[ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Started Getty on tty1. [ OK ] Started Serial Getty on ttyS0. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Starting Load/Save RF Kill Switch Status... Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.243' (ECDSA) to the list of known hosts. 2020/07/13 10:28:54 fuzzer started 2020/07/13 10:28:54 dialing manager at 10.128.0.26:33519 2020/07/13 10:28:56 syscalls: 3167 2020/07/13 10:28:56 code coverage: enabled 2020/07/13 10:28:56 comparison tracing: enabled 2020/07/13 10:28:56 extra coverage: enabled 2020/07/13 10:28:56 setuid sandbox: enabled 2020/07/13 10:28:56 namespace sandbox: enabled 2020/07/13 10:28:56 Android sandbox: /sys/fs/selinux/policy does not exist 2020/07/13 10:28:56 fault injection: enabled 2020/07/13 10:28:56 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/07/13 10:28:56 net packet injection: enabled 2020/07/13 10:28:56 net device setup: enabled 2020/07/13 10:28:56 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/07/13 10:28:56 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/07/13 10:28:56 USB emulation: enabled 10:29:17 executing program 0: setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) socket$caif_stream(0x25, 0x1, 0x3) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff00, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) read$midi(r1, &(0x7f00000002c0)=""/4096, 0x1000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xe00}}, {@default_permissions='default_permissions'}], [{@smackfshat={'smackfshat', 0x3d, '/dev/loop-control\x00'}}]}}) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syzkaller login: [ 81.981815][ T6838] IPVS: ftp: loaded support on port[0] = 21 [ 82.117191][ T6838] chnl_net:caif_netlink_parms(): no params data found 10:29:17 executing program 1: creat(&(0x7f0000000100)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x3d}}) [ 82.193210][ T6838] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.200856][ T6838] bridge0: port 1(bridge_slave_0) entered disabled state [ 82.209906][ T6838] device bridge_slave_0 entered promiscuous mode [ 82.221162][ T6838] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.229321][ T6838] bridge0: port 2(bridge_slave_1) entered disabled state [ 82.238505][ T6838] device bridge_slave_1 entered promiscuous mode [ 82.263823][ T6838] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 82.282663][ T6838] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 82.310696][ T6838] team0: Port device team_slave_0 added [ 82.319329][ T6838] team0: Port device team_slave_1 added [ 82.343847][ T6838] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 82.350804][ T6838] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 82.377981][ T6838] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 82.391583][ T6838] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 82.399148][ T6838] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 82.426004][ T6838] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 82.480364][ T6986] IPVS: ftp: loaded support on port[0] = 21 [ 82.509308][ T6838] device hsr_slave_0 entered promiscuous mode 10:29:18 executing program 2: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000884, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r4, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) shutdown(r4, 0x1) sendto$inet6(r1, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x30) [ 82.563918][ T6838] device hsr_slave_1 entered promiscuous mode 10:29:18 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x96) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e31, 0x40, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x5f) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x10, &(0x7f0000000440), 0x4) r2 = gettid() syz_open_procfs(r2, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) gettid() syz_open_procfs(0x0, 0xfffffffffffffffe) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f00000002c0)='\b', 0x1, 0x3fffffa, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@gcm_128={{}, "000000070000fea1", "0000000000ff3111822eadd32a9c00", '\x00', "00f45000000b00"}, 0x28) [ 82.849992][ T7038] IPVS: ftp: loaded support on port[0] = 21 [ 82.914650][ T6986] chnl_net:caif_netlink_parms(): no params data found [ 83.058276][ T6838] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 83.126674][ T6838] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 83.177245][ T6838] netdevsim netdevsim0 netdevsim2: renamed from eth2 10:29:18 executing program 4: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@acl='acl'}]}) [ 83.236766][ T6838] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 83.350445][ T6986] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.358724][ T6986] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.360440][ T7164] IPVS: ftp: loaded support on port[0] = 21 [ 83.368174][ T6986] device bridge_slave_0 entered promiscuous mode [ 83.392614][ T6986] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.401170][ T6986] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.410607][ T6986] device bridge_slave_1 entered promiscuous mode [ 83.560201][ T7038] chnl_net:caif_netlink_parms(): no params data found [ 83.571497][ T7201] IPVS: ftp: loaded support on port[0] = 21 [ 83.610859][ T6986] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 83.661364][ T6986] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 83.776143][ T6986] team0: Port device team_slave_0 added 10:29:19 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xffffff88, 0x0, 0x26}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) [ 83.838131][ T6986] team0: Port device team_slave_1 added [ 83.852805][ T7038] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.867711][ T7038] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.893932][ T7038] device bridge_slave_0 entered promiscuous mode [ 83.915173][ T7038] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.922267][ T7038] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.931498][ T7038] device bridge_slave_1 entered promiscuous mode [ 84.074367][ T7038] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 84.087895][ T7038] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 84.098704][ T7164] chnl_net:caif_netlink_parms(): no params data found [ 84.129491][ T6986] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 84.137794][ T6986] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 84.166418][ T6986] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 84.180382][ T6986] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 84.189152][ T6986] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 84.219872][ T6986] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 84.252188][ T7201] chnl_net:caif_netlink_parms(): no params data found [ 84.275800][ T7432] IPVS: ftp: loaded support on port[0] = 21 [ 84.320010][ T7038] team0: Port device team_slave_0 added [ 84.354759][ T7038] team0: Port device team_slave_1 added [ 84.447614][ T6986] device hsr_slave_0 entered promiscuous mode [ 84.493653][ T6986] device hsr_slave_1 entered promiscuous mode [ 84.543463][ T6986] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 84.551242][ T6986] Cannot create hsr debugfs directory [ 84.591202][ T7038] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 