Warning: Permanently added '10.128.0.90' (ECDSA) to the list of known hosts. 2019/12/04 04:20:24 fuzzer started 2019/12/04 04:20:26 dialing manager at 10.128.0.26:39159 2019/12/04 04:20:26 syscalls: 2689 2019/12/04 04:20:26 code coverage: enabled 2019/12/04 04:20:26 comparison tracing: enabled 2019/12/04 04:20:26 extra coverage: extra coverage is not supported by the kernel 2019/12/04 04:20:26 setuid sandbox: enabled 2019/12/04 04:20:26 namespace sandbox: enabled 2019/12/04 04:20:26 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/04 04:20:26 fault injection: enabled 2019/12/04 04:20:26 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/04 04:20:26 net packet injection: enabled 2019/12/04 04:20:26 net device setup: enabled 2019/12/04 04:20:26 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/12/04 04:20:26 devlink PCI setup: PCI device 0000:00:10.0 is not available 04:23:13 executing program 0: writev(0xffffffffffffffff, 0x0, 0x0) unshare(0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = creat(&(0x7f00000003c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x44000) fallocate(r1, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000001, &(0x7f00000001c0)=0x0) io_submit(r2, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x804000000000000, 0x0, 0x8, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) write$P9_RRENAMEAT(r0, 0x0, 0x0) 04:23:13 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=""/4096, 0x1000}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) ftruncate(r0, 0x1000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x2dc) fcntl$getown(0xffffffffffffffff, 0x9) gettid() r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/de\x04\x00\x00\x00\x00x\x10', 0x4103, 0x0) writev(r2, &(0x7f00000023c0), 0x1000000000000252) creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) r3 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) setresuid(0x0, 0x0, 0x0) pipe(&(0x7f00000003c0)) socketpair$unix(0x1, 0x2, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0x1) fstat(0xffffffffffffffff, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x101080, 0x0) fstat(0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x881, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0xfffffefffffff7be, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000100), 0x0) syzkaller login: [ 246.695694][ T8958] IPVS: ftp: loaded support on port[0] = 21 [ 246.851596][ T8958] chnl_net:caif_netlink_parms(): no params data found [ 246.906057][ T8958] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.914217][ T8958] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.923049][ T8958] device bridge_slave_0 entered promiscuous mode [ 246.932357][ T8958] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.941247][ T8958] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.949822][ T8958] device bridge_slave_1 entered promiscuous mode [ 246.975746][ T8958] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 246.977721][ T8961] IPVS: ftp: loaded support on port[0] = 21 [ 246.991095][ T8958] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 04:23:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) dup2(r0, r1) [ 247.020717][ T8958] team0: Port device team_slave_0 added [ 247.048129][ T8958] team0: Port device team_slave_1 added [ 247.136882][ T8958] device hsr_slave_0 entered promiscuous mode [ 247.213040][ T8958] device hsr_slave_1 entered promiscuous mode 04:23:13 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x50, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 247.292484][ T8963] IPVS: ftp: loaded support on port[0] = 21 [ 247.447000][ T8958] netdevsim netdevsim0 netdevsim0: renamed from eth0 04:23:14 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x4, 0x4, 0x80000000004, 0xe657}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) [ 247.526444][ T8958] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 247.613667][ T8958] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 247.686265][ T8958] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 247.746375][ T8961] chnl_net:caif_netlink_parms(): no params data found [ 247.768125][ T8966] IPVS: ftp: loaded support on port[0] = 21 [ 247.808949][ T8968] IPVS: ftp: loaded support on port[0] = 21 04:23:14 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000001c0)='sched\x00') r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x88001) sendfile(r0, r3, 0x0, 0x800000000024) [ 247.956220][ T8963] chnl_net:caif_netlink_parms(): no params data found [ 247.984815][ T8961] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.991903][ T8961] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.013623][ T8961] device bridge_slave_0 entered promiscuous mode [ 248.034892][ T8961] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.041975][ T8961] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.050516][ T8961] device bridge_slave_1 entered promiscuous mode [ 248.109524][ T8961] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 248.123024][ T8961] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 248.174062][ T8961] team0: Port device team_slave_0 added [ 248.180045][ T8963] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.187439][ T8963] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.195392][ T8963] device bridge_slave_0 entered promiscuous mode [ 248.203255][ T8963] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.210308][ T8963] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.218089][ T8963] device bridge_slave_1 entered promiscuous mode [ 248.232433][ T8972] IPVS: ftp: loaded support on port[0] = 21 [ 248.240706][ T8961] team0: Port device team_slave_1 added [ 248.346323][ T8961] device hsr_slave_0 entered promiscuous mode [ 248.412896][ T8961] device hsr_slave_1 entered promiscuous mode [ 248.482825][ T8961] debugfs: Directory 'hsr0' with parent '/' already present! [ 248.501113][ T8963] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 248.562128][ T8963] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 248.581180][ T8958] 8021q: adding VLAN 0 to HW filter on device bond0 [ 248.589233][ T8966] chnl_net:caif_netlink_parms(): no params data found [ 248.599964][ T8968] chnl_net:caif_netlink_parms(): no params data found [ 248.666198][ T8963] team0: