[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 55.457610][ T26] audit: type=1800 audit(1573967007.060:25): pid=8625 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 55.482206][ T26] audit: type=1800 audit(1573967007.060:26): pid=8625 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 55.502624][ T26] audit: type=1800 audit(1573967007.060:27): pid=8625 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.115' (ECDSA) to the list of known hosts. 2019/11/17 05:03:39 fuzzer started 2019/11/17 05:03:40 dialing manager at 10.128.0.26:39959 2019/11/17 05:03:41 syscalls: 1044 2019/11/17 05:03:41 code coverage: enabled 2019/11/17 05:03:41 comparison tracing: enabled 2019/11/17 05:03:41 extra coverage: extra coverage is not supported by the kernel 2019/11/17 05:03:41 setuid sandbox: enabled 2019/11/17 05:03:41 namespace sandbox: enabled 2019/11/17 05:03:41 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/17 05:03:41 fault injection: enabled 2019/11/17 05:03:41 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/17 05:03:41 net packet injection: enabled 2019/11/17 05:03:41 net device setup: enabled 2019/11/17 05:03:41 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/11/17 05:03:41 devlink PCI setup: PCI device 0000:00:10.0 is not available 05:04:28 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) close(r1) socket$inet6(0xa, 0x802, 0x73) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=ANY=[@ANYBLOB="00008a0000e0ff00"], 0x8) sendmsg$unix(r1, &(0x7f0000000880)={&(0x7f00000001c0)=@abs, 0x6e, 0x0}, 0x0) 05:04:28 executing program 1: syz_init_net_socket$x25(0x9, 0x5, 0x6d41) syzkaller login: [ 117.179184][ T8791] IPVS: ftp: loaded support on port[0] = 21 [ 117.373968][ T8791] chnl_net:caif_netlink_parms(): no params data found [ 117.396204][ T8793] IPVS: ftp: loaded support on port[0] = 21 05:04:29 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind(r0, &(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80) [ 117.422001][ T8791] bridge0: port 1(bridge_slave_0) entered blocking state [ 117.429665][ T8791] bridge0: port 1(bridge_slave_0) entered disabled state [ 117.438387][ T8791] device bridge_slave_0 entered promiscuous mode [ 117.449424][ T8791] bridge0: port 2(bridge_slave_1) entered blocking state [ 117.457689][ T8791] bridge0: port 2(bridge_slave_1) entered disabled state [ 117.467187][ T8791] device bridge_slave_1 entered promiscuous mode [ 117.538734][ T8791] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 117.563144][ T8791] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 117.608223][ T8791] team0: Port device team_slave_0 added [ 117.643845][ T8791] team0: Port device team_slave_1 added [ 117.702918][ T8793] chnl_net:caif_netlink_parms(): no params data found [ 117.723814][ T8797] IPVS: ftp: loaded support on port[0] = 21 05:04:29 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x2, 0xe, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@broadcast, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000001c0), 0xfa) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 117.763207][ T8791] device hsr_slave_0 entered promiscuous mode 05:04:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0)=[@window={0x8, 0x0, 0xffff}, @sack_perm, @mss, @sack_perm, @timestamp, @sack_perm], 0x110) [ 117.910225][ T8791] device hsr_slave_1 entered promiscuous mode [ 118.008831][ T8799] IPVS: ftp: loaded support on port[0] = 21 [ 118.126433][ T8793] bridge0: port 1(bridge_slave_0) entered blocking state [ 118.134961][ T8793] bridge0: port 1(bridge_slave_0) entered disabled state [ 118.145927][ T8793] device bridge_slave_0 entered promiscuous mode [ 118.203815][ T8793] bridge0: port 2(bridge_slave_1) entered blocking state [ 118.226958][ T8793] bridge0: port 2(bridge_slave_1) entered disabled state [ 118.235531][ T8793] device bridge_slave_1 entered promiscuous mode 05:04:29 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x1000000, 0x0, 0x0) [ 118.259948][ T8791] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 118.345349][ T8791] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 118.413611][ T8791] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 118.483362][ T8791] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 118.543330][ T8793] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 118.556384][ T8793] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 118.585398][ T8801] IPVS: ftp: loaded support on port[0] = 21 [ 118.585637][ T8803] IPVS: ftp: loaded support on port[0] = 21 [ 118.618464][ T8793] team0: Port device team_slave_0 added [ 118.626396][ T8793] team0: Port device team_slave_1 added [ 118.772625][ T8797] chnl_net:caif_netlink_parms(): no params data found [ 118.852703][ T8793] device hsr_slave_0 entered promiscuous mode [ 118.900194][ T8793] device hsr_slave_1 entered promiscuous mode [ 118.940377][ T8793] debugfs: Directory 'hsr0' with parent '/' already present! [ 118.955361][ T8799] chnl_net:caif_netlink_parms(): no params data found [ 119.037041][ T8797] bridge0: port 1(bridge_slave_0) entered blocking state [ 119.046200][ T8797] bridge0: port 1(bridge_slave_0) entered disabled state [ 119.055977][ T8797] device bridge_slave_0 entered promiscuous mode [ 119.067134][ T8797] bridge0: port 2(bridge_slave_1) entered blocking state [ 119.074422][ T8797] bridge0: port 2(bridge_slave_1) entered disabled state [ 119.082566][ T8797] device bridge_slave_1 entered promiscuous mode [ 119.104703][ T8797] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 119.139129][ T8801] chnl_net:caif_netlink_parms(): no params data found [ 119.154848][ T8797] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 119.195991][ T8799] bridge0: port 1(bridge_slave_0) entered blocking state [ 119.203269][ T8799] bridge0: port 1(bridge_slave_0) entered disabled state [ 119.211347][ T8799] device bridge_slave_0 entered promiscuous mode [ 119.224314][ T8791] 8021q: adding VLAN 0 to HW filter on device bond0 [ 119.267848][ T8799] bridge0: port 2(bridge_slave_1) entered blocking state [ 119.277558][ T8799] bridge0: port 2(bridge_slave_1) entered disabled state [ 119.290796][ T8799] device bridge_slave_1 entered promiscuous mode [ 119.312838][ T8797] team0: Port device team_slave_0 added [ 119.348142][ T8797] team0: Port device team_slave_1 added [ 119.363720][ T8793] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 119.415299][ T2844] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 119.425026][ T2844] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 119.434700][ T8799] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 119.446452][ T8791] 8021q: adding VLAN 0 to HW filter on device team0 [ 119.454250][ T8801] bridge0: port 1(bridge_slave_0) entered blocking state [ 119.462169][ T8801] bridge0: port 1(bridge_slave_0) entered disabled state [ 119.470216][ T8801] device bridge_slave_0 entered promiscuous mode [ 119.477587][ T8803] chnl_net:caif_netlink_parms(): no params data found [ 119.493753][ T8793] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 119.545467][ T8799] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 119.555444][ T8801] bridge0: port 2(bridge_slave_1) entered blocking state [ 119.562977][ T8801] bridge0: port 2(bridge_slave_1) entered disabled state [ 119.571713][ T8801] device bridge_slave_1 entered promiscuous mode [ 119.642425][ T8797] device hsr_slave_0 entered promiscuous mode [ 119.690286][ T8797] device hsr_slave_1 entered promiscuous mode [ 119.729953][ T8797] debugfs: Directory 'hsr0' with parent '/' already present! [ 119.737572][ T8793] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 119.806908][ T8793] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 119.921337][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 119.930886][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 119.939551][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 119.946814][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 119.955401][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 119.965394][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 119.974028][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 119.981138][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 119.988790][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 120.000898][ T8799] team0: Port device team_slave_0 added [ 120.006891][ T8803] bridge0: port 1(bridge_slave_0) entered blocking state [ 120.014612][ T8803] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.022950][ T8803] device bridge_slave_0 entered promiscuous mode [ 120.038448][ T8803] bridge0: port 2(bridge_slave_1) entered blocking state [ 120.046104][ T8803] bridge0: port 2(bridge_slave_1) entered disabled state [ 120.054755][ T8803] device bridge_slave_1 entered promiscuous mode [ 120.075092][ T8801] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 120.092895][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 120.101321][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 120.109929][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 120.118487][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 120.127285][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 120.136649][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 120.145436][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 120.156323][ T8799] team0: Port device team_slave_1 added [ 120.163883][ T8803] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 120.177924][ T8801] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 120.216866][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 120.225357][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 120.238603][ T8803] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 120.258555][ T8797] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 120.286508][ T8797] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 120.373433][ T8799] device hsr_slave_0 entered promiscuous mode [ 120.413393][ T8799] device hsr_slave_1 entered promiscuous mode [ 120.453130][ T8799] debugfs: Directory 'hsr0' with parent '/' already present! [ 120.475205][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 120.484198][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 120.495173][ T8791] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 120.504225][ T8797] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 120.574534][ T8803] team0: Port device team_slave_0 added [ 120.598134][ T8801] team0: Port device team_slave_0 added [ 120.605729][ T8801] team0: Port device team_slave_1 added [ 120.622335][ T8797] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 120.662294][ T8803] team0: Port device team_slave_1 added [ 120.731869][ T8801] device hsr_slave_0 entered promiscuous mode [ 