84.598233][ T7038] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 84.624229][ T7038] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 84.658619][ T7038] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 84.665726][ T7038] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 84.693511][ T7038] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 84.758219][ T7164] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.767109][ T7164] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.778356][ T7164] device bridge_slave_0 entered promiscuous mode [ 84.814393][ T7164] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.821562][ T7164] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.834161][ T7164] device bridge_slave_1 entered promiscuous mode [ 84.876588][ T7038] device hsr_slave_0 entered promiscuous mode [ 84.924012][ T7038] device hsr_slave_1 entered promiscuous mode [ 84.964223][ T7038] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 84.971839][ T7038] Cannot create hsr debugfs directory [ 84.977599][ T7201] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.985105][ T7201] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.992864][ T7201] device bridge_slave_0 entered promiscuous mode [ 85.058692][ T7201] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.066454][ T7201] bridge0: port 2(bridge_slave_1) entered disabled state [ 85.074952][ T7201] device bridge_slave_1 entered promiscuous mode [ 85.095581][ T7164] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 85.110639][ T7164] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 85.214623][ T7201] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 85.224835][ T7432] chnl_net:caif_netlink_parms(): no params data found [ 85.246285][ T7164] team0: Port device team_slave_0 added [ 85.273019][ T7201] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 85.295177][ T7164] team0: Port device team_slave_1 added [ 85.309565][ T6838] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.372028][ T7164] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 85.383907][ T7164] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 85.411134][ T7164] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 85.468763][ T7164] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 85.476433][ T7164] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 85.502961][ T7164] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 85.518084][ T7201] team0: Port device team_slave_0 added [ 85.532245][ T6838] 8021q: adding VLAN 0 to HW filter on device team0 [ 85.567075][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 85.577555][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 85.587841][ T7201] team0: Port device team_slave_1 added [ 85.610964][ T7432] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.621846][ T7432] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.630893][ T7432] device bridge_slave_0 entered promiscuous mode [ 85.640096][ T7432] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.648487][ T7432] bridge0: port 2(bridge_slave_1) entered disabled state [ 85.657621][ T7432] device bridge_slave_1 entered promiscuous mode [ 85.684523][ T7201] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 85.691483][ T7201] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 85.718636][ T7201] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 85.781558][ T7201] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 85.790041][ T7201] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 85.819968][ T7201] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 85.876877][ T7164] device hsr_slave_0 entered promiscuous mode [ 85.938156][ T7164] device hsr_slave_1 entered promiscuous mode [ 85.984206][ T7164] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 85.991774][ T7164] Cannot create hsr debugfs directory [ 86.002975][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 86.011967][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 86.020744][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.028022][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 86.037503][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 86.046419][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 86.054945][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 86.062022][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 86.069842][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 86.080896][ T7432] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 86.114507][ T7432] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 86.145516][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 86.153889][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 86.162365][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 86.171439][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 86.187951][ T6986] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 86.296767][ T7201] device hsr_slave_0 entered promiscuous mode [ 86.353699][ T7201] device hsr_slave_1 entered promiscuous mode [ 86.393319][ T7201] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 86.400895][ T7201] Cannot create hsr debugfs directory [ 86.407350][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 86.416112][ T6986] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 86.467369][ T6986] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 86.529284][ T6986] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 86.619649][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 86.629077][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 86.646286][ T7432] team0: Port device team_slave_0 added [ 86.701026][ T7432] team0: Port device team_slave_1 added [ 86.718328][ T7038] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 86.790412][ T7038] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 86.841455][ T7038] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 86.895917][ T7176] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 86.906230][ T7176] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 86.920689][ T6838] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 86.933407][ T6838] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 86.952210][ T7432] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 86.962941][ T7432] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 86.990048][ T7432] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 87.006332][ T7432] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 87.014356][ T7432] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 87.040734][ T7432] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 87.057314][ T7038] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 87.114903][ T7176] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 87.127107][ T7176] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 87.266546][ T7432] device hsr_slave_0 entered promiscuous mode [ 87.303945][ T7432] device hsr_slave_1 entered promiscuous mode [ 87.353310][ T7432] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 87.360875][ T7432] Cannot create hsr debugfs directory [ 87.384323][ T6838] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 87.391740][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 