Port device team_slave_0 added [ 248.674293][ T8963] team0: Port device team_slave_1 added [ 248.713971][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 248.722329][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 248.757138][ T8966] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.764445][ T8966] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.772197][ T8966] device bridge_slave_0 entered promiscuous mode [ 248.782011][ T8958] 8021q: adding VLAN 0 to HW filter on device team0 [ 248.801912][ T8961] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 248.871972][ T8966] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.879686][ T8966] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.888261][ T8966] device bridge_slave_1 entered promiscuous mode [ 248.909102][ T8968] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.916862][ T8968] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.924736][ T8968] device bridge_slave_0 entered promiscuous mode [ 248.933354][ T8961] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 249.036011][ T8963] device hsr_slave_0 entered promiscuous mode [ 249.073088][ T8963] device hsr_slave_1 entered promiscuous mode [ 249.123093][ T8963] debugfs: Directory 'hsr0' with parent '/' already present! [ 249.144607][ T8968] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.151862][ T8968] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.160695][ T8968] device bridge_slave_1 entered promiscuous mode [ 249.168158][ T8961] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 249.222687][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 249.231424][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 249.240110][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.247382][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.255444][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 249.264556][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 249.273362][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.280426][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.288095][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 249.299200][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 249.308502][ T8966] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 249.320673][ T8966] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 249.337018][ T8961] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 249.459146][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 249.468188][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 249.477312][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 249.487803][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 249.496646][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 249.526615][ T8968] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 249.541234][ T8968] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 249.551879][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 249.560156][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 249.568896][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 249.577658][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 249.586238][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 249.599530][ T8958] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 249.609486][ T8966] team0: Port device team_slave_0 added [ 249.617526][ T8966] team0: Port device team_slave_1 added [ 249.648629][ T8972] chnl_net:caif_netlink_parms(): no params data found [ 249.676723][ T8963] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 249.726082][ T8963] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 249.778217][ T8968] team0: Port device team_slave_0 added [ 249.791586][ T8968] team0: Port device team_slave_1 added [ 249.855881][ T8966] device hsr_slave_0 entered promiscuous mode [ 249.904041][ T8966] device hsr_slave_1 entered promiscuous mode [ 249.943315][ T8966] debugfs: Directory 'hsr0' with parent '/' already present! [ 249.951024][ T8963] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 250.008106][ T8963] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 250.114108][ T8958] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 250.177479][ T8968] device hsr_slave_0 entered promiscuous mode [ 250.233034][ T8968] device hsr_slave_1 entered promiscuous mode [ 250.282775][ T8968] debugfs: Directory 'hsr0' with parent '/' already present! [ 250.294115][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 250.302004][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 250.311390][ T8972] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.318998][ T8972] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.328043][ T8972] device bridge_slave_0 entered promiscuous mode [ 250.338388][ T8972] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.345564][ T8972] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.353411][ T8972] device bridge_slave_1 entered promiscuous mode [ 250.407701][ T8972] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 250.444651][ T8972] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 250.460144][ T8966] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 250.507578][ T8966] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 250.569645][ T8966] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 250.625503][ T8966] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 250.711808][ T8968] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 250.798008][ T8961] 8021q: adding VLAN 0 to HW filter on device bond0 [ 250.819938][ T8972] team0: Port device team_slave_0 added [ 250.826948][ T8968] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 250.878285][ T8968] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 250.931737][ T8968] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 250.994832][ T8972] team0: Port device team_slave_1 added [ 251.085995][ T8972] device hsr_slave_0 entered promiscuous mode [ 251.142971][ T8972] device hsr_slave_1 entered promiscuous mode [ 251.183120][ T8972] debugfs: Directory 'hsr0' with parent '/' already present! [ 251.199257][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 251.208763][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 251.226252][ T8961] 8021q: adding VLAN 0 to HW filter on device team0 [ 