120.780147][ T8801] device hsr_slave_1 entered promiscuous mode [ 120.819879][ T8801] debugfs: Directory 'hsr0' with parent '/' already present! [ 120.912721][ T8803] device hsr_slave_0 entered promiscuous mode [ 120.960340][ T8803] device hsr_slave_1 entered promiscuous mode [ 121.000743][ T8803] debugfs: Directory 'hsr0' with parent '/' already present! [ 121.018165][ T8793] 8021q: adding VLAN 0 to HW filter on device bond0 [ 121.032561][ T8799] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 121.099291][ T8810] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 121.107137][ T8810] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 121.118290][ T8791] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 121.138786][ T8799] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 121.194074][ T8799] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 121.251422][ T8799] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 121.293473][ T8801] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 121.356435][ T8801] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 121.414817][ T8801] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 121.456228][ T8810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 121.464245][ T8810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 121.486336][ T8801] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 121.532852][ T8793] 8021q: adding VLAN 0 to HW filter on device team0 [ 121.571089][ T8803] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 121.615076][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 121.623802][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 121.632988][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 121.640131][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 121.648680][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 121.660532][ T8810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 121.669118][ T8810] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 121.678637][ T8810] bridge0: port 2(bridge_slave_1) entered blocking state [ 121.685927][ T8810] bridge0: port 2(bridge_slave_1) entered forwarding state [ 121.693959][ T8803] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 121.745048][ T8803] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 121.793384][ T8803] netdevsim netdevsim5 netdevsim3: renamed from eth3 05:04:33 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) close(r1) socket$inet6(0xa, 0x802, 0x73) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=ANY=[@ANYBLOB="00008a0000e0ff00"], 0x8) sendmsg$unix(r1, &(0x7f0000000880)={&(0x7f00000001c0)=@abs, 0x6e, 0x0}, 0x0) [ 121.875574][ T8797] 8021q: adding VLAN 0 to HW filter on device bond0 [ 121.907289][ T8810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 121.928121][ T8810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 121.962853][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 121.971227][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 05:04:33 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) close(r1) socket$inet6(0xa, 0x802, 0x73) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=ANY=[@ANYBLOB="00008a0000e0ff00"], 0x8) sendmsg$unix(r1, &(0x7f0000000880)={&(0x7f00000001c0)=@abs, 0x6e, 0x0}, 0x0) [ 121.979031][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 121.988989][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 122.000497][ T8797] 8021q: adding VLAN 0 to HW filter on device team0 [ 122.048194][ T8799] 8021q: adding VLAN 0 to HW filter on device bond0 [ 122.065445][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 122.075540][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 122.087084][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 122.095736][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 122.104564][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 122.113343][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 122.121842][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 05:04:33 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) close(r1) socket$inet6(0xa, 0x802, 0x73) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=ANY=[@ANYBLOB="00008a0000e0ff00"], 0x8) sendmsg$unix(r1, &(0x7f0000000880)={&(0x7f00000001c0)=@abs, 0x6e, 0x0}, 0x0) [ 122.153028][ T8793] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 122.167378][ T2844] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 122.176313][ T2844] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 122.185436][ T2844] bridge0: port 1(bridge_slave_0) entered blocking state [ 122.192750][ T2844] bridge0: port 1(bridge_slave_0) entered forwarding state [ 122.205860][ T2844] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 122.214867][ T2844] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 122.232100][ T2844] bridge0: port 2(bridge_slave_1) entered blocking state [ 122.239196][ T2844] bridge0: port 2(bridge_slave_1) entered forwarding state [ 122.249077][ T2844] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 122.265973][ T2844] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 122.280013][ T8801] 8021q: adding VLAN 0 to HW filter on device bond0 05:04:33 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x5}, 0x4) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000280)=0x32, 0x4) connect$inet(r1, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 