sock_int(r5, 0x1, 0x21, &(0x7f0000000380)=0x1, 0x4) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @remote}, 0x27}) sendto$llc(r5, &(0x7f0000000100)="f970073b521a3a2059fcfb4e8ff5daaa892b23d0d93e42e29fd18b0a0ba812eee04266ea1e381a4bb2e397868f69542dd70dd9c732d82d1fb2fc114f477c5628dfd9882cb1704a9f32aac44aae8374041822b9186cf14d60459bd23b2cdfa2331560f6603715660f40eb2abb6eb4ac55a1b1b79c6b0cf8b2b9318c3851c8c082044b202dfddf065073e5b86df813839f8469d5e3897560064588b8857deb8aa08bb97eab5a3c887c75722b8f29c0676355437301c7bab02cae987fb632bc787275cc10ffa7d27aec6dde9675ce109785c50042c06113974ffe11fc8c778aa09dfb093bb384905f3b6b5899e819b4f5263cb840bd", 0xf4, 0x800, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000700)={0x0, 0x80}, &(0x7f0000000740)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000780)={0x0, @in6={{0xa, 0x4e22, 0x7f, @dev={0xfe, 0x80, [], 0x1f}, 0x38}}, 0x3, 0xffffffffffff8e9c}, &(0x7f0000000840)=0xffffffffffffff48) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f00000008c0)={r6, 0x26e, &(0x7f0000000940)=[@in={0x2, 0x4e22, @rand_addr=0x4b}, @in={0x2, 0x4e20, @rand_addr=0x2}, @in={0x2, 0x4e23, @rand_addr=0xfffffffffffffff9}]}, &(0x7f00000006c0)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000480)={r7, @in={{0x2, 0x4e24, @broadcast}}, 0x5eda, 0x1000000003, 0x3f, 0x1, 0x1d}, &(0x7f0000000540)=0x98) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000000c0)={'lo\x00', {0x2, 0x0, @dev}}) r8 = openat$cgroup(r3, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r8, 0x6, 0x1, 0xffffffff, &(0x7f0000000300)=[0x0, 0x0], 0x2}, 0x20) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000040)=0x80001) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000400)=ANY=[]) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000012c0), &(0x7f0000001300)=0x4) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') ioctl(r0, 0x20000000008912, &(0x7f00000000c0)="0a5c2d0240316285717070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r9, 0x84, 0x13, &(0x7f0000000000), 0x4) [ 68.219304][ T7787] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 68.231278][ T7787] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 68.245025][ T7799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 68.257756][ T7799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 68.266479][ T7799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 68.275864][ T7799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 68.293448][ T7789] 8021q: adding VLAN 0 to HW filter on device team0 [ 68.319271][ T7798] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 68.344833][ T7799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 68.359304][ T7799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 68.368424][ T7799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 68.425878][ T7798] team0: Port device team_slave_0 added [ 68.440498][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 68.455514][ T7824] IPVS: ftp: loaded support on port[0] = 21 [ 68.462969][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 68.472349][ T2988] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.479483][ T2988] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.487908][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 68.497098][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 68.505627][ T2988] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.512796][ T2988] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.521010][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 68.530854][ T7801] team0: Port device team_slave_0 added [ 68.537814][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.548899][ T7787] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 68.558960][ T7798] team0: Port device team_slave_1 added [ 68.610555][ T7801] team0: Port device team_slave_1 added [ 68.631468][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 68.645726][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 09:09:04 executing program 1: unshare(0x2000400) pipe(&(0x7f0000000140)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0x2, &(0x7f0000000340)={r0, 0x50, &(0x7f00000002c0)}, 0x10) [ 68.666202][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 68.677051][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 68.686125][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 09:09:04 executing program 1: unshare(0x2000400) pipe(&(0x7f0000000140)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0x2, &(0x7f0000000340)={r0, 0x50, &(0x7f00000002c0)}, 0x10) 09:09:04 executing program 1: unshare(0x2000400) pipe(&(0x7f0000000140)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0x2, &(0x7f0000000340)={r0, 0x50, &(0x7f00000002c0)}, 0x10) 09:09:04 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) r2 = socket$inet6(0xa, 0x3, 0x400000000006) ioctl(r2, 0x8912, &(0x7f0000000200)='\x00'/11) unshare(0x40000000) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000280)={'ip&tnl0\x00', {0x2, 0x4e21, @remote}}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000240)={'ifb0\x00', 0xfd}) r4 = socket$inet(0x2, 0x6, 0x0) r5 = accept(r2, &(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000b80)=0xfffffffffffffecc) shutdown(r5, 0x1) getsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, &(0x7f0000002900), &(0x7f0000002940)=0x4) setsockopt$sock_int(r5, 0x1, 0x21, &(0x7f0000000380)=0x1, 0x4) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @remote}, 0x27}) sendto$llc(r5, &(0x7f0000000100)="f970073b521a3a2059fcfb4e8ff5daaa892b23d0d93e42e29fd18b0a0ba812eee04266ea1e381a4bb2e397868f69542dd70dd9c732d82d1fb2fc114f477c5628dfd9882cb1704a9f32aac44aae8374041822b9186cf14d60459bd23b2cdfa2331560f6603715660f40eb2abb6eb4ac55a1b1b79c6b0cf8b2b9318c3851c8c082044b202dfddf065073e5b86df813839f8469d5e3897560064588b8857deb8aa08bb97eab5a3c887c75722b8f29c0676355437301c7bab02cae987fb632bc787275cc10ffa7d27aec6dde9675ce109785c50042c06113974ffe11fc8c778aa09dfb093bb384905f3b6b5899e819b4f5263cb840bd", 0xf4, 0x800, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000700)={0x0, 0x80}, &(0x7f0000000740)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000780)={0x0, @in6={{0xa, 0x4e22, 0x7f, @dev={0xfe, 0x80, [], 0x1f}, 0x38}}, 0x3, 0xffffffffffff8e9c}, &(0x7f0000000840)=0xffffffffffffff48) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f00000008c0)={r6, 0x26e, &(0x7f0000000940)=[@in={0x2, 0x4e22, @rand_addr=0x4b}, @in={0x2, 0x4e20, @rand_addr=0x2}, @in={0x2, 0x4e23, @rand_addr=0xfffffffffffffff9}]}, &(0x7f00000006c0)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000480)={r7, @in={{0x2, 0x4e24, @broadcast}}, 0x5eda, 0x1000000003, 0x3f, 0x1, 0x1d}, &(0x7f0000000540)=0x98) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000000c0)={'lo\x00', {0x2, 0x0, @dev}}) r8 = openat$cgroup(r3, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r8, 0x6, 0x1, 0xffffffff, &(0x7f0000000300)=[0x0, 0x0], 0x2}, 0x20) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000040)=0x80001) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000400)=ANY=[]) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000012c0), &(0x7f0000001300)=0x4) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') ioctl(r0, 0x20000000008912, &(0x7f00000000c0)="0a5c2d0240316285717070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r9, 0x84, 0x13, &(0x7f0000000000), 0x4) [ 68.994935][ T7793] 8021q: adding VLAN 0 to HW filter on device bond0 [ 69.011210][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 69.026069][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 69.042360][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 69.060532][ T7789] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 69.074468][ T7846] IPVS: ftp: loaded support on port[0] = 21 [ 69.149593][ T7798] device hsr_slave_0 entered promiscuous mode [ 69.187779][ T7798] device hsr_slave_1 entered promiscuous mode [ 69.231646][ T7799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 69.232228][ T7799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 09:09:04 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) r2 = socket$inet6(0xa, 0x3, 0x400000000006) ioctl(r2, 0x8912, &(0x7f0000000200)='\x00'/11) unshare(0x40000000) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000280)={'ip&tnl0\x00', {0x2, 0x4e21, @remote}}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000240)={'ifb0\x00', 0xfd}) r4 = socket$inet(0x2, 0x6, 0x0) r5 = accept(r2, &(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000b80)=0xfffffffffffffecc) shutdown(r5, 0x1) getsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, &(0x7f0000002900), &(0x7f0000002940)=0x4) setsockopt$sock_int(r5, 0x1, 0x21, &(0x7f0000000380)=0x1, 0x4) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @remote}, 0x27}) sendto$llc(r5, &(0x7f0000000100)="f970073b521a3a2059fcfb4e8ff5daaa892b23d0d93e42e29fd18b0a0ba812eee04266ea1e381a4bb2e397868f69542dd70dd9c732d82d1fb2fc114f477c5628dfd9882cb1704a9f32aac44aae8374041822b9186cf14d60459bd23b2cdfa2331560f6603715660f40eb2abb6eb4ac55a1b1b79c6b0cf8b2b9318c3851c8c082044b202dfddf065073e5b86df813839f8469d5e3897560064588b8857deb8aa08bb97eab5a3c887c75722b8f29c0676355437301c7bab02cae987fb632bc787275cc10ffa7d27aec6dde9675ce109785c50042c06113974ffe11fc8c778aa09dfb093bb384905f3b6b5899e819b4f5263cb840bd", 0xf4, 0x800, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000700)={0x0, 0x80}, &(0x7f0000000740)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000780)={0x0, @in6={{0xa, 0x4e22, 0x7f, @dev={0xfe, 0x80, [], 0x1f}, 0x38}}, 0x3, 0xffffffffffff8e9c}, &(0x7f0000000840)=0xffffffffffffff48) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f00000008c0)={r6, 0x26e, &(0x7f0000000940)=[@in={0x2, 0x4e22, @rand_addr=0x4b}, @in={0x2, 0x4e20, @rand_addr=0x2}, @in={0x2, 0x4e23, @rand_addr=0xfffffffffffffff9}]}, &(0x7f00000006c0)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000480)={r7, @in={{0x2, 0x4e24, @broadcast}}, 0x5eda, 0x1000000003, 0x3f, 0x1, 0x1d}, &(0x7f0000000540)=0x98) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000000c0)={'lo\x00', {0x2, 0x0, @dev}}) r8 = openat$cgroup(r3, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r8, 0x6, 0x1, 0xffffffff, &(0x7f0000000300)=[0x0, 0x0], 0x2}, 0x20) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000040)=0x80001) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000400)=ANY=[]) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000012c0), &(0x7f0000001300)=0x4) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') ioctl(r0, 0x20000000008912, &(0x7f00000000c0)="0a5c2d0240316285717070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r9, 0x84, 0x13, &(0x7f0000000000), 0x4) [ 69.535654][ T7855] IPVS: ftp: loaded support on port[0] = 21 [ 69.576195][ T7801] device hsr_slave_0 entered promiscuous mode [ 69.617285][ T7801] device hsr_slave_1 entered promiscuous mode [ 69.716542][ T7793] 8021q: adding VLAN 0 to HW filter on device team0 [ 69.739307][ T7789] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 69.823446][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 69.837423][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 69.908996][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 69.918299][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 69.927309][ T3481] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.934404][ T3481] bridge0: port 1(bridge_slave_0) entered forwarding state [ 69.942498][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 69.951857][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 69.967098][ T3481] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.974133][ T3481] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.997342][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 70.006176][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 70.014966][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 70.023677][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 70.032846][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 70.041914][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 70.050714][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 70.059244][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 70.123012][ T7794] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 70.137980][ T7794] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 70.179244][ T7801] 8021q: adding VLAN 0 to HW filter on device bond0 [ 70.229518][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 70.245510][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 09:09:05 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'brod%e\x00\x00d\x00', 0x20, 0x1, 0x388, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001200], 0x0, &(0x7f0000000040), &(0x7f0000001200)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'syz_tun\x00', 'bj\x00G\x00', 'veth0_to_team\x00', 'veth0\x00', @link_local, [], @empty, [], 0x2a8, 0x2a8, 