251.275983][ T8963] 8021q: adding VLAN 0 to HW filter on device bond0 [ 251.305819][ T2724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 251.315466][ T2724] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 04:23:17 executing program 0: [ 251.324560][ T2724] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.331809][ T2724] bridge0: port 1(bridge_slave_0) entered forwarding state [ 251.341053][ T2724] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 251.351465][ T2724] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 251.360273][ T2724] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.367433][ T2724] bridge0: port 2(bridge_slave_1) entered forwarding state 04:23:17 executing program 0: [ 251.378444][ T2724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 251.387996][ T2724] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 251.397207][ T2724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 251.412965][ T2724] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 04:23:18 executing program 0: [ 251.468017][ T8976] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 251.484455][ T8976] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 251.500756][ T8976] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 251.509937][ T8976] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 04:23:18 executing program 0: [ 251.560373][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 251.572344][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 251.587863][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 251.597030][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 04:23:18 executing program 0: [ 251.607753][ T8963] 8021q: adding VLAN 0 to HW filter on device team0 [ 251.624704][ T8966] 8021q: adding VLAN 0 to HW filter on device bond0 [ 251.637473][ T8961] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 251.650395][ T8961] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 04:23:18 executing program 0: [ 251.695874][ T8986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 251.705698][ T8986] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 251.717036][ T8986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 251.727107][ T8986] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 251.737076][ T8986] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.744528][ T8986] bridge0: port 1(bridge_slave_0) entered forwarding state [ 251.745261][ T8986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 251.760706][ T8986] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 251.779258][ T8986] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.786440][ T8986] bridge0: port 2(bridge_slave_1) entered forwarding state 04:23:18 executing program 0: [ 251.804619][ T8966] 8021q: adding VLAN 0 to HW filter on device team0 [ 251.825926][ T8972] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 251.883206][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 251.894448][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 251.903554][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 251.911886][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 251.922020][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 251.942840][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 251.963619][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 251.972242][ T8970] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.982506][ T8970] bridge0: port 1(bridge_slave_0) entered forwarding state [ 251.991132][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 252.000132][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 252.008623][ T8970] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.015748][ T8970] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.025025][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 252.037246][ T8972] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 252.105994][ T8972] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 252.166091][ T8972] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 252.215376][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 252.224700][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 252.232206][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 252.242093][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 252.259002][ T8961] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 252.286083][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 252.294399][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 252.304634][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 252.313671][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 252.322544][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 252.331380][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 252.345679][ T8968] 8021q: adding VLAN 0 to HW filter on device bond0 [ 252.368622][ T8963] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 252.395373][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 252.405238][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 252.414073][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 252.423413][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 252.432258][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 252.441344][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 252.474869][ T8963] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 252.489705][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 252.499024][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 252.507726][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 252.517334][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 252.525429][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 252.534899][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 252.549211][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 252.558500][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 252.575048][ T8966] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 252.590328][ T8966] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 252.621331][ T8968] 8021q: adding VLAN 0 to HW filter on device team0 [ 252.637044][ C0] hrtimer: interrupt took 28250 ns [ 252.658596][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 