122.318616][ T8801] 8021q: adding VLAN 0 to HW filter on device team0 [ 122.333269][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 122.356570][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 122.380454][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 122.388875][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 122.396979][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 122.415842][ T8799] 8021q: adding VLAN 0 to HW filter on device team0 [ 122.436805][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 122.460931][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 122.470466][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 122.479106][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 122.487723][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 122.490130][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 122.496966][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 122.500895][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 122.508383][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 122.522846][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 122.536974][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 122.556706][ T8803] 8021q: adding VLAN 0 to HW filter on device bond0 [ 122.574374][ T8793] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 122.582689][ T2844] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 122.592535][ T2844] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 122.601905][ T2844] bridge0: port 1(bridge_slave_0) entered blocking state [ 122.608944][ T2844] bridge0: port 1(bridge_slave_0) entered forwarding state [ 122.618186][ T2844] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 122.627207][ T2844] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 05:04:34 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x87) setsockopt$inet6_int(r0, 0x29, 0x7, 0xffffffffffffffff, 0x0) [ 122.635678][ T2844] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 122.644688][ T2844] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 122.653446][ T2844] bridge0: port 1(bridge_slave_0) entered blocking state [ 122.660561][ T2844] bridge0: port 1(bridge_slave_0) entered forwarding state [ 122.669184][ T2844] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 122.678219][ T2844] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 122.737204][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 122.749351][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 05:04:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) r1 = socket(0x800000000000011, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x4557434d) sendfile(r0, r2, 0x0, 0x20000000006) setsockopt$sock_int(r1, 0x1, 0x2b, &(0x7f0000000000)=0xc7, 0x4) [ 122.779331][ T3020] bridge0: port 2(bridge_slave_1) entered blocking state [ 122.786497][ T3020] bridge0: port 2(bridge_slave_1) entered forwarding state [ 122.794577][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 122.806652][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 122.816286][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 122.833410][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 122.842610][ T3020] bridge0: port 2(bridge_slave_1) entered blocking state [ 122.849773][ T3020] bridge0: port 2(bridge_slave_1) entered forwarding state [ 122.857772][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 122.867486][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 122.876340][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 122.885520][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 122.909042][ T8803] 8021q: adding VLAN 0 to HW filter on device team0 [ 122.931348][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 122.939312][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 122.948352][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 122.957213][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 122.965378][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 122.974803][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 122.983697][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 122.992871][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 123.001920][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 123.010676][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 123.019619][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 123.028776][ T3020] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.035920][ T3020] bridge0: port 1(bridge_slave_0) entered forwarding state [ 123.044271][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 123.053108][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 123.061680][ T3020] bridge0: port 2(bridge_slave_1) entered blocking state [ 123.068751][ T3020] bridge0: port 2(bridge_slave_1) entered forwarding state [ 123.080832][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 123.088664][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 123.123504][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 05:04:34 executing program 1: unshare(0x400) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") setsockopt$inet6_int(r0, 0x29, 0x4c, &(0x7f0000000140)=0x10000000, 0x4) [ 123.148099][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 123.179105][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 