0x2f8, [@bpf0={'bpf\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x210, {{0xffffff7f}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x400) [ 70.284044][ T7793] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 70.304224][ T7801] 8021q: adding VLAN 0 to HW filter on device team0 [ 70.344965][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 70.356533][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 09:09:05 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'brod%e\x00\x00d\x00', 0x20, 0x1, 0x388, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001200], 0x0, &(0x7f0000000040), &(0x7f0000001200)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'syz_tun\x00', 'bj\x00G\x00', 'veth0_to_team\x00', 'veth0\x00', @link_local, [], @empty, [], 0x2a8, 0x2a8, 0x2f8, [@bpf0={'bpf\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x210, {{0xffffff7f}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x400) [ 70.413077][ T7799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 70.425013][ T7799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 70.446567][ T7799] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.454842][ T7799] bridge0: port 1(bridge_slave_0) entered forwarding state 09:09:05 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) r2 = socket$inet6(0xa, 0x3, 0x400000000006) ioctl(r2, 0x8912, &(0x7f0000000200)='\x00'/11) unshare(0x40000000) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000280)={'ip&tnl0\x00', {0x2, 0x4e21, @remote}}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000240)={'ifb0\x00', 0xfd}) r4 = socket$inet(0x2, 0x6, 0x0) r5 = accept(r2, &(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000b80)=0xfffffffffffffecc) shutdown(r5, 0x1) getsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, &(0x7f0000002900), &(0x7f0000002940)=0x4) setsockopt$sock_int(r5, 0x1, 0x21, &(0x7f0000000380)=0x1, 0x4) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @remote}, 0x27}) sendto$llc(r5, &(0x7f0000000100)="f970073b521a3a2059fcfb4e8ff5daaa892b23d0d93e42e29fd18b0a0ba812eee04266ea1e381a4bb2e397868f69542dd70dd9c732d82d1fb2fc114f477c5628dfd9882cb1704a9f32aac44aae8374041822b9186cf14d60459bd23b2cdfa2331560f6603715660f40eb2abb6eb4ac55a1b1b79c6b0cf8b2b9318c3851c8c082044b202dfddf065073e5b86df813839f8469d5e3897560064588b8857deb8aa08bb97eab5a3c887c75722b8f29c0676355437301c7bab02cae987fb632bc787275cc10ffa7d27aec6dde9675ce109785c50042c06113974ffe11fc8c778aa09dfb093bb384905f3b6b5899e819b4f5263cb840bd", 0xf4, 0x800, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000700)={0x0, 0x80}, &(0x7f0000000740)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000780)={0x0, @in6={{0xa, 0x4e22, 0x7f, @dev={0xfe, 0x80, [], 0x1f}, 0x38}}, 0x3, 0xffffffffffff8e9c}, &(0x7f0000000840)=0xffffffffffffff48) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f00000008c0)={r6, 0x26e, &(0x7f0000000940)=[@in={0x2, 0x4e22, @rand_addr=0x4b}, @in={0x2, 0x4e20, @rand_addr=0x2}, @in={0x2, 0x4e23, @rand_addr=0xfffffffffffffff9}]}, &(0x7f00000006c0)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000480)={r7, @in={{0x2, 0x4e24, @broadcast}}, 0x5eda, 0x1000000003, 0x3f, 0x1, 0x1d}, &(0x7f0000000540)=0x98) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000000c0)={'lo\x00', {0x2, 0x0, @dev}}) r8 = openat$cgroup(r3, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r8, 0x6, 0x1, 0xffffffff, &(0x7f0000000300)=[0x0, 0x0], 0x2}, 0x20) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000040)=0x80001) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000400)=ANY=[]) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000012c0), &(0x7f0000001300)=0x4) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') ioctl(r0, 0x20000000008912, &(0x7f00000000c0)="0a5c2d0240316285717070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r9, 0x84, 0x13, &(0x7f0000000000), 0x4) [ 70.487903][ T7799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 70.496298][ T7799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 70.505681][ T7799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 70.535706][ T7799] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.542897][ T7799] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.563594][ T7799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 70.585900][ T7799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 70.595323][ T7799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 70.610646][ T7799] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 70.628237][ T7798] 8021q: adding VLAN 0 to HW filter on device bond0 [ 70.638236][ T7793] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 70.667335][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 70.675269][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 70.684406][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 70.705885][ T7801] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 70.722561][ T7878] IPVS: ftp: loaded support on port[0] = 21 [ 70.744044][ T7801] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 70.763560][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 70.772111][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 70.780409][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 70.790700][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 70.804423][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 70.814549][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 70.824794][ T7798] 8021q: adding VLAN 0 to HW filter on device team0 [ 70.854531][ T7795] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 09:09:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0xfffffffffffffffc, 0x31, 0xffffffffffffffff, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f00000000c0)=0x20, 0x4) [ 70.926249][ T7801] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 70.952694][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 70.961914][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 70.986430][ T3481] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.993613][ T3481] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.007574][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 71.020088][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 71.029307][ T3481] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.036438][ T3481] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.044468][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 71.128369][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 71.142038][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 71.165790][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 71.211144][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 71.227957][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 71.247832][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 71.263214][ T7798] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 71.286751][ T7798] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 71.339585][ T7794] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 71.367865][ T7794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 71.376226][ T7794] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 71.408112][ T7794] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 71.424527][ T7794] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 71.464415][ T7795] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 71.479262][ T7798] 8021q: adding VLAN 0 to HW filter on device batadv0 09:09:07 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x4) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) 09:09:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0xfffffffffffffffc, 0x31, 0xffffffffffffffff, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f00000000c0)=0x20, 0x4) 09:09:07 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'brod%e\x00\x00d\x00', 0x20, 0x1, 0x388, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001200], 0x0, &(0x7f0000000040), &(0x7f0000001200)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'syz_tun\x00', 'bj\x00G\x00', 'veth0_to_team\x00', 'veth0\x00', @link_local, [], @empty, [], 0x2a8, 0x2a8, 0x2f8, [@bpf0={'bpf\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x210, {{0xffffff7f}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x400) 09:09:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008a00)=[{{0x0, 0xfffffffffffffec6, &(0x7f0000000540)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000000680)=""/120, 0x78}, {&(0x7f0000000400)=""/230, 0xffffff6f}], 0x3}}], 0x4000246, 0x0, &(0x7f0000008bc0)) 09:09:07 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x4) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) 09:09:07 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x4) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) 09:09:08 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) r2 = socket$inet6(0xa, 0x3, 0x400000000006) ioctl(r2, 0x8912, &(0x7f0000000200)='\x00'/11) unshare(0x40000000) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000280)={'ip&tnl0\x00', {0x2, 0x4e21, @remote}}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000240)={'ifb0\x00', 0xfd}) r4 = socket$inet(0x2, 0x6, 0x0) r5 = accept(r2, &(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000b80)=0xfffffffffffffecc) shutdown(r5, 0x1) getsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, &(0x7f0000002900), &(0x7f0000002940)=0x4) setsockopt$sock_int(r5, 0x1, 0x21, &(0x7f0000000380)=0x1, 0x4) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @remote}, 0x27}) sendto$llc(r5, &(0x7f0000000100)="f970073b521a3a2059fcfb4e8ff5daaa892b23d0d93e42e29fd18b0a0ba812eee04266ea1e381a4bb2e397868f69542dd70dd9c732d82d1fb2fc114f477c5628dfd9882cb1704a9f32aac44aae8374041822b9186cf14d60459bd23b2cdfa2331560f6603715660f40eb2abb6eb4ac55a1b1b79c6b0cf8b2b9318c3851c8c082044b202dfddf065073e5b86df813839f8469d5e3897560064588b8857deb8aa08bb97eab5a3c887c75722b8f29c0676355437301c7bab02cae987fb632bc787275cc10ffa7d27aec6dde9675ce109785c50042c06113974ffe11fc8c778aa09dfb093bb384905f3b6b5899e819b4f5263cb840bd", 0xf4, 0x800, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000700)={0x0, 0x80}, &(0x7f0000000740)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000780)={0x0, @in6={{0xa, 0x4e22, 0x7f, @dev={0xfe, 0x80, [], 0x1f}, 0x38}}, 0x3, 0xffffffffffff8e9c}, &(0x7f0000000840)=0xffffffffffffff48) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f00000008c0)={r6, 0x26e, &(0x7f0000000940)=[@in={0x2, 0x4e22, @rand_addr=0x4b}, @in={0x2, 0x4e20, @rand_addr=0x2}, @in={0x2, 0x4e23, @rand_addr=0xfffffffffffffff9}]}, &(0x7f00000006c0)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000480)={r7, @in={{0x2, 0x4e24, @broadcast}}, 0x5eda, 0x1000000003, 0x3f, 0x1, 0x1d}, &(0x7f0000000540)=0x98) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000000c0)={'lo\x00', {0x2, 0x0, @dev}}) r8 = openat$cgroup(r3, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r8, 0x6, 0x1, 0xffffffff, &(0x7f0000000300)=[0x0, 0x0], 0x2}, 0x20) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000040)=0x80001) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000400)=ANY=[]) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000012c0), &(0x7f0000001300)=0x4) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') ioctl(r0, 0x20000000008912, &(0x7f00000000c0)="0a5c2d0240316285717070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r9, 0x84, 0x13, &(0x7f0000000000), 0x4) 09:09:08 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x4) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) 09:09:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0xfffffffffffffffc, 0x31, 0xffffffffffffffff, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f00000000c0)=0x20, 0x4) 09:09:08 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x4) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) 09:09:08 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) r2 = socket$inet6(0xa, 0x3, 0x400000000006) ioctl(r2, 0x8912, &(0x7f0000000200)='\x00'/11) unshare(0x40000000) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000280)={'ip&tnl0\x00', {0x2, 0x4e21, @remote}}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000240)={'ifb0\x00', 0xfd}) r4 = socket$inet(0x2, 0x6, 0x0) r5 = accept(r2, &(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000b80)=0xfffffffffffffecc) shutdown(r5, 0x1) getsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, &(0x7f0000002900), &(0x7f0000002940)=0x4) setsockopt$sock_int(r5, 0x1, 0x21, &(0x7f0000000380)=0x1, 0x4) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @remote}, 0x27}) sendto$llc(r5, &(0x7f0000000100)="f970073b521a3a2059fcfb4e8ff5daaa892b23d0d93e42e29fd18b0a0ba812eee04266ea1e381a4bb2e397868f69542dd70dd9c732d82d1fb2fc114f477c5628dfd9882cb1704a9f32aac44aae8374041822b9186cf14d60459bd23b2cdfa2331560f6603715660f40eb2abb6eb4ac55a1b1b79c6b0cf8b2b9318c3851c8c082044b202dfddf065073e5b86df813839f8469d5e3897560064588b8857deb8aa08bb97eab5a3c887c75722b8f29c0676355437301c7bab02cae987fb632bc787275cc10ffa7d27aec6dde9675ce109785c50042c06113974ffe11fc8c778aa09dfb093bb384905f3b6b5899e819b4f5263cb840bd", 