252.668316][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 252.791818][ T8966] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 252.800467][ T8976] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 252.814639][ T8976] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 252.833750][ T8976] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.840905][ T8976] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.861056][ T8976] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 252.868768][ T8976] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 04:23:19 executing program 1: 04:23:19 executing program 0: [ 252.909169][ T8972] 8021q: adding VLAN 0 to HW filter on device bond0 [ 252.958890][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 252.978318][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 253.008914][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.018308][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.025950][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.034507][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 253.059497][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 253.089448][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 253.099683][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 253.112098][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 253.159632][ T2724] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 253.178060][ T2724] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 253.193471][ T2724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 253.202250][ T2724] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 253.226110][ T2724] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 253.234871][ T2724] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 253.246950][ T8968] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 253.267274][ T8972] 8021q: adding VLAN 0 to HW filter on device team0 [ 253.274845][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 253.288299][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 253.311473][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 253.320244][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 253.337369][ T8968] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 253.352033][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 253.361528][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 04:23:19 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x50, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 253.377504][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.384669][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.428146][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 253.441669][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 253.452465][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.471109][ T8970] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.478762][ T8970] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.494129][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 253.508551][ T8970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 253.546606][ T2724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 253.558699][ T2724] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 253.568183][ T2724] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 253.579548][ T2724] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 253.589205][ T2724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 253.598109][ T2724] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 253.614833][ T2724] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 253.624833][ T2724] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 253.637371][ T8972] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 253.654496][ T2724] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 253.692481][ T8972] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 253.709006][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 253.723038][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 04:23:20 executing program 0: 04:23:20 executing program 5: 04:23:20 executing program 4: 04:23:20 executing program 1: 04:23:20 executing program 2: 04:23:20 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x50, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:23:20 executing program 0: 04:23:20 executing program 2: 04:23:20 executing program 1: 04:23:20 executing program 4: 04:23:20 executing program 0: 04:23:20 executing program 4: 04:23:20 executing program 5: 04:23:20 executing program 2: 04:23:20 executing program 0: 04:23:20 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x50, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:23:20 executing program 1: 04:23:20 executing program 4: 04:23:20 executing program 0: 04:23:20 executing program 2: 04:23:20 executing program 5: 04:23:21 executing program 1: 04:23:21 executing program 4: 04:23:21 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 04:23:21 executing program 0: 04:23:21 executing program 5: 04:23:21 executing program 1: 04:23:21 executing program 2: 04:23:21 executing program 4: 04:23:21 executing program 5: 04:23:21 executing program 0: 04:23:21 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 04:23:21 executing program 1: 04:23:21 executing program 4: 04:23:21 executing program 2: 04:23:21 executing program 0: 04:23:21 executing program 5: 04:23:21 executing program 1: 04:23:21 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 04:23:21 executing program 4: 04:23:21 executing program 2: 04:23:21 executing program 0: 04:23:21 executing program 5: 04:23:21 executing program 1: 04:23:22 executing program 2: 04:23:22 executing program 4: 04:23:22 executing program 0: 04:23:22 executing program 5: 04:23:22 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x50, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) 04:23:22 executing program 1: 04:23:22 executing program 4: 04:23:22 executing program 2: 04:23:22 executing program 0: 04:23:22 executing program 1: 04:23:22 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x50, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) 04:23:22 executing program 4: 04:23:22 executing program 2: 04:23:22 executing program 5: 04:23:22 executing program 0: 04:23:22 executing program 4: 04:23:22 