123.207764][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 123.218939][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 123.234599][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 123.261720][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 123.280379][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 123.288947][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 123.297967][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 123.306760][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 123.315757][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 123.327585][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 123.347077][ T8797] 8021q: adding VLAN 0 to HW filter on device batadv0 05:04:35 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet6(0xa, 0x3, 0x100000000000ff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x44f0, 0x4) write(r0, &(0x7f0000000180)="0e8059312ad63a8aae63ffbc518c5e7ba04e6953427dfbed72ede53ed8be0eea0000395fba100386", 0x28) [ 123.355802][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 123.371826][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 123.387488][ T8803] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 123.425878][ T8803] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 123.450827][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 123.462152][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 123.478922][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 123.499471][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 123.508636][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 123.522724][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 123.531633][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 123.540454][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 123.551593][ T8807] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 123.612757][ T8810] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 123.631614][ T8810] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 123.646988][ T8801] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 123.677868][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 123.698574][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 123.726377][ T8799] 8021q: adding VLAN 0 to HW filter on device batadv0 05:04:35 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind(r0, &(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80) [ 123.752848][ T8803] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 123.770586][ T8807] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 123.778115][ T8807] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 05:04:35 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0xfffffffd, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x0}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xfffffffd}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 05:04:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") unshare(0x400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$bt_hci(r1, 0x6, 0x21, 0x0, &(0x7f0000000100)) 05:04:35 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in6=@empty}, @in6=@remote, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 05:04:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) r1 = socket(0x800000000000011, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x4557434d) sendfile(r0, r2, 0x0, 0x20000000006) setsockopt$sock_int(r1, 0x1, 0x2b, &(0x7f0000000000)=0xc7, 0x4) 05:04:35 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind(r0, &(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80) 05:04:35 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x1000000, 0x0, 0x0) 05:04:35 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x1000000, 0x0, 0x0) 05:04:36 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") bind$bt_l2cap(r0, &(0x7f0000000000), 0xe) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0x7, 0x0, &(0x7f0000000080)) 05:04:36 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in6=@empty}, @in6=@remote, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 05:04:36 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind(r0, &(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80) 05:04:36 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x1000000, 0x0, 0x0) 05:04:36 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in6=@empty}, @in6=@remote, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 05:04:36 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000498000)={0x0, 0x0, &(0x7f00008b7ff0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2400000000010100000006b90000de0002000000100002000c00010005000100000000e2"], 0x24}}, 0x0) 05:04:36 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000000)="240000001400817cbc9b2281bab1ae002cff0100000000000801546fabca1b4e7d06a6bd", 0x24}], 0x1}, 0x0) 05:04:36 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in6=@empty}, @in6=@remote, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) [ 124.911998][ T8947] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 05:04:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) r1 = socket(0x800000000000011, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x4557434d) sendfile(r0, r2, 0x0, 0x20000000006) setsockopt$sock_int(r1, 0x1, 0x2b, &(0x7f0000000000)=0xc7, 0x4) 05:04:36 