0xf4, 0x800, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000700)={0x0, 0x80}, &(0x7f0000000740)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000780)={0x0, @in6={{0xa, 0x4e22, 0x7f, @dev={0xfe, 0x80, [], 0x1f}, 0x38}}, 0x3, 0xffffffffffff8e9c}, &(0x7f0000000840)=0xffffffffffffff48) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f00000008c0)={r6, 0x26e, &(0x7f0000000940)=[@in={0x2, 0x4e22, @rand_addr=0x4b}, @in={0x2, 0x4e20, @rand_addr=0x2}, @in={0x2, 0x4e23, @rand_addr=0xfffffffffffffff9}]}, &(0x7f00000006c0)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000480)={r7, @in={{0x2, 0x4e24, @broadcast}}, 0x5eda, 0x1000000003, 0x3f, 0x1, 0x1d}, &(0x7f0000000540)=0x98) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000000c0)={'lo\x00', {0x2, 0x0, @dev}}) r8 = openat$cgroup(r3, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r8, 0x6, 0x1, 0xffffffff, &(0x7f0000000300)=[0x0, 0x0], 0x2}, 0x20) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000040)=0x80001) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000400)=ANY=[]) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000012c0), &(0x7f0000001300)=0x4) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') ioctl(r0, 0x20000000008912, &(0x7f00000000c0)="0a5c2d0240316285717070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r9, 0x84, 0x13, &(0x7f0000000000), 0x4) 09:09:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008a00)=[{{0x0, 0xfffffffffffffec6, &(0x7f0000000540)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000000680)=""/120, 0x78}, {&(0x7f0000000400)=""/230, 0xffffff6f}], 0x3}}], 0x4000246, 0x0, &(0x7f0000008bc0)) 09:09:08 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x4) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) 09:09:09 executing program 4: r0 = socket$kcm(0x10, 0x400000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000005c0)="d800000018008100e00f80ecdb4cb904021965000b00fe05e87c55a11400e1730000000000000000000000000000812f508ac1799d58f030035c3b61c1d67f6faf7d7134cf6efbe06bbace8017cbec4c2ee5a7cef4c02631631fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f69d457c0b03c106161a2964c360db798262f3d40fad95667e04adcdf63add2215ce3bb9ad809d5e1cace80ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703e040808fe28eebc078c816db0d00"/216, 0xd8}], 0x1}, 0x0) [ 73.582649][ T7936] IPVS: ftp: loaded support on port[0] = 21 09:09:09 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f00000000c0)={{0x3, @default}, [@rose, @rose, @remote, @default, @default, @rose, @default, @netrom]}, 0x48) close(r0) 09:09:09 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f00000000c0)={{0x3, @default}, [@rose, @rose, @remote, @default, @default, @rose, @default, @netrom]}, 0x48) close(r0) 09:09:09 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f00000000c0)={{0x3, @default}, [@rose, @rose, @remote, @default, @default, @rose, @default, @netrom]}, 0x48) close(r0) 09:09:09 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f00000000c0)={{0x3, @default}, [@rose, @rose, @remote, @default, @default, @rose, @default, @netrom]}, 0x48) close(r0) [ 73.965301][ T7969] IPVS: ftp: loaded support on port[0] = 21 09:09:10 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) r2 = socket$inet6(0xa, 0x3, 0x400000000006) ioctl(r2, 0x8912, &(0x7f0000000200)='\x00'/11) unshare(0x40000000) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000280)={'ip&tnl0\x00', {0x2, 0x4e21, @remote}}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000240)={'ifb0\x00', 0xfd}) r4 = socket$inet(0x2, 0x6, 0x0) r5 = accept(r2, &(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000b80)=0xfffffffffffffecc) shutdown(r5, 0x1) getsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, &(0x7f0000002900), &(0x7f0000002940)=0x4) setsockopt$sock_int(r5, 0x1, 0x21, &(0x7f0000000380)=0x1, 0x4) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @remote}, 0x27}) sendto$llc(r5, &(0x7f0000000100)="f970073b521a3a2059fcfb4e8ff5daaa892b23d0d93e42e29fd18b0a0ba812eee04266ea1e381a4bb2e397868f69542dd70dd9c732d82d1fb2fc114f477c5628dfd9882cb1704a9f32aac44aae8374041822b9186cf14d60459bd23b2cdfa2331560f6603715660f40eb2abb6eb4ac55a1b1b79c6b0cf8b2b9318c3851c8c082044b202dfddf065073e5b86df813839f8469d5e3897560064588b8857deb8aa08bb97eab5a3c887c75722b8f29c0676355437301c7bab02cae987fb632bc787275cc10ffa7d27aec6dde9675ce109785c50042c06113974ffe11fc8c778aa09dfb093bb384905f3b6b5899e819b4f5263cb840bd", 0xf4, 0x800, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000700)={0x0, 0x80}, &(0x7f0000000740)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000780)={0x0, @in6={{0xa, 0x4e22, 0x7f, @dev={0xfe, 0x80, [], 0x1f}, 0x38}}, 0x3, 0xffffffffffff8e9c}, &(0x7f0000000840)=0xffffffffffffff48) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f00000008c0)={r6, 0x26e, &(0x7f0000000940)=[@in={0x2, 0x4e22, @rand_addr=0x4b}, @in={0x2, 0x4e20, @rand_addr=0x2}, @in={0x2, 0x4e23, @rand_addr=0xfffffffffffffff9}]}, &(0x7f00000006c0)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000480)={r7, @in={{0x2, 0x4e24, @broadcast}}, 0x5eda, 0x1000000003, 0x3f, 0x1, 0x1d}, &(0x7f0000000540)=0x98) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000000c0)={'lo\x00', {0x2, 0x0, @dev}}) r8 = openat$cgroup(r3, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r8, 0x6, 0x1, 0xffffffff, &(0x7f0000000300)=[0x0, 0x0], 0x2}, 0x20) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000040)=0x80001) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000400)=ANY=[]) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000012c0), &(0x7f0000001300)=0x4) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') ioctl(r0, 0x20000000008912, &(0x7f00000000c0)="0a5c2d0240316285717070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r9, 0x84, 0x13, &(0x7f0000000000), 0x4) 09:09:10 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f00000000c0)={{0x3, @default}, [@rose, @rose, @remote, @default, @default, @rose, @default, @netrom]}, 0x48) close(r0) 09:09:10 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f00000000c0)={{0x3, @default}, [@rose, @rose, @remote, @default, @default, @rose, @default, @netrom]}, 0x48) close(r0) 09:09:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008a00)=[{{0x0, 0xfffffffffffffec6, &(0x7f0000000540)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000000680)=""/120, 0x78}, {&(0x7f0000000400)=""/230, 0xffffff6f}], 0x3}}], 0x4000246, 0x0, &(0x7f0000008bc0)) 09:09:10 executing program 4: r0 = socket$kcm(0x10, 0x400000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000005c0)="d800000018008100e00f80ecdb4cb904021965000b00fe05e87c55a11400e1730000000000000000000000000000812f508ac1799d58f030035c3b61c1d67f6faf7d7134cf6efbe06bbace8017cbec4c2ee5a7cef4c02631631fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f69d457c0b03c106161a2964c360db798262f3d40fad95667e04adcdf63add2215ce3bb9ad809d5e1cace80ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703e040808fe28eebc078c816db0d00"/216, 0xd8}], 0x1}, 0x0) 09:09:10 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) r2 = socket$inet6(0xa, 0x3, 0x400000000006) ioctl(r2, 0x8912, &(0x7f0000000200)='\x00'/11) unshare(0x40000000) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000280)={'ip&tnl0\x00', {0x2, 0x4e21, @remote}}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000240)={'ifb0\x00', 0xfd}) r4 = socket$inet(0x2, 0x6, 0x0) r5 = accept(r2, &(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000b80)=0xfffffffffffffecc) shutdown(r5, 0x1) getsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, &(0x7f0000002900), &(0x7f0000002940)=0x4) setsockopt$sock_int(r5, 0x1, 0x21, &(0x7f0000000380)=0x1, 0x4) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @remote}, 0x27}) sendto$llc(r5, &(0x7f0000000100)="f970073b521a3a2059fcfb4e8ff5daaa892b23d0d93e42e29fd18b0a0ba812eee04266ea1e381a4bb2e397868f69542dd70dd9c732d82d1fb2fc114f477c5628dfd9882cb1704a9f32aac44aae8374041822b9186cf14d60459bd23b2cdfa2331560f6603715660f40eb2abb6eb4ac55a1b1b79c6b0cf8b2b9318c3851c8c082044b202dfddf065073e5b86df813839f8469d5e3897560064588b8857deb8aa08bb97eab5a3c887c75722b8f29c0676355437301c7bab02cae987fb632bc787275cc10ffa7d27aec6dde9675ce109785c50042c06113974ffe11fc8c778aa09dfb093bb384905f3b6b5899e819b4f5263cb840bd", 0xf4, 0x800, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000700)={0x0, 0x80}, &(0x7f0000000740)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000780)={0x0, @in6={{0xa, 0x4e22, 0x7f, @dev={0xfe, 0x80, [], 0x1f}, 0x38}}, 0x3, 0xffffffffffff8e9c}, &(0x7f0000000840)=0xffffffffffffff48) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f00000008c0)={r6, 0x26e, &(0x7f0000000940)=[@in={0x2, 0x4e22, @rand_addr=0x4b}, @in={0x2, 0x4e20, @rand_addr=0x2}, @in={0x2, 0x4e23, @rand_addr=0xfffffffffffffff9}]}, &(0x7f00000006c0)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000480)={r7, @in={{0x2, 0x4e24, @broadcast}}, 0x5eda, 0x1000000003, 0x3f, 0x1, 0x1d}, &(0x7f0000000540)=0x98) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000000c0)={'lo\x00', {0x2, 0x0, @dev}}) r8 = openat$cgroup(r3, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r8, 0x6, 0x1, 0xffffffff, &(0x7f0000000300)=[0x0, 0x0], 0x2}, 0x20) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000040)=0x80001) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000400)=ANY=[]) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000012c0), &(0x7f0000001300)=0x4) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') ioctl(r0, 0x20000000008912, &(0x7f00000000c0)="0a5c2d0240316285717070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r9, 0x84, 0x13, &(0x7f0000000000), 0x4) 09:09:10 executing program 4: r0 = socket$kcm(0x10, 0x400000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000005c0)="d800000018008100e00f80ecdb4cb904021965000b00fe05e87c55a11400e1730000000000000000000000000000812f508ac1799d58f030035c3b61c1d67f6faf7d7134cf6efbe06bbace8017cbec4c2ee5a7cef4c02631631fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f69d457c0b03c106161a2964c360db798262f3d40fad95667e04adcdf63add2215ce3bb9ad809d5e1cace80ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703e040808fe28eebc078c816db0d00"/216, 0xd8}], 0x1}, 0x0) 09:09:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) pipe(0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) socketpair(0x0, 0x0, 0x0, 0x0) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='veno\x00', 0x5) socket(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 74.827332][ T7988] IPVS: ftp: loaded support on port[0] = 21 09:09:10 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f00000000c0)={{0x3, @default}, [@rose, @rose, @remote, @default, @default, @rose, @default, @netrom]}, 0x48) close(r0) [ 74.971143][ T8001] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.3/8001 [ 74.980879][ T8001] caller is ip6_finish_output+0x335/0xdc0 [ 74.986760][ T8001] CPU: 1 PID: 8001 Comm: syz-executor.3 Not tainted 5.1.0-rc2+ #118 [ 74.994753][ T8001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 74.994776][ T8001] Call Trace: [ 74.994804][ T8001] dump_stack+0x172/0x1f0 [ 74.994829][ T8001] __this_cpu_preempt_check+0x246/0x270 [ 75.018359][ T8001] ip6_finish_output+0x335/0xdc0 [ 75.023324][ T8001] ip6_output+0x235/0x7f0 [ 75.027674][ T8001] ? ip6_finish_output+0xdc0/0xdc0 [ 75.032806][ T8001] ? ip6_fragment+0x38b0/0x38b0 [ 75.037673][ T8001] ip6_xmit+0xe41/0x20c0 [ 75.037700][ T8001] ? ip6_finish_output2+0x2550/0x2550 [ 75.037718][ T8001] ? mark_held_locks+0xf0/0xf0 [ 75.037739][ T8001] ? ip6_setup_cork+0x1870/0x1870 [ 75.057163][ T8001] inet6_csk_xmit+0x2fb/0x5d0 [ 75.057182][ T8001] ? inet6_csk_update_pmtu+0x190/0x190 [ 75.057207][ T8001] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 75.067358][ T8001] ? csum_ipv6_magic+0x20/0x80 [ 75.067385][ T8001] __tcp_transmit_skb+0x1a32/0x3750 [ 75.067412][ T8001] ? __tcp_select_window+0x8b0/0x8b0 [ 75.088876][ T8001] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 75.095142][ T8001] ? tcp_fastopen_no_cookie+0xe0/0x190 [ 75.100618][ T8001] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 75.106874][ T8001] tcp_connect+0x1e47/0x4280 [ 75.111505][ T8001] ? tcp_push_one+0x110/0x110 [ 75.116198][ T8001] ? secure_tcpv6_ts_off+0x24f/0x360 [ 75.121500][ T8001] ? secure_dccpv6_sequence_number+0x280/0x280 [ 75.127668][ T8001] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 75.133926][ T8001] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 75.140188][ T8001] ? prandom_u32_state+0x13/0x180 [ 75.145234][ T8001] tcp_v6_connect+0x150b/0x20a0 [ 75.150105][ T8001] ? tcp_sendmsg_locked+0x2170/0x37f0 [ 75.155533][ T8001] ? tcp_v6_conn_request+0x2b0/0x2b0 [ 75.160471][ T8007] IPVS: ftp: loaded support on port[0] = 21 [ 75.160838][ T8001] ? __switch_to_asm+0x34/0x70 [ 75.171486][ T8001] ? __switch_to_asm+0x40/0x70 [ 75.176272][ T8001] ? find_held_lock+0x35/0x130 [ 75.176299][ T8001] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 75.176324][ T8001] __inet_stream_connect+0x83f/0xea0 [ 75.192122][ T8001] ? tcp_v6_conn_request+0x2b0/0x2b0 [ 75.192142][ T8001] ? __inet_stream_connect+0x83f/0xea0 [ 75.192167][ T8001] ? inet_dgram_connect+0x2e0/0x2e0 [ 75.202942][ T8001] ? tcp_sendmsg_locked+0x2170/0x37f0 [ 75.202963][ T8001] ? rcu_read_lock_sched_held+0x110/0x130 [ 75.202984][ T8001] ? kmem_cache_alloc_trace+0x354/0x760 [ 75.203000][ T8001] ? __lock_acquire+0x548/0x3fb0 [ 75.203024][ T8001] tcp_sendmsg_locked+0x231f/0x37f0 [ 75.219279][ T8001] ? mark_held_locks+0xf0/0xf0 [ 75.219300][ T8001] ? mark_held_locks+0xa4/0xf0 [ 75.219322][ T8001] ? tcp_sendpage+0x60/0x60 [ 75.219337][ T8001] ? lock_sock_nested+0x9a/0x120 [ 75.219359][ T8001] ? trace_hardirqs_on+0x67/0x230 [ 75.239785][ T8001] ? lock_sock_nested+0x9a/0x120 [ 75.239806][ T8001] ? __local_bh_enable_ip+0x15a/0x270 [ 75.239831][ T8001] tcp_sendmsg+0x30/0x50 [ 75.239852][ T8001] inet_sendmsg+0x147/0x5e0 [ 75.239877][ T8001] ? ipip_gro_receive+0x100/0x100 [ 75.254088][ T8001] sock_sendmsg+0xdd/0x130 [ 75.254109][ T8001] __sys_sendto+0x262/0x380 [ 75.254132][ T8001] ? __ia32_sys_getpeername+0xb0/0xb0 [ 75.264111][ T8001] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 75.264142][ T8001] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 75.273760][ T8001] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 75.273777][ T8001] ? do_syscall_64+0x26/0x610 [ 75.273794][ T8001] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 75.273817][ T8001] __x64_sys_sendto+0xe1/0x1a0 [ 75.283351][ T8001] do_syscall_64+0x103/0x610 [ 75.283374][ T8001] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 75.283396][ T8001] RIP: 0033:0x458209 [ 75.292311][ T8001] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:09:10 executing program 4: r0 = socket$kcm(0x10, 0x400000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000005c0)="d800000018008100e00f80ecdb4cb904021965000b00fe05e87c55a11400e1730000000000000000000000000000812f508ac1799d58f030035c3b61c1d67f6faf7d7134cf6efbe06bbace8017cbec4c2ee5a7cef4c02631631fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f69d457c0b03c106161a2964c360db798262f3d40fad95667e04adcdf63add2215ce3bb9ad809d5e1cace80ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703e040808fe28eebc078c816db0d00"/216, 0xd8}], 0x1}, 0x0) 09:09:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r1, 0x0, 0x30000000010, &(0x7f0000000180)="02000100020001b40000000207206548", 0x10) close(r1) [ 75.292321][ T8001] RSP: 002b:00007f0ed75f8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 75.292336][ T8001] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000458209 [ 75.292343][ T8001] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 75.292352][ T8001] RBP: 000000000073bf00 R08: 000000002031e000 R09: 000000000000001c [ 75.292369][ T8001] R10: 0000000020000004 R11: 0000000000000246 R12: 00007f0ed75f96d4 [ 75.303976][ T8001] R13: 00000000004c5916 R14: 00000000004d9c70 R15: 00000000ffffffff [ 75.366119][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 75.502916][ T8019] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.3/8019 [ 75.512833][ T8019] caller is ip6_finish_output+0x335/0xdc0 [ 75.518669][ T8019] CPU: 0 PID: 8019 Comm: syz-executor.3 Not tainted 5.1.0-rc2+ #118 [ 75.526666][ T8019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 75.536741][ T8019] Call Trace: [ 75.540063][ T8019] dump_stack+0x172/0x1f0 [ 75.544462][ T8019] __this_cpu_preempt_check+0x246/0x270 [ 75.550042][ T8019] ip6_finish_output+0x335/0xdc0 [ 75.555015][ T8019] ip6_output+0x235/0x7f0 [ 75.559372][ T8019] ? ip6_finish_output+0xdc0/0xdc0 [ 75.564516][ T8019] ? ip6_fragment+0x38b0/0x38b0 [ 75.569400][ T8019] ip6_xmit+0xe41/0x20c0 [ 75.573683][ T8019] ? ip6_finish_output2+0x2550/0x2550 [ 75.579095][ T8019] ? mark_held_locks+0xf0/0xf0 [ 75.583901][ T8019] ? ip6_setup_cork+0x1870/0x1870 [ 75.589020][ T8019] inet6_csk_xmit+0x2fb/0x5d0 [ 75.593736][ T8019] ? inet6_csk_update_pmtu+0x190/0x190 [ 75.599233][ T8019] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 75.605516][ T8019] ? csum_ipv6_magic+0x20/0x80 [ 75.610326][ T8019] __tcp_transmit_skb+0x1a32/0x3750 [ 75.615578][ T8019] ? __tcp_select_window+0x8b0/0x8b0 [ 75.620898][ T8019] ? lockdep_hardirqs_on+0x418/0x5d0 [ 75.626229][ T8019] ? trace_hardirqs_on+0x67/0x230 [ 75.631288][ T8019] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 75.637042][ T8019] tcp_write_xmit+0xe39/0x5660 [ 75.641820][ T8019] ? tcp_established_options+0x29d/0x4d0 [ 75.647503][ T8019] __tcp_push_pending_frames+0xb4/0x350 [ 75.653092][ T8019] tcp_send_fin+0x149/0xbb0 [ 75.657636][ T8019] tcp_shutdown+0x107/0x130 [ 75.662168][ T8019] ? tcp_set_state+0x7e0/0x7e0 [ 75.666988][ T8019] inet_shutdown+0x1bd/0x3d0 [ 75.671625][ T8019] __sys_shutdown+0x117/0x1d0 [ 75.676340][ T8019] ? __ia32_sys_getsockopt+0x150/0x150 [ 75.681834][ T8019] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 75.687334][ T8019] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 75.692833][ T8019] ? do_syscall_64+0x26/0x610 [ 75.697539][ T8019] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 75.703628][ T8019] ? do_syscall_64+0x26/0x610 [ 75.708336][ T8019] ? lockdep_hardirqs_on+0x418/0x5d0 [ 75.713665][ T8019] __x64_sys_shutdown+0x54/0x80 [ 75.718666][ T8019] do_syscall_64+0x103/0x610 [ 75.723303][ T8019] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 75.729228][ T8019] RIP: 0033:0x458209 [ 75.733159][ T8019] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 75.752791][ T8019] RSP: 002b:00007f0ed75d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000030 [ 75.761238][ T8019] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 0000000000458209 [ 75.769240][ T8019] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000004 [ 75.777251][ T8019] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 75.785246][ T8019] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0ed75d86d4 [ 75.793253][ T8019] R13: 00000000004c64e1 R14: 00000000004dbad0 R15: 00000000ffffffff 09:09:11 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x6, {}, 0x0, 0x2}, 0xe) [ 76.199525][ T8019] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.3/8019 [ 76.208975][ T8019] caller is ip6_finish_output+0x335/0xdc0 [ 76.214751][ T8019] CPU: 1 PID: 8019 Comm: syz-executor.3 Not tainted 5.1.0-rc2+ #118 [ 76.222748][ T8019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 76.232833][ T8019] Call Trace: [ 76.236205][ T8019] dump_stack+0x172/0x1f0 [ 76.240578][ T8019] __this_cpu_preempt_check+0x246/0x270 [ 76.246175][ T8019] ip6_finish_output+0x335/0xdc0 [ 76.251171][ T8019] ip6_output+0x235/0x7f0 [ 76.255546][ T8019] ? ip6_finish_output+0xdc0/0xdc0 [ 76.260700][ T8019] ? ip6_fragment+0x38b0/0x38b0 [ 76.265603][ T8019] ip6_xmit+0xe41/0x20c0 [ 76.269894][ T8019] ? ip6_finish_output2+0x2550/0x2550 [ 76.275310][ T8019] ? mark_held_locks+0xf0/0xf0 [ 76.280115][ T8019] ? ip6_setup_cork+0x1870/0x1870 [ 76.285202][ T8019] inet6_csk_xmit+0x2fb/0x5d0 [ 76.289952][ T8019] ? inet6_csk_update_pmtu+0x190/0x190 [ 76.295463][ T8019] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 76.301746][ T8019] ? csum_ipv6_magic+0x20/0x80 [ 76.306560][ T8019] __tcp_transmit_skb+0x1a32/0x3750 [ 76.311812][ T8019] ? __tcp_select_window+0x8b0/0x8b0 [ 76.317149][ T8019] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 76.322919][ T8019] tcp_write_xmit+0xe39/0x5660 [ 76.327736][ T8019] ? lock_downgrade+0x880/0x880 [ 76.332622][ T8019] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 76.338393][ T8019] tcp_push_one+0xd7/0x110 [ 76.342854][ T8019] tcp_sendmsg_locked+0xa35/0x37f0 [ 76.348030][ T8019] ? tcp_sendpage+0x60/0x60 [ 76.352573][ T8019] ? trace_hardirqs_on+0x67/0x230 [ 76.357630][ T8019] ? lock_sock_nested+0x9a/0x120 [ 76.362611][ T8019] ? __local_bh_enable_ip+0x15a/0x270 [ 76.368036][ T8019] tcp_sendmsg+0x30/0x50 [ 76.372324][ T8019] inet_sendmsg+0x147/0x5e0 [ 76.376861][ T8019] ? ipip_gro_receive+0x100/0x100 [ 76.381923][ T8019] sock_sendmsg+0xdd/0x130 [ 76.386397][ T8019] __sys_sendto+0x262/0x380 [ 76.390949][ T8019] ? __ia32_sys_getpeername+0xb0/0xb0 [ 76.396398][ T8019] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 76.402672][ T8019] ? put_timespec64+0xda/0x140 [ 76.407484][ T8019] ? nsecs_to_jiffies+0x30/0x30 [ 76.413868][ T8019] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 76.420579][ T8019] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 76.426085][ T8019] ? do_syscall_64+0x26/0x610 [ 76.430802][ T8019] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 76.436907][ T8019] __x64_sys_sendto+0xe1/0x1a0 [ 76.441728][ T8019] do_syscall_64+0x103/0x610 [ 76.446361][ T8019] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 76.452286][ T8019] RIP: 0033:0x458209 [ 76.457676][ T8019] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 76.477309][ T8019] RSP: 002b:00007f0ed75d7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 76.485753][ T8019] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000458209 [ 76.493757][ T8019] RDX: 00000000fffffdda RSI: 00000000200000c0 RDI: 0000000000000005 [ 76.501754][ T8019] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 76.509762][ T8019] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0ed75d86d4 [ 76.517760][ T8019] R13: 00000000004c5916 R14: 00000000004d9c70 R15: 00000000ffffffff [ 76.624191][ T8019] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.3/8019 [ 76.634204][ T8019] caller is ip6_finish_output+0x335/0xdc0 [ 76.640094][ T8019] CPU: 1 PID: 8019 Comm: syz-executor.3 Not tainted 5.1.0-rc2+ #118 [ 76.648095][ T8019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 76.658171][ T8019] Call Trace: [ 76.661503][ T8019] dump_stack+0x172/0x1f0 [ 76.665880][ T8019] __this_cpu_preempt_check+0x246/0x270 [ 76.671476][ T8019] ip6_finish_output+0x335/0xdc0 [ 76.676468][ T8019] ip6_output+0x235/0x7f0 [ 76.680840][ T8019] ? ip6_finish_output+0xdc0/0xdc0 [ 76.685991][ T8019] ? ip6_fragment+0x38b0/0x38b0 [ 76.690881][ T8019] ip6_xmit+0xe41/0x20c0 [ 76.695173][ T8019] ? ip6_finish_output2+0x2550/0x2550 [ 76.700579][ T8019] ? mark_held_locks+0xf0/0xf0 [ 76.705382][ T8019] ? ip6_setup_cork+0x1870/0x1870 [ 76.710442][ T8019] ? inet6_csk_route_socket+0x715/0xf40 [ 76.716046][ T8019] inet6_csk_xmit+0x2fb/0x5d0 [ 76.720765][ T8019] ? inet6_csk_update_pmtu+0x190/0x190 [ 76.726272][ T8019] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 76.732550][ T8019] ? csum_ipv6_magic+0x20/0x80 [ 76.737352][ T8019] __tcp_transmit_skb+0x1a32/0x3750 [ 76.742602][ T8019] ? __tcp_select_window+0x8b0/0x8b0 [ 76.747935][ T8019] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 76.753699][ T8019] tcp_write_xmit+0xe39/0x5660 [ 76.758503][ T8019] ? lock_downgrade+0x880/0x880 [ 76.763408][ T8019] __tcp_push_pending_frames+0xb4/0x350 [ 76.768998][ T8019] tcp_sendmsg_locked+0x25d8/0x37f0 [ 76.774254][ T8019] ? tcp_sendpage+0x60/0x60 [ 76.778799][ T8019] ? trace_hardirqs_on+0x67/0x230 [ 76.783859][ T8019] ? lock_sock_nested+0x9a/0x120 [ 76.788832][ T8019] ? __local_bh_enable_ip+0x15a/0x270 [ 76.794249][ T8019] tcp_sendmsg+0x30/0x50 [ 76.798531][ T8019] inet_sendmsg+0x147/0x5e0 [ 76.803069][ T8019] ? ipip_gro_receive+0x100/0x100 [ 76.808128][ T8019] sock_sendmsg+0xdd/0x130 [ 76.812584][ T8019] __sys_sendto+0x262/0x380 [ 76.817140][ T8019] ? __ia32_sys_getpeername+0xb0/0xb0 09:09:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000440)={0x0, 0x1}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xc9, 0x0, 0x0) 09:09:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r1, 0x0, 0x30000000010, &(0x7f0000000180)="02000100020001b40000000207206548", 0x10) close(r1) 09:09:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r1, 0x0, 0x30000000010, &(0x7f0000000180)="02000100020001b40000000207206548", 0x10) close(r1) 09:09:12 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x6, {}, 0x0, 0x2}, 0xe) 09:09:12 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) r2 = socket$inet6(0xa, 0x3, 0x400000000006) ioctl(r2, 0x8912, &(0x7f0000000200)='\x00'/11) unshare(0x40000000) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000280)={'ip&tnl0\x00', {0x2, 0x4e21, @remote}}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000240)={'ifb0\x00', 0xfd}) r4 = socket$inet(0x2, 0x6, 0x0) r5 = accept(r2, &(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000b80)=0xfffffffffffffecc) shutdown(r5, 0x1) getsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, &(0x7f0000002900), &(0x7f0000002940)=0x4) setsockopt$sock_int(r5, 0x1, 0x21, &(0x7f0000000380)=0x1, 0x4) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @remote}, 