executing program 2: 04:23:22 executing program 1: 04:23:22 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x50, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) 04:23:22 executing program 5: 04:23:22 executing program 0: 04:23:22 executing program 4: 04:23:22 executing program 2: 04:23:22 executing program 3: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x50, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:23:22 executing program 1: 04:23:22 executing program 4: 04:23:22 executing program 5: 04:23:23 executing program 0: 04:23:23 executing program 1: 04:23:23 executing program 2: 04:23:23 executing program 3: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x50, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:23:23 executing program 4: 04:23:23 executing program 1: 04:23:23 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b800000019000100000206005b000000ff010000000000000000000000000001e000000100000000800000000000000000000000000000000a0001000000002e", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000fbbccf810000000000000000fd85d16e79bad40ac3794899000000000000000000000000000000d94bfeadbfce0d4ed6f71b242b42000000ea0000040000000000000000e1e8154f707c51bf00000000000000000800000000000000000000e6010000000100000000002000"], 0xb8}}, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) clock_getres(0xa, &(0x7f0000000040)) 04:23:23 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f00000000c0)="240000001e005f0c14fffffffffffff8070000000000000000000000080007000c000000", 0x24) ioctl$MON_IOCT_RING_SIZE(0xffffffffffffffff, 0x9204, 0xfbc58) 04:23:23 executing program 3: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x50, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:23:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x808, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000340)=0x800000001ff, 0x10000038f) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x674f, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='scalable\x00', 0x9) 04:23:23 executing program 1: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000380)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) request_key(&(0x7f0000000980)='dns_resolver\x00', 0x0, &(0x7f0000000880)='./cgroup.net/syz1\x00', r0) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, r2) r4 = add_key$keyring(0x0, &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r3) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) r6 = memfd_create(&(0x7f0000000540)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000800)={0xa, 0x200, 0x0, @remote, 0x4}, 0x1c) ioctl$VIDIOC_SUBDEV_S_SELECTION(0xffffffffffffffff, 0xc040563e, &(0x7f0000000180)={0x3, 0x0, 0x101, 0x1, {0x4, 0x0, 0x80000000, 0x3}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x18, 0x0, &(0x7f0000000080)) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x41c1, 0x20000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$sndpcmp(&(0x7f0000000940)='?dev/a5\xc8\xb3x\xac\xeb\v#R\xb8\x9a\xa2', 0x200000, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f00000004c0)={&(0x7f00000009c0)={0x14, 0xb3, 0x8, 0x70bd2c, 0x0, {0x55}}, 0x14}, 0x1, 0x0, 0x0, 0x4048024}, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f00000007c0)=ANY=[@ANYBLOB="00140001ea8d6b74644a1e693de9193f2d"], 0x12) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) r11 = fsmount(r8, 0x1, 0x56280bfed87abe90) pwritev(r6, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) write(0xffffffffffffffff, &(0x7f0000cc2fed)="130000003e0005ffffe3ffbd000026180a3f02", 0x13) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @empty, @local}, &(0x7f00000003c0)=0xc) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) r12 = socket$inet(0xa, 0x801, 0x84) connect$inet(r12, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) ioctl$SIOCGSTAMPNS(r12, 0x8907, 0x0) listen(r12, 0x100000001) r13 = accept4(r12, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r13, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef}, 0xb) recvmmsg(r13, &(0x7f0000004300), 0x3a4, 0x0, 0x0) r14 = socket$inet(0xa, 0x801, 0x84) connect$inet(r14, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) ioctl$SIOCGSTAMPNS(r14, 0x8907, 0x0) listen(r14, 0x100000001) accept4(r14, 0x0, 0x0, 0x0) r15 = socket$inet(0xa, 0x801, 0x84) connect$inet(r15, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) ioctl$SIOCGSTAMPNS(r15, 0x8907, 0x0) listen(r15, 0x100000001) r16 = accept4(r15, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r16, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef}, 0xb) recvmmsg(r16, &(0x7f0000004300), 0x3a4, 0x0, 0x0) r17 = socket$inet(0xa, 0x801, 0x84) connect$inet(r17, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) ioctl$SIOCGSTAMPNS(r17, 0x8907, 0x0) listen(r17, 0x100000001) r18 = accept4(r17, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r18, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef}, 0xb) recvmmsg(r18, &(0x7f0000004300), 0x3a4, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRES64=r5, @ANYRESHEX, @ANYRESDEC=r13, @ANYRES64, @ANYRESOCT=r11, @ANYBLOB="712c9526fd2ea8f76f90e00d03c9014ae008f0170e3f020380626e75ed454061c94f3281baeb9ebb383981", @ANYRES16=r10, @ANYPTR64, @ANYRES16, @ANYRES64], @ANYRESHEX, @ANYPTR=&(0x7f0000000a00)=ANY=[@ANYRESOCT, @ANYRES16, @ANYBLOB="3688d5e01b64383aa8644b45104fb0262a624718335bdb583610277ffc335d03e5be7fcda4fa2593e8283a0596e80ad5a6d8", @ANYRESHEX=r14, @ANYRES64, @ANYRES16, @ANYRESOCT=r16, @ANYPTR, @ANYRES32=r7, @ANYRESDEC=r18]]], 0x8) sendfile(r5, r5, 0x0, 0x40fdf) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x14) [ 256.907205][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:23:23 executing program 2: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x4048000) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = dup2(r0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r2, 0xc0a85322, &(0x7f0000000080)) connect$rxrpc(r1, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x4048000) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp1\x00', 0x10000, 0x0) close(r1) 04:23:23 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x50, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:23:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000200)) msgget$private(0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xa) r4 