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0xfffffffd, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x0}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xfffffffd}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 05:04:36 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) sendto$rxrpc(r0, 0x0, 0x0, 0x0, &(0x7f0000006b40)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="da20d2d76faac79f7b161594186641ea"}}, 0x24) 05:04:36 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)="058d5b26ce8be253b8e8461f2f141499", 0x10}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:04:36 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r0, 0x65, 0x1, &(0x7f0000000080), 0x1d0) close(r0) 05:04:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='highspeed\x00', 0xa) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0xffffffffffffff4b, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000140)=0x3) r4 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_ifreq(r4, 0x89f2, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) ioctl$sock_inet_SIOCDARP(r4, 0x8953, &(0x7f0000000000)={{0x2, 0x4e24, @loopback}, {0x0, @link_local}, 0x4, {0x2, 0x4e21, @multicast2}, 'bond0\x00'}) shutdown(r2, 0x1) r5 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 05:04:36 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet6_int(r0, 0x28, 0x1, 0x0, &(0x7f0000000100)) 05:04:37 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r0, 0x65, 0x1, &(0x7f0000000080), 0x1d0) close(r0) [ 125.337552][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:37 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0xfffffffd, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x0}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xfffffffd}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 05:04:37 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) bind$ax25(r0, &(0x7f0000000140)={{0x3, @bcast, 0x1}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}, 0x48) 05:04:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-serpent-avx2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendto$x25(r1, &(0x7f0000000100)="df49f9d49c7f4c52fd992df3fbce33e816afeaaf4017327c", 0xfffffffffffffdcb, 0x0, 0x0, 0xcb) recvmmsg(r1, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/29, 0x1d}, {&(0x7f00000002c0)=""/144, 0x7fffefe3}], 0x2}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000700)=""/251, 0xfb}], 0x1}}], 0x2, 0x0, 0x0) 05:04:37 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r0, 0x65, 0x1, &(0x7f0000000080), 0x1d0) close(r0) 05:04:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) r1 = socket(0x800000000000011, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x4557434d) sendfile(r0, r2, 0x0, 0x20000000006) setsockopt$sock_int(r1, 0x1, 0x2b, &(0x7f0000000000)=0xc7, 0x4) 05:04:37 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0xfffffffd, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x0}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xfffffffd}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 05:04:37 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) bind$ax25(r0, &(0x7f0000000140)={{0x3, @bcast, 0x1}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}, 0x48) 05:04:37 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r0, 0x65, 0x1, &(0x7f0000000080), 0x1d0) close(r0) 05:04:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x309, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002d000514d25a80648c6394fb0124fc0010000b0f0c000200053582c137153e370900018025646e001981", 0x2e}], 0x1}, 0x0) [ 126.123592][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:37 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @mss, @mss, @mss, @timestamp, @sack_perm], 0x132) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x40004007fff, 0x32fe3cf0}, 0x14) shutdown(r0, 0x1) 05:04:37 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) bind$ax25(r0, &(0x7f0000000140)={{0x3, @bcast, 0x1}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}, 0x48) 05:04:37 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x7f, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e0000001d008105e00f80ecdb4cb9f207c804a01c0000004a00c600120002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) 05:04:37 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$inet6(0xa, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100686866000c000200080007"], 0x3}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 05:04:37 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r0, 0x891c, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', {0x2, 0x0, @empty}}) 05:04:38 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) bind$ax25(r0, &(0x7f0000000140)={{0x3, @bcast, 0x1}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}, 0x48) 05:04:38 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @mss, @mss, @mss, @timestamp, @sack_perm], 0x132) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x40004007fff, 0x32fe3cf0}, 0x14) shutdown(r0, 0x1) 05:04:38 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @mss, @mss, @mss, @timestamp, @sack_perm], 0x132) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x40004007fff, 0x32fe3cf0}, 0x14) shutdown(r0, 0x1) 05:04:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @mss, @mss, @mss, @timestamp, @sack_perm], 0x132) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x40004007fff, 