0x27}) sendto$llc(r5, &(0x7f0000000100)="f970073b521a3a2059fcfb4e8ff5daaa892b23d0d93e42e29fd18b0a0ba812eee04266ea1e381a4bb2e397868f69542dd70dd9c732d82d1fb2fc114f477c5628dfd9882cb1704a9f32aac44aae8374041822b9186cf14d60459bd23b2cdfa2331560f6603715660f40eb2abb6eb4ac55a1b1b79c6b0cf8b2b9318c3851c8c082044b202dfddf065073e5b86df813839f8469d5e3897560064588b8857deb8aa08bb97eab5a3c887c75722b8f29c0676355437301c7bab02cae987fb632bc787275cc10ffa7d27aec6dde9675ce109785c50042c06113974ffe11fc8c778aa09dfb093bb384905f3b6b5899e819b4f5263cb840bd", 0xf4, 0x800, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000700)={0x0, 0x80}, &(0x7f0000000740)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000780)={0x0, @in6={{0xa, 0x4e22, 0x7f, @dev={0xfe, 0x80, [], 0x1f}, 0x38}}, 0x3, 0xffffffffffff8e9c}, &(0x7f0000000840)=0xffffffffffffff48) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f00000008c0)={r6, 0x26e, &(0x7f0000000940)=[@in={0x2, 0x4e22, @rand_addr=0x4b}, @in={0x2, 0x4e20, @rand_addr=0x2}, @in={0x2, 0x4e23, @rand_addr=0xfffffffffffffff9}]}, &(0x7f00000006c0)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000480)={r7, @in={{0x2, 0x4e24, @broadcast}}, 0x5eda, 0x1000000003, 0x3f, 0x1, 0x1d}, &(0x7f0000000540)=0x98) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000000c0)={'lo\x00', {0x2, 0x0, @dev}}) r8 = openat$cgroup(r3, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r8, 0x6, 0x1, 0xffffffff, &(0x7f0000000300)=[0x0, 0x0], 0x2}, 0x20) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000040)=0x80001) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000400)=ANY=[]) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000012c0), &(0x7f0000001300)=0x4) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') ioctl(r0, 0x20000000008912, &(0x7f00000000c0)="0a5c2d0240316285717070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r9, 0x84, 0x13, &(0x7f0000000000), 0x4) [ 76.822569][ T8019] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 76.828843][ T8019] ? put_timespec64+0xda/0x140 [ 76.833642][ T8019] ? nsecs_to_jiffies+0x30/0x30 [ 76.838530][ T8019] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 76.844025][ T8019] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 76.849516][ T8019] ? do_syscall_64+0x26/0x610 [ 76.849533][ T8019] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 76.849555][ T8019] __x64_sys_sendto+0xe1/0x1a0 [ 76.849574][ T8019] do_syscall_64+0x103/0x610 [ 76.849592][ T8019] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 76.849615][ T8019] RIP: 0033:0x458209 [ 76.860394][ T8019] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 76.860404][ T8019] RSP: 002b:00007f0ed75d7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 76.860416][ T8019] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000458209 [ 76.860424][ T8019] RDX: 00000000fffffdda RSI: 00000000200000c0 RDI: 0000000000000005 09:09:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r1, 0x0, 0x30000000010, &(0x7f0000000180)="02000100020001b40000000207206548", 0x10) close(r1) 09:09:12 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x6, {}, 0x0, 0x2}, 0xe) [ 76.860431][ T8019] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 76.860439][ T8019] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0ed75d86d4 [ 76.860453][ T8019] R13: 00000000004c5916 R14: 00000000004d9c70 R15: 00000000ffffffff [ 76.983856][ T8042] IPVS: ftp: loaded support on port[0] = 21 [ 77.003409][ T8019] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.3/8019 [ 77.012879][ T8019] caller is ip6_finish_output+0x335/0xdc0 [ 77.018773][ T8019] CPU: 0 PID: 8019 Comm: syz-executor.3 Not tainted 5.1.0-rc2+ #118 [ 77.026769][ T8019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 77.036876][ T8019] Call Trace: [ 77.040198][ T8019] dump_stack+0x172/0x1f0 [ 77.044558][ T8019] __this_cpu_preempt_check+0x246/0x270 [ 77.050140][ T8019] ip6_finish_output+0x335/0xdc0 [ 77.055128][ T8019] ip6_output+0x235/0x7f0 [ 77.059503][ T8019] ? ip6_finish_output+0xdc0/0xdc0 [ 77.064659][ T8019] ? ip6_fragment+0x38b0/0x38b0 [ 77.069554][ T8019] ip6_xmit+0xe41/0x20c0 [ 77.073838][ T8019] ? ip6_finish_output2+0x2550/0x2550 [ 77.079242][ T8019] ? mark_held_locks+0xf0/0xf0 [ 77.084041][ T8019] ? ip6_setup_cork+0x1870/0x1870 [ 77.084063][ T8019] ? inet6_csk_route_socket+0x715/0xf40 [ 77.084102][ T8019] inet6_csk_xmit+0x2fb/0x5d0 [ 77.099388][ T8019] ? inet6_csk_update_pmtu+0x190/0x190 [ 77.104880][ T8019] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 77.111163][ T8019] ? csum_ipv6_magic+0x20/0x80 [ 77.115987][ T8019] __tcp_transmit_skb+0x1a32/0x3750 [ 77.121237][ T8019] ? __tcp_select_window+0x8b0/0x8b0 [ 77.126548][ T8019] ? tcp_rearm_rto.part.0+0x1e0/0x390 [ 77.126574][ T8019] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 77.126594][ T8019] tcp_write_xmit+0xe39/0x5660 [ 77.126610][ T8019] ? lock_downgrade+0x880/0x880 [ 77.126640][ T8019] __tcp_push_pending_frames+0xb4/0x350 [ 77.152927][ T8019] tcp_sendmsg_locked+0x25d8/0x37f0 [ 77.158197][ T8019] ? tcp_sendpage+0x60/0x60 [ 77.162721][ T8019] ? trace_hardirqs_on+0x67/0x230 [ 77.167774][ T8019] ? lock_sock_nested+0x9a/0x120 [ 77.167793][ T8019] ? __local_bh_enable_ip+0x15a/0x270 [ 77.167815][ T8019] tcp_sendmsg+0x30/0x50 [ 77.167836][ T8019] inet_sendmsg+0x147/0x5e0 [ 77.167851][ T8019] ? ipip_gro_receive+0x100/0x100 [ 77.167866][ T8019] sock_sendmsg+0xdd/0x130 [ 77.167883][ T8019] __sys_sendto+0x262/0x380 [ 77.167899][ T8019] ? __ia32_sys_getpeername+0xb0/0xb0 [ 77.167958][ T8019] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 77.192043][ T8019] ? put_timespec64+0xda/0x140 [ 77.217378][ T8019] ? nsecs_to_jiffies+0x30/0x30 [ 77.217408][ T8019] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 77.217421][ T8019] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 77.217434][ T8019] ? do_syscall_64+0x26/0x610 [ 77.217449][ T8019] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 77.217470][ T8019] __x64_sys_sendto+0xe1/0x1a0 [ 77.217488][ T8019] do_syscall_64+0x103/0x610 [ 77.217505][ T8019] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 77.217527][ T8019] RIP: 0033:0x458209 [ 77.233314][ T8019] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 77.259302][ T8019] RSP: 002b:00007f0ed75d7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 77.259319][ T8019] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000458209 [ 77.259329][ T8019] RDX: 00000000fffffdda RSI: 00000000200000c0 RDI: 0000000000000005 [ 77.259338][ T8019] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 77.259347][ T8019] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0ed75d86d4 [ 77.259356][ T8019] R13: 00000000004c5916 R14: 00000000004d9c70 R15: 00000000ffffffff [ 77.300643][ T8050] IPVS: ftp: loaded support on port[0] = 21 [ 77.969721][ T8066] IPVS: ftp: loaded support on port[0] = 21 [ 77.995121][ T8019] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.3/8019 [ 78.004816][ T8019] caller is ip6_finish_output+0x335/0xdc0 [ 78.010661][ T8019] CPU: 1 PID: 8019 Comm: syz-executor.3 Not tainted 5.1.0-rc2+ #118 [ 78.018668][ T8019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 78.028746][ T8019] Call Trace: [ 78.032068][ T8019] dump_stack+0x172/0x1f0 [ 78.036437][ T8019] __this_cpu_preempt_check+0x246/0x270 [ 78.042030][ T8019] ip6_finish_output+0x335/0xdc0 [ 78.047010][ T8019] ip6_output+0x235/0x7f0 [ 78.051378][ T8019] ? ip6_finish_output+0xdc0/0xdc0 [ 78.056518][ T8019] ? ip6_fragment+0x38b0/0x38b0 [ 78.061412][ T8019] ip6_xmit+0xe41/0x20c0 [ 78.065713][ T8019] ? ip6_finish_output2+0x2550/0x2550 [ 78.071116][ T8019] ? mark_held_locks+0xf0/0xf0 [ 78.075921][ T8019] ? ip6_setup_cork+0x1870/0x1870 [ 78.081003][ T8019] inet6_csk_xmit+0x2fb/0x5d0 [ 78.085715][ T8019] ? inet6_csk_update_pmtu+0x190/0x190 [ 78.091208][ T8019] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 78.097495][ T8019] ? csum_ipv6_magic+0x20/0x80 [ 78.102305][ T8019] __tcp_transmit_skb+0x1a32/0x3750 [ 78.107561][ T8019] ? __tcp_select_window+0x8b0/0x8b0 [ 78.112894][ T8019] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 78.118650][ T8019] tcp_write_xmit+0xe39/0x5660 [ 78.123453][ T8019] ? lock_downgrade+0x880/0x880 [ 78.128337][ T8019] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 78.134108][ T8019] tcp_push_one+0xd7/0x110 [ 78.138562][ T8019] tcp_sendmsg_locked+0xa35/0x37f0 [ 78.143725][ T8019] ? tcp_sendpage+0x60/0x60 [ 78.148261][ T8019] ? trace_hardirqs_on+0x67/0x230 [ 78.153317][ T8019] ? lock_sock_nested+0x9a/0x120 [ 78.158293][ T8019] ? __local_bh_enable_ip+0x15a/0x270 [ 78.163710][ T8019] tcp_sendmsg+0x30/0x50 [ 78.167993][ T8019] inet_sendmsg+0x147/0x5e0 [ 78.172539][ T8019] ? ipip_gro_receive+0x100/0x100 [ 78.177612][ T8019] sock_sendmsg+0xdd/0x130 [ 78.182064][ T8019] __sys_sendto+0x262/0x380 [ 78.186606][ T8019] ? __ia32_sys_getpeername+0xb0/0xb0 [ 78.192028][ T8019] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 78.198307][ T8019] ? put_timespec64+0xda/0x140 [ 78.203108][ T8019] ? nsecs_to_jiffies+0x30/0x30 [ 78.208002][ T8019] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 78.213509][ T8019] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 78.219011][ T8019] ? do_syscall_64+0x26/0x610 [ 78.223725][ T8019] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 78.229846][ T8019] __x64_sys_sendto+0xe1/0x1a0 [ 78.234656][ T8019] do_syscall_64+0x103/0x610 [ 78.239293][ T8019] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 78.245231][ T8019] RIP: 0033:0x458209 [ 78.249155][ T8019] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 78.268785][ T8019] RSP: 002b:00007f0ed75d7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 78.277232][ T8019] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000458209 [ 78.285232][ T8019] RDX: 00000000fffffdda RSI: 00000000200000c0 RDI: 0000000000000005 [ 78.293226][ T8019] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 78.301222][ T8019] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0ed75d86d4 [ 78.309222][ T8019] R13: 00000000004c5916 R14: 00000000004d9c70 R15: 00000000ffffffff [ 78.320957][ T8019] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.3/8019 [ 78.330583][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 78.336756][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 78.336999][ T8019] caller is ip6_finish_output+0x335/0xdc0 [ 78.337029][ T8019] CPU: 0 PID: 8019 Comm: syz-executor.3 Not tainted 5.1.0-rc2+ #118 [ 78.337038][ T8019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 78.337044][ T8019] Call Trace: [ 78.337065][ T8019] dump_stack+0x172/0x1f0 [ 78.337091][ T8019] __this_cpu_preempt_check+0x246/0x270 [ 78.337111][ T8019] ip6_finish_output+0x335/0xdc0 [ 78.337135][ T8019] ip6_output+0x235/0x7f0 [ 78.337155][ T8019] ? ip6_finish_output+0xdc0/0xdc0 [ 78.337177][ T8019] ? ip6_fragment+0x38b0/0x38b0 [ 78.337202][ T8019] ip6_xmit+0xe41/0x20c0 [ 78.337229][ T8019] ? ip6_finish_output2+0x2550/0x2550 [ 78.337248][ T8019] ? mark_held_locks+0xf0/0xf0 [ 78.337268][ T8019] ? ip6_setup_cork+0x1870/0x1870 [ 78.337289][ T8019] ? inet6_csk_route_socket+0x715/0xf40 [ 78.337321][ T8019] inet6_csk_xmit+0x2fb/0x5d0 [ 78.337339][ T8019] ? inet6_csk_update_pmtu+0x190/0x190 [ 78.337356][ T8019] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 78.337381][ T8019] ? csum_ipv6_magic+0x20/0x80 [ 78.337407][ T8019] __tcp_transmit_skb+0x1a32/0x3750 [ 78.337435][ T8019] ? __tcp_select_window+0x8b0/0x8b0 [ 78.337459][ T8019] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 78.337478][ T8019] tcp_write_xmit+0xe39/0x5660 [ 78.337493][ T8019] ? lock_downgrade+0x880/0x880 [ 78.337528][ T8019] __tcp_push_pending_frames+0xb4/0x350 [ 78.337549][ T8019] tcp_sendmsg_locked+0x25d8/0x37f0 [ 78.337582][ T8019] ? tcp_sendpage+0x60/0x60 [ 78.337600][ T8019] ? trace_hardirqs_on+0x67/0x230 [ 78.337617][ T8019] ? lock_sock_nested+0x9a/0x120 [ 78.337637][ T8019] ? __local_bh_enable_ip+0x15a/0x270 [ 78.337661][ T8019] tcp_sendmsg+0x30/0x50 [ 78.337682][ T8019] inet_sendmsg+0x147/0x5e0 [ 78.337699][ T8019] ? ipip_gro_receive+0x100/0x100 [ 78.337718][ T8019] sock_sendmsg+0xdd/0x130 [ 78.337738][ T8019] __sys_sendto+0x262/0x380 [ 78.337758][ T8019] ? __ia32_sys_getpeername+0xb0/0xb0 [ 78.337791][ T8019] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 78.337807][ T8019] ? put_timespec64+0xda/0x140 [ 78.337823][ T8019] ? nsecs_to_jiffies+0x30/0x30 [ 78.337851][ T8019] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 78.337867][ T8019] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 78.337884][ T8019] ? do_syscall_64+0x26/0x610 [ 78.337900][ T8019] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 78.337920][ T8019] __x64_sys_sendto+0xe1/0x1a0 [ 78.337963][ T8019] do_syscall_64+0x103/0x610 [ 78.337984][ T8019] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 78.337998][ T8019] RIP: 0033:0x458209 [ 78.338015][ T8019] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 78.338024][ T8019] RSP: 