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r5) getuid() r6 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r7) setreuid(r2, r2) r8 = socket$inet(0xa, 0x801, 0x84) connect$inet(r8, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) ioctl$SIOCGSTAMPNS(r8, 0x8907, 0x0) listen(r8, 0x100000001) r9 = accept4(r8, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r9, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef}, 0xb) recvmmsg(r9, &(0x7f0000004300), 0x3a4, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r9, 0x29, 0x23, &(0x7f0000000100)={{{@in=@broadcast, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@local}}, &(0x7f0000000240)=0xe8) r11 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r12) r13 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r14) r15 = getuid() r16 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r17) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, r18}, 0xc) getegid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r20 = socket$inet(0xa, 0x801, 0x84) connect$inet(r20, &(0x7f0000004cc0)={0x2, 0x0, @rand_addr=0x5}, 0x10) ioctl$SIOCGSTAMPNS(r20, 0x8907, 0x0) listen(r20, 0x100000001) accept4(r20, 0x0, 0x0, 0x0) fstat(r20, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r22 = socket$inet(0xa, 0x801, 0x84) connect$inet(r22, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) ioctl$SIOCGSTAMPNS(r22, 0x8907, 0x0) listen(r22, 0x100000001) accept4(r22, 0x0, 0x0, 0x0) fstat(r22, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, r24}, 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, r25}, 0xc) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000005c0)={{}, {}, [{0x2, 0x0, r2}, {0x2, 0x1, r10}, {0x2, 0x3, r12}, {0x2, 0x4, r14}, {0x2, 0x6, r15}, {0x2, 0x5, r17}], {0x4, 0x2}, [{0x8, 0x2, r18}, {0x8, 0x1, r25}, {0x8, 0x8, r19}, {0x8, 0x1, r21}, {0x8, 0x1}, {0x8, 0x6, r3}, {0x8, 0x0, r23}, {0x8, 0x2, r24}], {0x10, 0x1}, {0x20, 0x1}}, 0x94, 0x3) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r26 = accept4(r0, 0x0, 0x0, 0x0) r27 = socket$inet(0xa, 0x801, 0x84) connect$inet(r27, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) ioctl$SIOCGSTAMPNS(r27, 0x8907, 0x0) listen(r27, 0x100000001) accept4(r27, 0x0, 0x0, 0x0) r28 = accept4(r27, &(0x7f0000000680)=@hci, &(0x7f0000000700)=0x80, 0x80000) setsockopt$ALG_SET_KEY(r28, 0x117, 0x1, &(0x7f0000000480)='.\nWu', 0xfe7d) fcntl$setstatus(r26, 0x4, 0xa1a3f945407a2941) r29 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r26, r29, 0x0, 0x10000000000443) 04:23:23 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x3e) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$binfmt_script(r0, &(0x7f0000002ec0)={'#! ', './file0'}, 0xb) 04:23:23 executing program 5: prctl$PR_SET_UNALIGN(0x6, 0x1) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xfffffffffffffffc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) connect$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x100) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="000000f21301ce646ba1a34578d3abdf1e155667018001a0da9671"], 0x1}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) ioctl$NS_GET_NSTYPE(0xffffffffffffffff, 0xb703, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x101], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$netlink(0x10, 0x3, 0x0) 04:23:23 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x50, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:23:23 executing program 2: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6e217b91c3b0d873722b41a118fd58fa1f0a39ad9582203daa32c9831699acc52f141eeca2bd12d2f6fb54e5bff40e062a43f80b1babfd076d2502892250deee2728316e63e589ddf142e89365bd48cf76602c6f6aa76bc37284732bd1e191ddd3c9f310f827c195f3c4957c67a08466517ba136c8c9e01000000f8ffffffffffffff3e26b5ca26bb434dbd0e5085c294e577bb081876e63e7c2834533925db8b54b33da7b947aefca1f9c49c648d58d4f944264fcace71d5c798cd3c13d7083a7eb4c526e072a23bd24cccb38e4eff542520858c940fbb95979a564d73a7af107fd5ddaa491838873914a467c3ce28056833eb4559864317c0a1dac92d090f4f9093679791a2840f2851324acdf44a807e69a1bc25d265303004e8ead128a3d61c0063233501cfdf76d99dbc46b9c00203a9161b8a444001c386475c432c7a6e898885429063954ea0bdf9abc7b9322f3485d99ab38a3231ea08584795647ddb75c593933ef3e588824acdab292482735cd91572d0bc3f95b61e039183f5ed7cb75f2ba79296f73ca6f00a0f6ce5c2bc03957a77dbd229921124580fc4ddd4aa3f3752c7f2dca3da2ba7b772e01215f05dc1cf74ddf51af1a4ebba443374e09d5ff96db1a1a60368493ff3"], 0x18}}], 0x1, 0x4048000) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = dup2(r0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r2, 0xc0a85322, &(0x7f0000000080)) connect$rxrpc(r1, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6e217b91c3b0d873722b41a118fd58fa1f0a39ad9582203daa32c9831699acc52f141eeca2bd12d2f6fb54e5bff40e062a43f80b1babfd076d2502892250deee2728316e63e589ddf142e89365bd48cf76602c6f6aa76bc37284732bd1e191ddd3c9f310f827c195f3c4957c67a08466517ba136c8c9e01000000f8ffffffffffffff3e26b5ca26bb434dbd0e5085c294e577bb081876e63e7c2834533925db8b54b33da7b947aefca1f9c49c648d58d4f944264fcace71d5c798cd3c13d7083a7eb4c526e072a23bd24cccb38e4eff542520858c940fbb95979a564d73a7af107fd5ddaa491838873914a467c3ce28056833eb4559864317c0a1dac92d090f4f9093679791a2840f2851324acdf44a807e69a1bc25d265303004e8ead128a3d61c0063233501cfdf76d99dbc46b9c00203a9161b8a444001c386475c432c7a6e898885429063954ea0bdf9abc7b9322f3485d99ab38a3231ea08584795647ddb75c593933e824acdab292482735cd91572d0bc3f95b61e039183f5ed7cb75f2ba79296f73ca6f00a0f6ce5c2bc03957a77dbd229921124580fc4ddd4aa3f3752c7f2dca3da2ba7b772e01215f05dc1cf74ddf51af1a4ebba443374e09d5ff96db1a1a60368493ff364315b"], 0x18}}], 0x1, 0x4048000) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp1\x00', 0x10000, 0x0) close(r1) [ 257.463372][ T9249] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 04:23:24 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x50, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:23:24 executing program 4: r0 = getpid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x3f, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) pipe(&(0x7f0000000300)) close(0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r3, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='o/k\x8dm\x00\x03\x00', 0x2001, 0x0) ppoll(&(0x7f0000000780)=[{}, {0xffffffffffffffff, 