0x32fe3cf0}, 0x14) shutdown(r0, 0x1) 05:04:38 executing program 2: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x109f8}], 0x1}, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000640), &(0x7f0000000680)=0x10) 05:04:38 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r0, 0x891c, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', {0x2, 0x0, @empty}}) 05:04:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2e7bc5) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 05:04:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x1c, 0x2f, 0x3ff, 0x0, 0x0, {0x6}, [@typed={0x8, 0x3, @str='\x00'}]}, 0x1c}}, 0x0) 05:04:38 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r0, 0x891c, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', {0x2, 0x0, @empty}}) 05:04:38 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @mss, @mss, @mss, @timestamp, @sack_perm], 0x132) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x40004007fff, 0x32fe3cf0}, 0x14) shutdown(r0, 0x1) 05:04:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @mss, @mss, @mss, @timestamp, @sack_perm], 0x132) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x40004007fff, 0x32fe3cf0}, 0x14) shutdown(r0, 0x1) 05:04:38 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xffffffffffffffff, 0x8031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000012c0)={&(0x7f0000000000)=""/4087, 0x208000, 0x800}, 0x18) listen(0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0xb) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000002640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r3, 0x36236e6ed0b15a09, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x14, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'lo\x00'}}}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000003f00)={&(0x7f0000003e40)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003ec0)={&(0x7f0000003e80)={0x34, r3, 0x800, 0x70bd2a, 0x25dfdbfd, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x7, 0x7fffffff, @l2={'ib', 0x3a, 'gretap0\x00'}}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x40) 05:04:38 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="200000006800030800000000a9030000020000000000008008000a00575aff9fef0001fcffb9855acbbe72f36b6744254ffe2e4173a057dcd8d2476d0479b7d4380144bbbbb4bc94819c7fdd68561939066d757a57c10ed9abb13edfc987bdd028d9a5605d1b73d76ea549e2012287087c9acc53ec20b742f76dc90db93d3aa677e76583ca1862a3241be5967f09f4d4416ffcdc0e6c7edaa431a9ae49d307cddf8b2ebdf3a64282759c5becb06c8d98141de1a78e579e76582808c48084dc7f131ca609ff88b398c50000000000", @ANYRES32=0x0], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) 05:04:38 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r0, 0x891c, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', {0x2, 0x0, @empty}}) 05:04:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @mss, @mss, @mss, @timestamp, @sack_perm], 0x132) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x40004007fff, 0x32fe3cf0}, 0x14) shutdown(r0, 0x1) 05:04:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}, {{@in6=@empty}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}, 0xe8) connect$inet6(r1, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x19b2c86a934) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 127.483828][ T9085] IPVS: ftp: loaded support on port[0] = 21 05:04:39 executing program 1: ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000100), 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @local}], 0x3c0) listen(r1, 0x8) 05:04:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'hsr0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'hsr0\x00L\x00H\xc8\x03\x00\x00\x00\x00\xff\x00', 0x1001}) 05:04:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2e7bc5) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 05:04:39 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x30, 0x0, &(0x7f0000000040)) 05:04:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000001840)={'vcan0\x00', 0x0}) r2 = socket$can_j1939(0x1d, 0x2, 0x7) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000001840)={'vcan0\x00', 0x0}) bind$can_j1939(r2, &(0x7f0000000240)={0x1d, r4, 0x3}, 0x18) bind$can_j1939(r2, &(0x7f0000000000)={0x1d, r1}, 0x18) 05:04:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='vegas\x00', 0x6) socket$key(0xf, 0x3, 0x2) socket$inet_udp(0x2, 0x2, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000000640)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000200)="4369426d8d876acf20907e0ea328a18927d68e375ba6031c461628e39253399fe8518b8d1bfd680c27dd0716805c48946b85bd2c18f0891766ffd07932b165f76d27dc97270657827479b8d1a6f191aa265f29b701a68cca1e01230ee8aa415ff820ea695d2041c6c75b", 0x6a}, {0x0}], 0x2}, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xffffffffffffff47, 0x0, 0x0, 0x1a) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 127.825536][ T9115] kasan: CONFIG_KASAN_INLINE enabled [ 127.830871][ T9115] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 127.839041][ T9115] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 127.845986][ T9115] CPU: 0 PID: 9115 Comm: syz-executor.1 Not tainted 5.4.0-rc6+ #0 [ 127.849431][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 127.853786][ T9115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 127.853809][ T9115] RIP: 0010:__lock_acquire+0x1254/0x4a00 [ 127.853825][ T9115] Code: 