002b:00007f0ed75d7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 78.338039][ T8019] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000458209 [ 78.338049][ T8019] RDX: 00000000fffffdda RSI: 00000000200000c0 RDI: 0000000000000005 [ 78.338058][ T8019] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 78.338067][ T8019] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0ed75d86d4 [ 78.338076][ T8019] R13: 00000000004c5916 R14: 00000000004d9c70 R15: 00000000ffffffff [ 78.357353][ T8019] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.3/8019 [ 78.368961][ T8019] caller is ip6_finish_output+0x335/0xdc0 [ 78.376641][ T8019] CPU: 0 PID: 8019 Comm: syz-executor.3 Not tainted 5.1.0-rc2+ #118 [ 78.387126][ T8019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 78.387134][ T8019] Call Trace: [ 78.387162][ T8019] dump_stack+0x172/0x1f0 [ 78.387183][ T8019] __this_cpu_preempt_check+0x246/0x270 [ 78.387202][ T8019] ip6_finish_output+0x335/0xdc0 [ 78.387221][ T8019] ip6_output+0x235/0x7f0 [ 78.387240][ T8019] ? ip6_finish_output+0xdc0/0xdc0 [ 78.387260][ T8019] ? ip6_fragment+0x38b0/0x38b0 [ 78.387280][ T8019] ip6_xmit+0xe41/0x20c0 [ 78.387303][ T8019] ? ip6_finish_output2+0x2550/0x2550 [ 78.387320][ T8019] ? mark_held_locks+0xf0/0xf0 [ 78.387343][ T8019] ? ip6_setup_cork+0x1870/0x1870 [ 78.396801][ T8019] ? inet6_csk_route_socket+0x715/0xf40 [ 78.396828][ T8019] inet6_csk_xmit+0x2fb/0x5d0 [ 78.396844][ T8019] ? inet6_csk_update_pmtu+0x190/0x190 [ 78.396859][ T8019] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 78.396880][ T8019] ? csum_ipv6_magic+0x20/0x80 [ 78.396910][ T8019] __tcp_transmit_skb+0x1a32/0x3750 [ 78.406035][ T8019] ? __tcp_select_window+0x8b0/0x8b0 [ 78.419718][ T8019] ? tcp_rearm_rto.part.0+0x1e0/0x390 [ 78.419741][ T8019] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 78.419757][ T8019] tcp_write_xmit+0xe39/0x5660 [ 78.419772][ T8019] ? lock_downgrade+0x880/0x880 [ 78.419800][ T8019] __tcp_push_pending_frames+0xb4/0x350 [ 78.419826][ T8019] tcp_sendmsg_locked+0x25d8/0x37f0 [ 78.430448][ T8019] ? tcp_sendpage+0x60/0x60 [ 78.430467][ T8019] ? trace_hardirqs_on+0x67/0x230 [ 78.430481][ T8019] ? lock_sock_nested+0x9a/0x120 [ 78.430498][ T8019] ? __local_bh_enable_ip+0x15a/0x270 [ 78.430519][ T8019] tcp_sendmsg+0x30/0x50 [ 78.430545][ T8019] inet_sendmsg+0x147/0x5e0 [ 78.440709][ T8019] ? ipip_gro_receive+0x100/0x100 [ 78.440728][ T8019] sock_sendmsg+0xdd/0x130 [ 78.440742][ T8019] __sys_sendto+0x262/0x380 [ 78.440759][ T8019] ? __ia32_sys_getpeername+0xb0/0xb0 [ 78.440788][ T8019] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 78.440811][ T8019] ? put_timespec64+0xda/0x140 [ 78.458514][ T8019] ? nsecs_to_jiffies+0x30/0x30 [ 78.469547][ T8019] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 78.469563][ T8019] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 78.469577][ T8019] ? do_syscall_64+0x26/0x610 [ 78.469592][ T8019] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 78.469614][ T8019] __x64_sys_sendto+0xe1/0x1a0 [ 78.469633][ T8019] do_syscall_64+0x103/0x610 [ 78.469649][ T8019] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 78.469662][ T8019] RIP: 0033:0x458209 [ 78.469679][ T8019] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 78.469686][ T8019] RSP: 002b:00007f0ed75d7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 78.469701][ T8019] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000458209 [ 78.469720][ T8019] RDX: 00000000fffffdda RSI: 00000000200000c0 RDI: 0000000000000005 [ 78.484901][ T8019] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 78.484911][ T8019] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0ed75d86d4 [ 78.484919][ T8019] R13: 00000000004c5916 R14: 00000000004d9c70 R15: 00000000ffffffff [ 78.495147][ T8019] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.3/8019 [ 78.504931][ T8019] caller is ip6_finish_output+0x335/0xdc0 [ 78.504964][ T8019] CPU: 0 PID: 8019 Comm: syz-executor.3 Not tainted 5.1.0-rc2+ #118 [ 78.504982][ T8019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 78.514607][ T8019] Call Trace: [ 78.514637][ T8019] dump_stack+0x172/0x1f0 [ 78.514659][ T8019] __this_cpu_preempt_check+0x246/0x270 [ 78.514685][ T8019] ip6_finish_output+0x335/0xdc0 [ 78.524238][ T8019] ip6_output+0x235/0x7f0 [ 78.524258][ T8019] ? ip6_finish_output+0xdc0/0xdc0 [ 78.524283][ T8019] ? ip6_fragment+0x38b0/0x38b0 [ 78.533235][ T8019] ip6_xmit+0xe41/0x20c0 [ 78.533262][ T8019] ? ip6_finish_output2+0x2550/0x2550 [ 78.533286][ T8019] ? mark_held_locks+0xf0/0xf0 [ 78.544926][ T8019] ? ip6_setup_cork+0x1870/0x1870 [ 78.544978][ T8019] inet6_csk_xmit+0x2fb/0x5d0 [ 78.554611][ T8019] ? inet6_csk_update_pmtu+0x190/0x190 [ 78.554636][ T8019] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 78.568032][ T8019] ? csum_ipv6_magic+0x20/0x80 [ 78.568056][ T8019] __tcp_transmit_skb+0x1a32/0x3750 [ 78.568080][ T8019] ? __tcp_select_window+0x8b0/0x8b0 [ 78.568105][ T8019] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 78.568122][ T8019] tcp_write_xmit+0xe39/0x5660 [ 78.568135][ T8019] ? lock_downgrade+0x880/0x880 [ 78.568157][ T8019] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 79.130604][ T8019] tcp_push_one+0xd7/0x110 [ 79.135020][ T8019] tcp_sendmsg_locked+0xa35/0x37f0 [ 79.140140][ T8019] ? tcp_sendpage+0x60/0x60 [ 79.144641][ T8019] ? trace_hardirqs_on+0x67/0x230 [ 79.149667][ T8019] ? lock_sock_nested+0x9a/0x120 [ 79.154612][ T8019] ? __local_bh_enable_ip+0x15a/0x270 [ 79.159994][ T8019] tcp_sendmsg+0x30/0x50 [ 79.164237][ T8019] inet_sendmsg+0x147/0x5e0 [ 79.168751][ T8019] ? ipip_gro_receive+0x100/0x100 [ 79.173788][ T8019] sock_sendmsg+0xdd/0x130 [ 79.178224][ T8019] __sys_sendto+0x262/0x380 [ 79.182738][ T8019] ? __ia32_sys_getpeername+0xb0/0xb0 [ 79.188143][ T8019] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 79.194400][ T8019] ? put_timespec64+0xda/0x140 [ 79.199174][ T8019] ? nsecs_to_jiffies+0x30/0x30 [ 79.204044][ T8019] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 79.209543][ T8019] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 79.215018][ T8019] ? do_syscall_64+0x26/0x610 [ 79.219690][ T8019] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 79.225775][ T8019] __x64_sys_sendto+0xe1/0x1a0 [ 79.230544][ T8019] do_syscall_64+0x103/0x610 [ 79.235135][ T8019] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 79.241026][ T8019] RIP: 0033:0x458209 [ 79.244914][ T8019] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 79.264539][ T8019] RSP: 002b:00007f0ed75d7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 79.272958][ T8019] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000458209 [ 79.280940][ T8019] RDX: 00000000fffffdda RSI: 00000000200000c0 RDI: 0000000000000005 [ 79.288942][ T8019] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 79.296957][ T8019] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0ed75d86d4 [ 79.304945][ T8019] R13: 00000000004c5916 R14: 00000000004d9c70 R15: 00000000ffffffff [ 79.316399][ T8019] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.3/8019 [ 79.325879][ T8019] caller is ip6_finish_output+0x335/0xdc0 [ 79.331960][ T8019] CPU: 0 PID: 8019 Comm: syz-executor.3 Not tainted 5.1.0-rc2+ #118 [ 79.339974][ T8019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 79.350051][ T8019] Call Trace: [ 79.353366][ T8019] dump_stack+0x172/0x1f0 [ 79.357730][ T8019] __this_cpu_preempt_check+0x246/0x270 [ 79.363302][ T8019] ip6_finish_output+0x335/0xdc0 [ 79.368270][ T8019] ip6_output+0x235/0x7f0 [ 79.372619][ T8019] ? ip6_finish_output+0xdc0/0xdc0 [ 79.377754][ T8019] ? ip6_fragment+0x38b0/0x38b0 [ 79.382637][ T8019] ip6_xmit+0xe41/0x20c0 [ 79.386918][ T8019] ? ip6_finish_output2+0x2550/0x2550 [ 79.392325][ T8019] ? mark_held_locks+0xf0/0xf0 [ 79.397115][ T8019] ? ip6_setup_cork+0x1870/0x1870 [ 79.402171][ T8019] ? inet6_csk_route_socket+0x715/0xf40 [ 79.407764][ T8019] inet6_csk_xmit+0x2fb/0x5d0 [ 79.412474][ T8019] ? inet6_csk_update_pmtu+0x190/0x190 [ 79.417968][ T8019] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 79.417994][ T8019] ? csum_ipv6_magic+0x20/0x80 [ 79.418018][ T8019] __tcp_transmit_skb+0x1a32/0x3750 [ 79.418042][ T8019] ? __tcp_select_window+0x8b0/0x8b0 [ 79.418075][ T8019] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 79.429125][ T8019] tcp_write_xmit+0xe39/0x5660 [ 79.429146][ T8019] ? lock_downgrade+0x880/0x880 [ 79.429172][ T8019] __tcp_push_pending_frames+0xb4/0x350 [ 79.429190][ T8019] tcp_sendmsg_locked+0x25d8/0x37f0 [ 79.429217][ T8019] ? tcp_sendpage+0x60/0x60 [ 79.429233][ T8019] ? trace_hardirqs_on+0x67/0x230 09:09:14 executing program 3: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x18, &(0x7f0000004dc0)={'ipvs\x00'}, &(0x7f00000000c0)=0xfffe) 09:09:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r1, 0x0, 0x30000000010, &(0x7f0000000180)="02000100020001b40000000207206548", 0x10) close(r1) 09:09:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r1, 0x0, 0x30000000010, &(0x7f0000000180)="02000100020001b40000000207206548", 0x10) close(r1) 09:09:14 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x6, {}, 0x0, 0x2}, 0xe) 09:09:14 executing program 2: r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80000) connect$nfc_llcp(r0, &(0x7f0000000140)={0x27, 0x1, 0x2, 0x7, 0x0, 0x0, "afc4527a6d47911bc1636e6f17d4daeaa5fbe8464cd4a6c8edd65b2d84f4cc53acb4b61fda56967ede073de2adff193bdc8239d736a289ef72c0ae82b94836"}, 0x60) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='hqgetl\x14\x00\x00\x00\t\x00\x00\x00age_ir?\x00\x00\x00es\x00p\x80#\xbe\xc4\xe5\x05\xab\xcd\x7f\xd3so2\xcb\x85o\xd5\x11\xfe.\xb6\xf9\xf2;\xd0\xbe\xa6\xe9\xb9\xa4Aa\xbe\xfb\x9c\xff\xf1', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) ioctl(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet(0x10, 0x100000803, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000002c0)={0x0, 0x7f60}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000000c0)={0xed5e0000, 0x0, 0x0, 0x20000fff}) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x400890e, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(serpent)\x00'}, 0x58) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080), 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0, 0x80000) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280), 0xfffffe8f) [ 79.429249][ T8019] ? lock_sock_nested+0x9a/0x120 [ 79.429266][ T8019] ? __local_bh_enable_ip+0x15a/0x270 [ 79.429286][ T8019] tcp_sendmsg+0x30/0x50 [ 79.429305][ T8019] inet_sendmsg+0x147/0x5e0 [ 79.429322][ T8019] ? ipip_gro_receive+0x100/0x100 [ 79.429338][ T8019] sock_sendmsg+0xdd/0x130 [ 79.429355][ T8019] __sys_sendto+0x262/0x380 [ 79.429372][ T8019] ? __ia32_sys_getpeername+0xb0/0xb0 [ 79.429401][ T8019] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 79.445620][ T8019] ? put_timespec64+0xda/0x140 [ 79.445636][ T8019] ? nsecs_to_jiffies+0x30/0x30 [ 79.445666][ T8019] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 79.455815][ T8019] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 79.471074][ T8019] ? do_syscall_64+0x26/0x610 [ 79.471092][ T8019] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 79.471113][ T8019] __x64_sys_sendto+0xe1/0x1a0 [ 79.471136][ T8019] do_syscall_64+0x103/0x610 [ 79.481134][ T8019] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 79.481149][ T8019] RIP: 0033:0x458209 [ 79.481165][ T8019] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 79.481171][ T8019] RSP: 002b:00007f0ed75d7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 79.481185][ T8019] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000458209 [ 79.481192][ T8019] RDX: 00000000fffffdda RSI: 00000000200000c0 RDI: 0000000000000005 [ 79.481199][ T8019] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 79.481207][ T8019] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0ed75d86d4 [ 79.481216][ T8019] R13: 00000000004c5916 R14: 00000000004d9c70 R15: 00000000ffffffff 09:09:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000440)={0x0, 0x1}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xc9, 0x0, 0x0) 09:09:16 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x275a, 0x0) setsockopt$inet6_int(r0, 0x29, 0xff, &(0x7f00000006c0)=0x6fde, 0x4) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000680)=0x8, 0x4) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x1) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x12, r1, 0x0) recvmsg$kcm(r0, 0x0, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) sendmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f00000002c0)={0x1d, r2}, 0x10, 0x0}, 0x10) openat$cgroup_type(r0, &(0x7f0000000180)='cgroup.type\x00', 0x2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r4, &(0x7f0000000980), 0xffffff4d) close(r4) recvmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') 09:09:16 executing program 2: r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80000) connect$nfc_llcp(r0, &(0x7f0000000140)={0x27, 0x1, 0x2, 0x7, 0x0, 0x0, "afc4527a6d47911bc1636e6f17d4daeaa5fbe8464cd4a6c8edd65b2d84f4cc53acb4b61fda56967ede073de2adff193bdc8239d736a289ef72c0ae82b94836"}, 0x60) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='hqgetl\x14\x00\x00\x00\t\x00\x00\x00age_ir?