0x13}], 0x2, 0x0, 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x82, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000c18000), 0x0) accept4(0xffffffffffffffff, &(0x7f0000000340)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, &(0x7f00000005c0)=0x80, 0x2c0f134d13d1f0d1) syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x82, 0x0) ppoll(&(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES64=r0, @ANYPTR, @ANYRES64, @ANYRES16=0x0], 0x31) dup(0xffffffffffffffff) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x400000, 0x0) 04:23:24 executing program 1: rseq(&(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0xa30000, 0xa30000}, 0x7}, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) listen(r0, 0x100000001) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef}, 0xb) recvmmsg(r1, &(0x7f0000004300), 0x3a4, 0x0, 0x0) r2 = socket$inet(0xa, 0x801, 0x84) connect$inet(r2, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) ioctl$SIOCGSTAMPNS(r2, 0x8907, 0x0) listen(r2, 0x100000001) accept4(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x3, 0x70, 0x81, 0xca, 0x2d, 0x4, 0x0, 0xe2, 0x4, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xf1, 0x6, @perf_config_ext={0x0, 0x7f}, 0x100, 0xfffffffffffffff9, 0x3, 0x3, 0x0, 0x3ff, 0x6}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) r3 = socket$inet(0xa, 0x801, 0x84) connect$inet(r3, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) ioctl$SIOCGSTAMPNS(r3, 0x8907, 0x0) listen(r3, 0x100000001) accept4(r3, 0x0, 0x0, 0x0) r4 = socket$inet(0xa, 0x801, 0x84) connect$inet(r4, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) ioctl$SIOCGSTAMPNS(r4, 0x8907, 0x0) listen(r4, 0x100000001) r5 = accept4(r4, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r5, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef}, 0xb) recvmmsg(r5, &(0x7f0000004300), 0x3a4, 0x0, 0x0) r6 = socket$inet(0xa, 0x801, 0x84) connect$inet(r6, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) ioctl$SIOCGSTAMPNS(r6, 0x8907, 0x0) listen(r6, 0x100000001) r7 = accept4(r6, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r7, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef}, 0xb) recvmmsg(r7, &(0x7f0000004300), 0x3a4, 0x0, 0x0) accept$nfc_llcp(r7, &(0x7f00000001c0), &(0x7f0000000000)=0x60) r8 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000040)='\x00\x00\x00\x00H') 04:23:24 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x50, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:23:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000003380)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>\x9b\x94a\xac\xf8R?\x1c\xe2\xb5!\xfa\xcb\xd4\xb6\xe1_\xb4d>\xf6\xb7h\xb9Uql\b\xa3l\x9a\xc9\'\x14\xd5+\xb1\xa6\xf5\x9e\xd1\xea%\xd8l\xae\xd6\\dZ\x17/\xe7$(\x8ax\xdc\xc4\xb7\xa4\x9b\x92\xd8\x16Lz\x9e\xfc\xf8\xf1\xdc\xb9+F~%\x16e\x81\x1b\x11vw1:\xdd]\xb9\xe8\x99\xea\xd1O\x83\xf3WA\xad\xaa\xdc\r~[I\x9f\xac\x03\xf9\xe2\x12Je\xe9$\xd2\x00\xef\r\xbbQ2\xa1T4\xb4\x116RO+\x0e\x98\x8b\x1b\xc1\x81\xf0U\x93\xd1\xf7\xbb}N\'\xea\x8f\xbbdd\xda\xb5\x7f\xff\xef\xfd\xd5\x9b\x01?\xad \xa8\xe3l\x86\"\x94M\xd5\xfa]\x9f\x1d\xad\xf9y\xfc\x03=$Z\x00Oa#`qHd\xcc\x8f\x80\xa1\xed\x81 \x85\xe7\x1f\x99\xbe\xe8\xe5\xcey\n\xab\x8b\xa0yM\xba\xcf7}\x8eVQ\xe6d.S\x9e\xb1\x98\xd9\xc8;\xcc\xd5\xf2)\xf7Zh)\xffF\xb8\xc7\xd2%\xcd\xc7\x05\xefq\\\x97]\xd7\x1b\xdf\"o\xca\xd4\xe0\xd5\x125\xefz1\xcc\xe1nZ\xbe\x16\xa1\x8f\xc8)9\xb8\xc6\xc2\xdd8.*U\xe0\xc5\x04\x00\xd9\xfd{ZT\xf2\xe4\xb9\x95x\xa5\xbd\x04\x0f\x8eky\xd8\x8e\xd77p\n\x11\x13)\x9b\xf3D\xb2\x88*(\x02{\xb2`:\x01\x00\x00\x00\x00\x00\x00\xee\xff\xff\xffV2\xaa\x82', 0x0) sendfile(r5, r2, 0x0, 0x40d2) r6 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r7 = openat$cgroup_ro(r6, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r8, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r8, &(0x7f0000000080)={0xfffffffffffffd57}, 0xfdd7) ioctl$BLKROTATIONAL(r8, 0x127e, &(0x7f0000000580)) fallocate(r7, 0x24, 0xff, 0x6) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) r9 = openat$cgroup_procs(r4, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r9, &(0x7f0000000100), 0x12) [ 258.448651][ T9311] ================================================================== [ 258.448827][ T9311] BUG: KASAN: slab-out-of-bounds in vcs_scr_readw+0xc2/0xd0 [ 258.448842][ T9311] Read of size 2 at addr ffff8880a3e5d2c0 by task syz-executor.1/9311 [ 258.448846][ T9311] [ 258.448863][ T9311] CPU: 0 PID: 9311 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 258.448873][ T9311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.448906][ T9311] Call Trace: [ 258.448973][ T9311] dump_stack+0x197/0x210 [ 258.448989][ T9311] ? vcs_scr_readw+0xc2/0xd0 [ 258.449036][ T9311] print_address_description.constprop.0.cold+0xd4/0x30b [ 258.449049][ T9311] ? vcs_scr_readw+0xc2/0xd0 [ 258.449063][ T9311] ? vcs_scr_readw+0xc2/0xd0 [ 258.449079][ T9311] __kasan_report.cold+0x1b/0x41 [ 258.449096][ T9311] ? vcs_scr_readw+0xc2/0xd0 [ 258.449115][ T9311] kasan_report+0x12/0x20 [ 258.449132][ T9311] __asan_report_load2_noabort+0x14/0x20 [ 258.449146][ T9311] vcs_scr_readw+0xc2/0xd0 [ 258.449180][ T9311] vcs_write+0x646/0xcf0 [ 258.449218][ T9311] ? rcu_read_lock_held+0x9c/0xb0 [ 258.449243][ T9311] ? vcs_size+0x250/0x250 [ 258.449310][ T9311] ? apparmor_file_permission+0x25/0x30 [ 258.449362][ T9311] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 258.449414][ T9311] ? security_file_permission+0x8f/0x380 [ 258.449451][ T9311] __vfs_write+0x8a/0x110 [ 258.449464][ T9311] ? vcs_size+0x250/0x250 [ 258.449481][ T9311] vfs_write+0x268/0x5d0 [ 258.449499][ T9311] ksys_write+0x14f/0x290 [ 258.449517][ T9311] ? __ia32_sys_read+0xb0/0xb0 [ 258.449580][ T9311] ? do_syscall_64+0x26/0x790 [ 258.449620][ T9311] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 258.449636][ T9311] ? do_syscall_64+0x26/0x790 [ 258.449658][ T9311] __x64_sys_write+0x73/0xb0 [ 258.449677][ T9311] do_syscall_64+0xfa/0x790 [ 258.449699][ T9311] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 258.449711][ T9311] RIP: 0033:0x45a679 [ 258.449729][ T9311] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 258.449741][ T9311] RSP: 002b:00007f986f6f2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 258.449757][ T9311] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a679 [ 258.449767][ T9311] RDX: 000000000000fdd7 RSI: 0000000020000080 RDI: 000000000000000c [ 258.449776][ T9311] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 258.449786][ T9311] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f986f6f36d4 [ 258.449795][ T9311] R13: 00000000004cb7cd R14: 00000000004e5188 R15: 00000000ffffffff [ 258.449817][ T9311] [ 258.449847][ T9311] Allocated by task 1: [ 258.449861][ T9311] save_stack+0x23/0x90 [ 258.449875][ T9311] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 258.449886][ T9311] kasan_kmalloc+0x9/0x10 [ 258.449919][ T9311] __kmalloc+0x163/0x770 [ 258.449930][ T9311] vc_do_resize+0x262/0x1460 [ 258.449941][ T9311] vc_resize+0x4d/0x60 [ 258.449974][ T9311] fbcon_init+0x122d/0x1a90 [ 258.449988][ T9311] visual_init+0x30a/0x5e0 [ 258.449999][ T9311] do_bind_con_driver+0x54c/0x8b0 [ 258.450011][ T9311] do_take_over_console+0x449/0x5a0 [ 258.450025][ T9311] do_fbcon_takeover+0x116/0x220 [ 258.450041][ T9311] fbcon_fb_registered+0x275/0x340 [ 258.450054][ T9311] register_framebuffer+0x5c3/0xa10 [ 258.450086][ T9311] vga16fb_probe+0x711/0x825 [ 258.450136][ T9311] platform_drv_probe+0x8d/0x140 [ 258.450148][ T9311] really_probe+0x291/0x710 [ 258.450162][ T9311] driver_probe_device+0x110/0x220 [ 258.450176][ T9311] __device_attach_driver+0x1c9/0x230 [ 258.450189][ T9311] bus_for_each_drv+0x172/0x1f0 [ 258.450202][ T9311] __device_attach+0x237/0x390 [ 258.450216][ T9311] device_initial_probe+0x1b/0x20 [ 258.450228][ T9311] bus_probe_device+0x1f1/0x2a0 [ 258.450264][ T9311] device_add+0x14fe/0x1d00 [ 258.450277][ T9311] platform_device_add+0x34d/0x6c0 [ 258.450351][ T9311] vga16fb_init+0x15f/0x1d6 [ 258.450365][ T9311] do_one_initcall+0x120/0x81a [ 258.450421][ T9311] kernel_init_freeable+0x4ca/0x5b9 [ 258.450440][ T9311] kernel_init+0x12/0x1bf [ 258.450453][ T9311] ret_from_fork+0x24/0x30 [ 258.450457][ T9311] [ 258.450462][ T9311] Freed by task 0: [ 258.450467][ T9311] (stack is not available) [ 258.450471][ T9311] [ 258.450480][ T9311] The buggy address belongs to the object at ffff8880a3e5c000 [ 258.450480][ T9311] which belongs to the cache kmalloc-8k of size 8192 [ 258.450492][ T9311] The buggy address is located 4800 bytes inside of [ 258.450492][ T9311] 8192-byte region [ffff8880a3e5c000, ffff8880a3e5e000) [ 258.450496][ T9311] The buggy address belongs to the page: [ 258.450511][ T9311] page:ffffea00028f9700 refcount:1 mapcount:0 mapping:ffff8880aa4021c0 index:0x0 compound_mapcount: 0 [ 258.450528][ T9311] raw: 00fffe0000010200 ffffea000294d708 ffffea000282f308 ffff8880aa4021c0 [ 258.450545][ T9311] raw: 0000000000000000 ffff8880a3e5c000 0000000100000001 0000000000000000 [ 258.450551][ T9311] page dumped because: kasan: bad access detected [ 258.450554][ T9311] [ 258.450559][ T9311] Memory state around the buggy address: [ 258.450570][ T9311] ffff8880a3e5d180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 258.450578][ T9311] ffff8880a3e5d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 258.450587][ T9311] >ffff8880a3e5d280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 258.450593][ T9311] ^ [ 258.450602][ T9311] ffff8880a3e5d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 258.450612][ T9311] ffff8880a3e5d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 258.450616][ T9311] ================================================================== [ 258.450621][ T9311] Disabling lock debugging due to kernel taint [ 258.452142][ T9309] kobject: 'loop1' (000000009d10bf26): kobject_uevent_env [ 258.452175][ T9309] kobject: 'loop1' (000000009d10bf26): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 258.455227][ T9311] Kernel panic - not syncing: panic_on_warn set ... [ 258.455246][ T9311] CPU: 0 PID: 9311 Comm: syz-executor.1 Tainted: G B 5.4.0-syzkaller #0 [ 258.455253][ T9311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.455258][ T9311] Call Trace: [ 258.455280][ T9311] dump_stack+0x197/0x210 [ 258.455359][ T9311] panic+0x2e3/0x75c [ 258.455375][ T9311] ? add_taint.cold+0x16/0x16 [ 258.455390][ T9311] ? vcs_scr_readw+0xc2/0xd0 [ 258.455405][ T9311] ? preempt_schedule+0x4b/0x60 [ 258.455421][ T9311] ? ___preempt_schedule+0x16/0x18 [ 258.455459][ T9311] ? trace_hardirqs_on+0x5e/0x240 [ 258.455475][ T9311] ? vcs_scr_readw+0xc2/0xd0 [ 258.455489][ T9311] end_report+0x47/0x4f [ 258.455502][ T9311] ? vcs_scr_readw+0xc2/0xd0 [ 258.455515][ T9311] __kasan_report.cold+0xe/0x41 [ 258.455530][ T9311] ? vcs_scr_readw+0xc2/0xd0 [ 258.455544][ T9311] kasan_report+0x12/0x20 [ 258.455560][ T9311] __asan_report_load2_noabort+0x14/0x20 [ 258.455573][ T9311] vcs_scr_readw+0xc2/0xd0 [ 258.455586][ T9311] vcs_write+0x646/0xcf0 [ 258.455600][ T9311] ? rcu_read_lock_held+0x9c/0xb0 [ 258.455618][ T9311] ? vcs_size+0x250/0x250 [ 258.455635][ T9311] ? apparmor_file_permission+0x25/0x30 [ 258.455650][ T9311] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 258.455666][ T9311] ? security_file_permission+0x8f/0x380 [ 258.455680][ T9311] __vfs_write+0x8a/0x110 [ 258.455692][ T9311] ? vcs_size+0x250/0x250 [ 258.455705][ T9311] vfs_write+0x268/0x5d0 [ 258.455720][ T9311] ksys_write+0x14f/0x290 [ 258.455739][ T9311] ? __ia32_sys_read+0xb0/0xb0 [ 258.455755][ T9311] ? do_syscall_64+0x26/0x790 [ 258.455771][ T9311] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 258.455786][ T9311] ? do_syscall_64+0x26/0x790 [ 258.455802][ T9311] __x64_sys_write+0x73/0xb0 [ 258.455818][ T9311] do_syscall_64+0xfa/0x790 [ 258.455837][ T9311] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 258.455848][ T9311] RIP: 0033:0x45a679 [ 258.455862][ T9311] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 258.455869][ T9311] RSP: 002b:00007f986f6f2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 258.455882][ T9311] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a679 [ 258.455890][ T9311] RDX: 000000000000fdd7 RSI: 0000000020000080 RDI: 000000000000000c [ 258.455897][ T9311] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 258.455905][ T9311] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f986f6f36d4 [ 258.455913][ T9311] R13: 00000000004cb7cd R14: 00000000004e5188 R15: 00000000ffffffff [ 258.457430][ T9311] Kernel Offset: disabled [ 259.280125][ T9311] Rebooting in 86400 seconds..