00 0f 85 96 24 00 00 48 81 c4 f0 00 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 48 b8 00 00 00 00 00 fc ff df 4c 89 f2 48 c1 ea 03 <80> 3c 02 00 0f 85 0b 28 00 00 49 81 3e e0 05 07 8a 0f 84 5f ee ff [ 127.853831][ T9115] RSP: 0018:ffff8880678ffb48 EFLAGS: 00010006 [ 127.853842][ T9115] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 127.853854][ T9115] RDX: 0000000000000218 RSI: 0000000000000000 RDI: 0000000000000001 [ 127.922278][ T9115] RBP: ffff8880678ffc60 R08: 0000000000000001 R09: 0000000000000001 [ 127.930253][ T9115] R10: fffffbfff138db80 R11: ffff88807a904200 R12: 00000000000010c0 [ 127.931575][ T9085] kobject: 'gretap0' (00000000065a4302): kobject_add_internal: parent: 'net', set: 'devices' [ 127.938221][ T9115] R13: 0000000000000000 R14: 00000000000010c0 R15: 0000000000000000 [ 127.938233][ T9115] FS: 00007f660653b700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 127.938240][ T9115] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 05:04:39 executing program 0: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x40041}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000280)={0x41}, 0x10) [ 127.938247][ T9115] CR2: 0000001b31a28000 CR3: 00000000a1061000 CR4: 00000000001406f0 [ 127.938261][ T9115] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 127.987979][ T9115] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 127.995957][ T9115] Call Trace: [ 127.999266][ T9115] ? __kasan_check_read+0x11/0x20 [ 128.004298][ T9115] ? __lock_acquire+0x16f2/0x4a00 [ 128.009331][ T9115] ? rwlock_bug.part.0+0x90/0x90 [ 128.014279][ T9115] ? lock_acquire+0x20b/0x410 [ 128.016965][ T3906] kobject: 'loop0' (00000000ba47138e): kobject_uevent_env [ 128.018963][ T9115] ? mark_held_locks+0xf0/0xf0 [ 128.030810][ T9115] lock_acquire+0x190/0x410 [ 128.035323][ T9115] ? j1939_jsk_del+0x32/0x240 [ 128.040019][ T9115] _raw_spin_lock_bh+0x33/0x50 [ 128.041678][ T3906] kobject: 'loop0' (00000000ba47138e): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 128.044786][ T9115] ? j1939_jsk_del+0x32/0x240 [ 128.044809][ T9115] j1939_jsk_del+0x32/0x240 [ 128.064099][ T9115] ? lock_sock_nested+0xe2/0x120 [ 128.069051][ T9115] j1939_sk_bind+0x2e2/0x8e0 [ 128.073657][ T9115] __sys_bind+0x239/0x290 [ 128.078002][ T9115] ? __ia32_sys_socketpair+0xf0/0xf0 [ 128.083306][ T9115] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 128.089568][ T9115] ? put_timespec64+0xda/0x140 [ 128.094341][ T9115] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 128.099814][ T9115] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 128.105280][ T9115] ? do_syscall_64+0x26/0x760 [ 128.109966][ T9115] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 128.116054][ T9115] ? do_syscall_64+0x26/0x760 [ 128.120680][ T9085] kobject: 'gretap0' (00000000065a4302): kobject_uevent_env [ 128.120744][ T9115] __x64_sys_bind+0x73/0xb0 [ 128.132499][ T9115] do_syscall_64+0xfa/0x760 [ 128.137035][ T9115] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 128.142935][ T9115] RIP: 0033:0x45a639 [ 128.146839][ T9115] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 128.166535][ T9115] RSP: 002b:00007f660653ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 128.174954][ T9115] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a639 [ 128.182366][ T9085] kobject: 'gretap0' (00000000065a4302): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 128.182942][ T9115] RDX: 0000000000000018 RSI: 0000000020000240 RDI: 0000000000000004 [ 128.201232][ T9115] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 128.209211][ T9115] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f660653b6d4 [ 128.217194][ T9115] R13: 00000000004c09a9 R14: 00000000004d3090 R15: 00000000ffffffff [ 128.222418][ T9085] kobject: 'queues' (00000000859be746): kobject_add_internal: parent: 'gretap0', set: '' [ 128.225158][ T9115] Modules linked in: [ 128.225178][ T9115] ---[ end trace 15a84cd9af7f1978 ]--- [ 128.225198][ T9115] RIP: 0010:__lock_acquire+0x1254/0x4a00 [ 128.225214][ T9115] Code: 00 0f 85 96 24 00 00 48 81 c4 f0 00 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 48 b8 00 00 00 00 00 fc ff df 4c 89 f2 48 c1 ea 03 <80> 3c 02 00 0f 85 0b 28 00 00 49 81 3e e0 05 07 8a 0f 84 5f ee ff [ 128.250625][ T9085] kobject: 'queues' (00000000859be746): kobject_uevent_env [ 128.270124][ T9115] RSP: 0018:ffff8880678ffb48 EFLAGS: 00010006 [ 128.270135][ T9115] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 128.270142][ T9115] RDX: 0000000000000218 RSI: 0000000000000000 RDI: 0000000000000001 [ 128.270150][ T9115] RBP: ffff8880678ffc60 R08: 0000000000000001 R09: 0000000000000001 [ 128.270157][ T9115] R10: fffffbfff138db80 R11: ffff88807a904200 R12: 00000000000010c0 [ 128.270163][ T9115] R13: 0000000000000000 R14: 00000000000010c0 R15: 0000000000000000 [ 128.270172][ T9115] FS: 00007f660653b700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 128.270179][ T9115] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 128.270186][ T9115] CR2: 0000001b31a28000 CR3: 00000000a1061000 CR4: 00000000001406f0 [ 128.270195][ T9115] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 128.270201][ T9115] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 128.270208][ T9115] Kernel panic - not syncing: Fatal exception in interrupt [ 128.271431][ T9115] Kernel Offset: disabled [ 128.375392][ T9115] Rebooting in 86400 seconds..