\x00\x00\x00es\x00p\x80#\xbe\xc4\xe5\x05\xab\xcd\x7f\xd3so2\xcb\x85o\xd5\x11\xfe.\xb6\xf9\xf2;\xd0\xbe\xa6\xe9\xb9\xa4Aa\xbe\xfb\x9c\xff\xf1', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) ioctl(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet(0x10, 0x100000803, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000002c0)={0x0, 0x7f60}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000000c0)={0xed5e0000, 0x0, 0x0, 0x20000fff}) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x400890e, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(serpent)\x00'}, 0x58) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080), 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0, 0x80000) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280), 0xfffffe8f) 09:09:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x400000004) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffefffff}, 0xc) close(r0) 09:09:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r1, 0x0, 0x30000000010, &(0x7f0000000180)="02000100020001b40000000207206548", 0x10) close(r1) 09:09:16 executing program 3: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x18, &(0x7f0000004dc0)={'ipvs\x00'}, &(0x7f00000000c0)=0xfffe) [ 81.153577][ T8098] check_preemption_disabled: 4 callbacks suppressed [ 81.153595][ T8098] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.3/8098 [ 81.169797][ T8098] caller is ip6_finish_output+0x335/0xdc0 [ 81.175560][ T8098] CPU: 1 PID: 8098 Comm: syz-executor.3 Not tainted 5.1.0-rc2+ #118 [ 81.175571][ T8098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 81.175577][ T8098] Call Trace: [ 81.175607][ T8098] dump_stack+0x172/0x1f0 [ 81.175634][ T8098] __this_cpu_preempt_check+0x246/0x270 [ 81.175662][ T8098] ip6_finish_output+0x335/0xdc0 [ 81.175685][ T8098] ip6_output+0x235/0x7f0 [ 81.175701][ T8098] ? ip6_finish_output+0xdc0/0xdc0 [ 81.175720][ T8098] ? ip6_fragment+0x38b0/0x38b0 [ 81.175742][ T8098] ? kasan_check_read+0x11/0x20 [ 81.231348][ T8098] ip6_xmit+0xe41/0x20c0 [ 81.235727][ T8098] ? ip6_finish_output2+0x2550/0x2550 [ 81.241140][ T8098] ? mark_held_locks+0xf0/0xf0 [ 81.245946][ T8098] ? ip6_setup_cork+0x1870/0x1870 [ 81.251025][ T8098] sctp_v6_xmit+0x313/0x660 [ 81.255584][ T8098] sctp_packet_transmit+0x1bc4/0x36f0 [ 81.261031][ T8098] ? sctp_packet_config+0xfe0/0xfe0 [ 81.266278][ T8098] ? sctp_packet_append_chunk+0x946/0xda0 [ 81.272038][ T8098] ? sctp_outq_select_transport+0x21a/0x790 [ 81.277991][ T8098] sctp_outq_flush_ctrl.constprop.0+0x6d4/0xd50 [ 81.284280][ T8098] ? sctp_prsctp_prune_sent.isra.0+0x820/0x820 [ 81.290520][ T8098] ? lock_downgrade+0x880/0x880 [ 81.295508][ T8098] ? add_timer+0x450/0xbe0 [ 81.299960][ T8098] ? find_held_lock+0x35/0x130 [ 81.304762][ T8098] ? add_timer+0x463/0xbe0 [ 81.309212][ T8098] sctp_outq_flush+0xe8/0x2780 [ 81.314015][ T8098] ? mark_held_locks+0xa4/0xf0 [ 81.318809][ T8098] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 81.324650][ T8098] ? add_timer+0x463/0xbe0 [ 81.329099][ T8098] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 81.335028][ T8098] ? lockdep_hardirqs_on+0x418/0x5d0 [ 81.340359][ T8098] ? trace_hardirqs_on+0x67/0x230 [ 81.345427][ T8098] ? __sctp_outq_teardown+0xc60/0xc60 [ 81.350849][ T8098] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 81.357119][ T8098] ? sctp_outq_tail+0x68c/0x930 [ 81.362010][ T8098] sctp_outq_uncork+0x6c/0x80 [ 81.366720][ T8098] sctp_do_sm+0x559/0x53e0 [ 81.371211][ T8098] ? sctp_do_8_2_transport_strike.isra.0+0x940/0x940 [ 81.377921][ T8098] ? __local_bh_enable_ip+0x15a/0x270 [ 81.383333][ T8098] ? lock_downgrade+0x880/0x880 [ 81.388211][ T8098] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 81.394498][ T8098] ? kasan_check_read+0x11/0x20 [ 81.399386][ T8098] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 81.405663][ T8098] ? sctp_hash_transport+0x10b/0x18d0 [ 81.411091][ T8098] ? memcpy+0x46/0x50 [ 81.415136][ T8098] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 81.421419][ T8098] ? sctp_assoc_set_primary+0x274/0x310 [ 81.427011][ T8098] sctp_primitive_ASSOCIATE+0x9d/0xd0 [ 81.432425][ T8098] __sctp_connect+0x8cd/0xce0 [ 81.437147][ T8098] ? sctp_sendmsg_to_asoc+0x17b0/0x17b0 [ 81.442730][ T8098] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 81.449046][ T8098] ? sctp_get_port+0x10e/0x180 [ 81.453856][ T8098] ? sctp_get_port_local+0x1670/0x1670 [ 81.459354][ T8098] ? __local_bh_enable_ip+0x15a/0x270 [ 81.464769][ T8098] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 81.470706][ T8098] sctp_inet_connect+0x2a2/0x350 [ 81.475692][ T8098] __sys_connect+0x266/0x330 [ 81.480331][ T8098] ? __ia32_sys_accept+0xb0/0xb0 [ 81.485305][ T8098] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 81.491584][ T8098] ? put_timespec64+0xda/0x140 [ 81.496437][ T8098] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 81.501942][ T8098] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 81.507433][ T8098] ? do_syscall_64+0x26/0x610 [ 81.512151][ T8098] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 81.518252][ T8098] ? do_syscall_64+0x26/0x610 [ 81.522971][ T8098] __x64_sys_connect+0x73/0xb0 [ 81.527786][ T8098] do_syscall_64+0x103/0x610 [ 81.532414][ T8098] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 81.538336][ T8098] RIP: 0033:0x458209 [ 81.542256][ T8098] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 81.562452][ T8098] RSP: 002b:00007f0ed75f8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 81.570893][ T8098] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458209 [ 81.578889][ T8098] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 81.586887][ T8098] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 81.594884][ T8098] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0ed75f96d4 09:09:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x400000004) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffefffff}, 0xc) close(r0) [ 81.602886][ T8098] R13: 00000000004be5ac R14: 00000000004cf140 R15: 00000000ffffffff [ 81.663723][ T8109] IPVS: ftp: loaded support on port[0] = 21 09:09:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x400000004) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffefffff}, 0xc) close(r0) 09:09:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x400000004) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffefffff}, 0xc) close(r0) 09:09:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x400000004) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffefffff}, 0xc) close(r0) 09:09:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x400000004) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffefffff}, 0xc) close(r0) 09:09:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x275a, 0x0) setsockopt$inet6_int(r0, 0x29, 0xff, &(0x7f00000006c0)=0x6fde, 0x4) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000680)=0x8, 0x4) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x1) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x12, r1, 0x0) recvmsg$kcm(r0, 0x0, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) sendmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f00000002c0)={0x1d, r2}, 0x10, 0x0}, 0x10) openat$cgroup_type(r0, &(0x7f0000000180)='cgroup.type\x00', 0x2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r4, &(0x7f0000000980), 0xffffff4d) close(r4) recvmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') [ 82.467681][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 82.473510][ C0] protocol 88fb is buggy, dev hsr_slave_1 09:09:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000440)={0x0, 0x1}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xc9, 0x0, 0x0) 09:09:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x400000004) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffefffff}, 0xc) close(r0) 09:09:18 executing program 2: r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80000) connect$nfc_llcp(r0, &(0x7f0000000140)={0x27, 0x1, 0x2, 0x7, 0x0, 0x0, "afc4527a6d47911bc1636e6f17d4daeaa5fbe8464cd4a6c8edd65b2d84f4cc53acb4b61fda56967ede073de2adff193bdc8239d736a289ef72c0ae82b94836"}, 0x60) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='hqgetl\x14\x00\x00\x00\t\x00\x00\x00age_ir?\x00\x00\x00es\x00p\x80#\xbe\xc4\xe5\x05\xab\xcd\x7f\xd3so2\xcb\x85o\xd5\x11\xfe.\xb6\xf9\xf2;\xd0\xbe\xa6\xe9\xb9\xa4Aa\xbe\xfb\x9c\xff\xf1', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) ioctl(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet(0x10, 0x100000803, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000002c0)={0x0, 0x7f60}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000000c0)={0xed5e0000, 0x0, 0x0, 0x20000fff}) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x400890e, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(serpent)\x00'}, 0x58) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080), 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0, 0x80000) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280), 0xfffffe8f) 09:09:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000440)={0x0, 0x1}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xc9, 0x0, 0x0) 09:09:18 executing program 3: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x18, &(0x7f0000004dc0)={'ipvs\x00'}, &(0x7f00000000c0)=0xfffe) [ 82.653544][ T8148] IPVS: ftp: loaded support on port[0] = 21 [ 82.673194][ T8154] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.3/8154 [ 82.682791][ T8154] caller is ip6_finish_output+0x335/0xdc0 [ 82.688831][ T8154] CPU: 1 PID: 8154 Comm: syz-executor.3 Not tainted 5.1.0-rc2+ #118 [ 82.696833][ T8154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 82.706990][ T8154] Call Trace: [ 82.710311][ T8154] dump_stack+0x172/0x1f0 [ 82.714677][ T8154] __this_cpu_preempt_check+0x246/0x270 [ 82.720263][ T8154] ip6_finish_output+0x335/0xdc0 [ 82.725418][ T8154] ip6_output+0x235/0x7f0 [ 82.729789][ T8154] ? ip6_finish_output+0xdc0/0xdc0 [ 82.734946][ T8154] ? ip6_fragment+0x38b0/0x38b0 [ 82.739833][ T8154] ? kasan_check_read+0x11/0x20 [ 82.744729][ T8154] ip6_xmit+0xe41/0x20c0 [ 82.749022][ T8154] ? ip6_finish_output2+0x2550/0x2550 [ 82.754443][ T8154] ? mark_held_locks+0xf0/0xf0 [ 82.759269][ T8154] ? ip6_setup_cork+0x1870/0x1870 [ 82.764344][ T8154] sctp_v6_xmit+0x313/0x660 [ 82.768887][ T8154] sctp_packet_transmit+0x1bc4/0x36f0 [ 82.774323][ T8154] ? sctp_packet_config+0xfe0/0xfe0 [ 82.779560][ T8154] ? sctp_packet_append_chunk+0x946/0xda0 [ 82.785318][ T8154] ? sctp_outq_select_transport+0x21a/0x790 [ 82.791252][ T8154] sctp_outq_flush_ctrl.constprop.0+0x6d4/0xd50 [ 82.797543][ T8154] ? sctp_prsctp_prune_sent.isra.0+0x820/0x820 [ 82.803739][ T8154] ? lock_downgrade+0x880/0x880 [ 82.808626][ T8154] ? add_timer+0x450/0xbe0 [ 82.813076][ T8154] ? find_held_lock+0x35/0x130 [ 82.817873][ T8154] ? add_timer+0x463/0xbe0 [ 82.822322][ T8154] sctp_outq_flush+0xe8/0x2780 [ 82.827119][ T8154] ? mark_held_locks+0xa4/0xf0 [ 82.831921][ T8154] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 82.837774][ T8154] ? add_timer+0x463/0xbe0 [ 82.842220][ T8154] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 82.848058][ T8154] ? lockdep_hardirqs_on+0x418/0x5d0 [ 82.853382][ T8154] ? trace_hardirqs_on+0x67/0x230 [ 82.858463][ T8154] ? __sctp_outq_teardown+0xc60/0xc60 [ 82.863883][ T8154] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 82.870157][ T8154] ? sctp_outq_tail+0x68c/0x930 [ 82.875051][ T8154] sctp_outq_uncork+0x6c/0x80 [ 82.879781][ T8154] sctp_do_sm+0x559/0x53e0 [ 82.884246][ T8154] ? sctp_do_8_2_transport_strike.isra.0+0x940/0x940 [ 82.890966][ T8154] ? __local_bh_enable_ip+0x15a/0x270 [ 82.896388][ T8154] ? lock_downgrade+0x880/0x880 [ 82.901273][ T8154] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 82.907553][ T8154] ? kasan_check_read+0x11/0x20 [ 82.912441][ T8154] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 82.918720][ T8154] ? sctp_hash_transport+0x10b/0x18d0 [ 82.924143][ T8154] ? memcpy+0x46/0x50 [ 82.928168][ T8154] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 82.934445][ T8154] ? sctp_assoc_set_primary+0x274/0x310 [ 82.940060][ T8154] sctp_primitive_ASSOCIATE+0x9d/0xd0 [ 82.945483][ T8154] __sctp_connect+0x8cd/0xce0 [ 82.950207][ T8154] ? sctp_sendmsg_to_asoc+0x17b0/0x17b0 [ 82.955799][ T8154] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 82.962111][ T8154] ? sctp_get_port+0x10e/0x180 [ 82.966904][ T8154] ? sctp_get_port_local+0x1670/0x1670 [ 82.972412][ T8154] ? __local_bh_enable_ip+0x15a/0x270 [ 82.977824][ T8154] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 82.983759][ T8154] sctp_inet_connect+0x2a2/0x350 [ 82.988738][ T8154] __sys_connect+0x266/0x330 [ 82.993370][ T8154] ? __ia32_sys_accept+0xb0/0xb0 [ 82.998334][ T8154] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 83.004609][ T8154] ? put_timespec64+0xda/0x140 [ 83.009421][ T8154] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 83.014921][ T8154] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 83.020428][ T8154] ? do_syscall_64+0x26/0x610 [ 83.025151][ T8154] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 83.031253][ T8154] ? do_syscall_64+0x26/0x610 [ 83.035987][ T8154] __x64_sys_connect+0x73/0xb0 [ 83.040797][ T8154] do_syscall_64+0x103/0x610 [ 83.045430][ T8154] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 83.051359][ T8154] RIP: 0033:0x458209 [ 83.055286][ T8154] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 83.074940][ T8154] RSP: 002b:00007f0ed75f8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 83.083381][ T8154] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458209 [ 83.091375][ T8154] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 09:09:18 executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x18, &(0x7f0000004dc0)={'ipvs\x00'}, &(0x7f00000000c0)=0xfffe) [ 83.099367][ T8154] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 83.107357][ T8154] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0ed75f96d4 [ 83.115354][ T8154] R13: 00000000004be5ac R14: 00000000004cf140 R15: 00000000ffffffff [ 83.162263][ T8155] IPVS: ftp: loaded support on port[0] = 21 [ 83.249755][ T8163] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.0/8163 [ 83.259315][ T8163] caller is ip6_finish_output+0x335/0xdc0 [ 83.265083][ T8163] CPU: 1 PID: 8163 Comm: syz-executor.0 Not tainted 5.1.0-rc2+ #118 [ 83.273074][ T8163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 83.273083][ T8163] Call Trace: [ 83.273115][ T8163] dump_stack+0x172/0x1f0 [ 83.273145][ T8163] __this_cpu_preempt_check+0x246/0x270 [ 83.296419][ T8163] ip6_finish_output+0x335/0xdc0 [ 83.301409][ T8163] ip6_output+0x235/0x7f0 [ 83.305784][ T8163] ? ip6_finish_output+0xdc0/0xdc0 [ 83.310952][ T8163] ? ip6_fragment+0x38b0/0x38b0 [ 83.315845][ T8163] ? kasan_check_read+0x11/0x20 [ 83.320732][ T8163] ip6_xmit+0xe41/0x20c0 [ 83.325015][ T8163] ? ip6_finish_output2+0x2550/0x2550 [ 83.330421][ T8163] ? mark_held_locks+0xf0/0xf0 [ 83.335236][ T8163] ? ip6_setup_cork+0x1870/0x1870 [ 83.340318][ T8163] sctp_v6_xmit+0x313/0x660 [ 83.344872][ T8163] sctp_packet_transmit+0x1bc4/0x36f0 [ 83.350290][ T8163] ? sctp_packet_config+0xfe0/0xfe0 [ 83.350311][ T8163] ? sctp_packet_append_chunk+0x946/0xda0 [ 83.350335][ T8163] ? sctp_outq_select_transport+0x21a/0x790 [ 83.367214][ T8163] sctp_outq_flush_ctrl.constprop.0+0x6d4/0xd50 [ 83.373532][ T8163] ? sctp_prsctp_prune_sent.isra.0+0x820/0x820 [ 83.373550][ T8163] ? lock_downgrade+0x880/0x880 [ 83.373577][ T8163] ? add_timer+0x450/0xbe0 [ 83.389052][ T8163] ? find_held_lock+0x35/0x130 [ 83.393850][ T8163] ? add_timer+0x463/0xbe0 [ 83.398297][ T8163] sctp_outq_flush+0xe8/0x2780 [ 83.403100][ T8163] ? mark_held_locks+0xa4/0xf0 [ 83.407901][ T8163] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 83.413760][ T8163] ? add_timer+0x463/0xbe0 [ 83.418207][ T8163] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 83.424053][ T8163] ? lockdep_hardirqs_on+0x418/0x5d0 [ 83.429362][ T8163] ? trace_hardirqs_on+0x67/0x230 [ 83.429383][ T8163] ? __sctp_outq_teardown+0xc60/0xc60 [ 83.429408][ T8163] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 83.429428][ T8163] ? sctp_outq_tail+0x68c/0x930 [ 83.446098][ T8163] sctp_outq_uncork+0x6c/0x80 [ 83.446116][ T8163] sctp_do_sm+0x559/0x53e0 [ 83.446145][ T8163] ? sctp_do_8_2_transport_strike.isra.0+0x940/0x940 [ 83.466801][ T8163] ? __local_bh_enable_ip+0x15a/0x270 [ 83.472214][ T8163] ? lock_downgrade+0x880/0x880 [ 83.477132][ T8163] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 83.483416][ T8163] ? kasan_check_read+0x11/0x20 [ 83.488299][ T8163] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 83.488319][ T8163] ? sctp_hash_transport+0x10b/0x18d0 [ 83.488354][ T8163] ? memcpy+0x46/0x50 [ 83.499987][ T8163] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 83.500007][ T8163] ? sctp_assoc_set_primary+0x274/0x310 [ 83.500031][ T8163] sctp_primitive_ASSOCIATE+0x9d/0xd0 [ 83.521199][ T8163] __sctp_connect+0x8cd/0xce0 [ 83.525918][ T8163] ? sctp_sendmsg_to_asoc+0x17b0/0x17b0 [ 83.531503][ T8163] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 83.531533][ T8163] ? sctp_get_port+0x10e/0x180 [ 83.542574][ T8163] ? sctp_get_port_local+0x1670/0x1670 [ 83.548069][ T8163] ? __local_bh_enable_ip+0x15a/0x270 [ 83.553484][ T8163] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 83.559419][ T8163] sctp_inet_connect+0x2a2/0x350 [ 83.564904][ T8163] __sys_connect+0x266/0x330 [ 83.569543][ T8163] ? __ia32_sys_accept+0xb0/0xb0 [ 83.574508][ T8163] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 83.574526][ T8163] ? put_timespec64+0xda/0x140 [ 83.574554][ T8163] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 83.591042][ T8163] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 83.596536][ T8163] ? do_syscall_64+0x26/0x610 [ 83.601265][ T8163] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 83.607371][ T8163] ? do_syscall_64+0x26/0x610 [ 83.612095][ T8163] __x64_sys_connect+0x73/0xb0 [ 83.616902][ T8163] do_syscall_64+0x103/0x610 [ 83.621546][ T8163] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 83.627477][ T8163] RIP: 0033:0x458209 [ 83.631395][ T8163] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:09:19 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x275a, 0x0) setsockopt$inet6_int(r0, 0x29, 0xff, &(0x7f00000006c0)=0x6fde, 0x4) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000680)=0x8, 0x4) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x1) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x12, r1, 0x0) recvmsg$kcm(r0, 0x0, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) sendmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f00000002c0)={0x1d, r2}, 0x10, 0x0}, 0x10) openat$cgroup_type(r0, &(0x7f0000000180)='cgroup.type\x00', 0x2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r4, &(0x7f0000000980), 0xffffff4d) close(r4) recvmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') [ 83.631405][ T8163] RSP: 002b:00007fad666bbc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 83.631419][ T8163] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458209 [ 83.631427][ T8163] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 83.631435][ T8163] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 83.631443][ T8163] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fad666bc6d4 [ 83.631463][ T8163] R13: 00000000004be5ac R14: 00000000004cf140 R15: 00000000ffffffff 09:09:19 executing program 2: r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80000) connect$nfc_llcp(r0, &(0x7f0000000140)={0x27, 0x1, 0x2, 0x7, 0x0, 0x0, "afc4527a6d47911bc1636e6f17d4daeaa5fbe8464cd4a6c8edd65b2d84f4cc53acb4b61fda56967ede073de2adff193bdc8239d736a289ef72c0ae82b94836"}, 0x60) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='hqgetl\x14\x00\x00\x00\t\x00\x00\x00age_ir?\x00\x00\x00es\x00p\x80#\xbe\xc4\xe5\x05\xab\xcd\x7f\xd3so2\xcb\x85o\xd5\x11\xfe.\xb6\xf9\xf2;\xd0\xbe\xa6\xe9\xb9\xa4Aa\xbe\xfb\x9c\xff\xf1', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) ioctl(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet(0x10, 0x100000803, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000002c0)={0x0, 0x7f60}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000000c0)={0xed5e0000, 0x0, 0x0, 0x20000fff}) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x400890e, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(serpent)\x00'}, 0x58) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080), 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0, 0x80000) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280), 0xfffffe8f) 09:09:19 executing program 2: r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80000) connect$nfc_llcp(r0, &(0x7f0000000140)={0x27, 0x1, 0x2, 0x7, 0x0, 0x0, "afc4527a6d47911bc1636e6f17d4daeaa5fbe8464cd4a6c8edd65b2d84f4cc53acb4b61fda56967ede073de2adff193bdc8239d736a289ef72c0ae82b94836"}, 0x60) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='hqgetl\x14\x00\x00\x00\t\x00\x00\x00age_ir?\x00\x00\x00es\x00p\x80#\xbe\xc4\xe5\x05\xab\xcd\x7f\xd3so2\xcb\x85o\xd5\x11\xfe.\xb6\xf9\xf2;\xd0\xbe\xa6\xe9\xb9\xa4Aa\xbe\xfb\x9c\xff\xf1', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) ioctl(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet(0x10, 0x100000803, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000002c0)={0x0, 0x7f60}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000000c0)={0xed5e0000, 0x0, 0x0, 0x20000fff}) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x400890e, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(serpent)\x00'}, 0x58) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080), 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0, 0x80000) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280), 0xfffffe8f) 09:09:19 executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x18, &(0x7f0000004dc0)={'ipvs\x00'}, &(0x7f00000000c0)=0xfffe) [ 84.653537][ T8188] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.0/8188 [ 84.663116][ T8188] caller is ip6_finish_output+0x335/0xdc0 [ 84.668966][ T8188] CPU: 1 PID: 8188 Comm: syz-executor.0 Not tainted 5.1.0-rc2+ #118 [ 84.676977][ T8188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 84.687061][ T8188] Call Trace: [ 84.690394][ T8188] dump_stack+0x172/0x1f0 [ 84.694765][ T8188] __this_cpu_preempt_check+0x246/0x270 [ 84.700353][ T8188] ip6_finish_output+0x335/0xdc0 [ 84.705335][ T8188] ip6_output+0x235/0x7f0 [ 84.709710][ T8188] ? ip6_finish_output+0xdc0/0xdc0 [ 84.714871][ T8188] ? ip6_fragment+0x38b0/0x38b0 [ 84.719760][ T8188] ? kasan_check_read+0x11/0x20 [ 84.724645][ T8188] ip6_xmit+0xe41/0x20c0 [ 84.728944][ T8188] ? ip6_finish_output2+0x2550/0x2550 [ 84.734466][ T8188] ? mark_held_locks+0xf0/0xf0 [ 84.739266][ T8188] ? ip6_setup_cork+0x1870/0x1870 [ 84.744343][ T8188] sctp_v6_xmit+0x313/0x660 [ 84.748892][ T8188] sctp_packet_transmit+0x1bc4/0x36f0 [ 84.754330][ T8188] ? sctp_packet_config+0xfe0/0xfe0 [ 84.759580][ T8188] ? sctp_packet_append_chunk+0x946/0xda0 [ 84.765330][ T8188] ? sctp_outq_select_transport+0x21a/0x790 [ 84.771286][ T8188] sctp_outq_flush_ctrl.constprop.0+0x6d4/0xd50 [ 84.777573][ T8188] ? sctp_prsctp_prune_sent.isra.0+0x820/0x820 [ 84.783756][ T8188] ? lock_downgrade+0x880/0x880 [ 84.788649][ T8188] ? add_timer+0x450/0xbe0 [ 84.793107][ T8188] ? find_held_lock+0x35/0x130 [ 84.797909][ T8188] ? add_timer+0x463/0xbe0 [ 84.802367][ T8188] sctp_outq_flush+0xe8/0x2780 [ 84.807160][ T8188] ? mark_held_locks+0xa4/0xf0 [ 84.811959][ T8188] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 84.817802][ T8188] ? add_timer+0x463/0xbe0 [ 84.822243][ T8188] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 84.828086][ T8188] ? lockdep_hardirqs_on+0x418/0x5d0 [ 84.833402][ T8188] ? trace_hardirqs_on+0x67/0x230 [ 84.838478][ T8188] ? __sctp_outq_teardown+0xc60/0xc60 [ 84.843891][ T8188] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 84.850181][ T8188] ? sctp_outq_tail+0x68c/0x930 [ 84.855085][ T8188] sctp_outq_uncork+0x6c/0x80 [ 84.859795][ T8188] sctp_do_sm+0x559/0x53e0 [ 84.864257][ T8188] ? sctp_do_8_2_transport_strike.isra.0+0x940/0x940 [ 84.870982][ T8188] ? __local_bh_enable_ip+0x15a/0x270 [ 84.876398][ T8188] ? lock_downgrade+0x880/0x880 [ 84.881292][ T8188] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 84.887576][ T8188] ? kasan_check_read+0x11/0x20 [ 84.892476][ T8188] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 84.898751][ T8188] ? sctp_hash_transport+0x10b/0x18d0 [ 84.904181][ T8188] ? memcpy+0x46/0x50 [ 84.908199][ T8188] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 84.914481][ T8188] ? sctp_assoc_set_primary+0x274/0x310 [ 84.920066][ T8188] sctp_primitive_ASSOCIATE+0x9d/0xd0 [ 84.925484][ T8188] __sctp_connect+0x8cd/0xce0 [ 84.930207][ T8188] ? sctp_sendmsg_to_asoc+0x17b0/0x17b0 [ 84.935789][ T8188] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 84.942071][ T8188] ? sctp_get_port+0x10e/0x180 [ 84.946881][ T8188] ? sctp_get_port_local+0x1670/0x1670 [ 84.952386][ T8188] ? __local_bh_enable_ip+0x15a/0x270 [ 84.957793][ T8188] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 84.963896][ T8188] sctp_inet_connect+0x2a2/0x350 [ 84.968885][ T8188] __sys_connect+0x266/0x330 [ 84.973531][ T8188] ? __ia32_sys_accept+0xb0/0xb0 [ 84.978589][ T8188] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 84.984870][ T8188] ? put_timespec64+0xda/0x140 [ 84.989681][ T8188] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 84.995198][ T8188] ? trace_hardirqs_on_thunk+0x1a/0x1c