87.400765][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 87.598500][ T7164] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 87.690561][ T7164] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 87.735423][ T7164] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 87.776002][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 87.784991][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 87.825039][ T7164] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 87.880878][ T7201] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 87.947975][ T7201] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 88.034750][ T7201] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 88.088920][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 88.097500][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 88.122614][ T6838] device veth0_vlan entered promiscuous mode [ 88.140041][ T7201] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 88.194961][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 88.202828][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 88.289825][ T6838] device veth1_vlan entered promiscuous mode [ 88.298258][ T7432] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 88.356336][ T7432] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 88.419174][ T7432] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 88.480119][ T6986] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.495856][ T7432] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 88.571693][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 88.594623][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 88.602821][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 88.611735][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 88.629911][ T6986] 8021q: adding VLAN 0 to HW filter on device team0 [ 88.645447][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 88.664249][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 88.693428][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 88.705123][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 88.715522][ T23] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.722600][ T23] bridge0: port 1(bridge_slave_0) entered forwarding state [ 88.733431][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 88.741979][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 88.751181][ T23] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.758296][ T23] bridge0: port 2(bridge_slave_1) entered forwarding state [ 88.766227][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 88.776813][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 88.791223][ T6838] device veth0_macvtap entered promiscuous mode [ 88.827082][ T6838] device veth1_macvtap entered promiscuous mode [ 88.837976][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 88.849373][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 88.868665][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 88.900459][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 88.911214][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 88.920479][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 88.929733][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 88.938705][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 88.959877][ T7038] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.980197][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 88.990029][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 89.012189][ T6838] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 89.027058][ T6986] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 89.058981][ T7176] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 89.077197][ T7176] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 89.097928][ T6838] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 89.112313][ T7176] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.122230][ T7176] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.132051][ T7176] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 89.141225][ T7176] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 89.162974][ T7038] 8021q: adding VLAN 0 to HW filter on device team0 [ 89.182270][ T6838] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.194340][ T6838] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.203133][ T6838] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.222107][ T6838] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.264097][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 89.272767][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 89.301402][ T23] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.308573][ T23] bridge0: port 1(bridge_slave_0) entered forwarding state [ 89.318105][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 89.327035][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 89.335433][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 89.345717][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 89.354560][ T23] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.361595][ T23] bridge0: port 2(bridge_slave_1) entered forwarding state [ 89.369911][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 89.429314][ T6986] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 89.439383][ T7655] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 89.451363][ T7655] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 89.561828][ T8152] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 89.572348][ T8152] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 89.582383][ T8152] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 89.595060][ T8152] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 89.603988][ T8152] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 89.671771][ T7201] 8021q: adding VLAN 0 to HW filter on device bond0 [ 89.704343][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 89.714959][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 89.730456][ C1] hrtimer: interrupt took 25874 ns [ 89.759618][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 89.791755][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 89.818109][ T8164] splice write not supported for file net/ipv4/vs/lblcr_expiration (pid: 8164 comm: syz-executor.0) [ 89.888374][ T7655] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.900115][ T7655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.934313][ T7201] 8021q: adding VLAN 0 to HW filter on device team0 [ 89.951710][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 89.961678][ T29] audit: type=1800 audit(1594636165.592:2): pid=8164 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=15739 res=0 10:29:25 executing program 0: setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) socket$caif_stream(0x25, 0x1, 0x3) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff00, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) read$midi(r1, &(0x7f00000002c0)=""/4096, 0x1000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xe00}}, {@default_permissions='default_permissions'}], [{@smackfshat={'smackfshat', 0x3d, '/dev/loop-control\x00'}}]}}) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 89.962958][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 89.998264][ T7164] 8021q: adding VLAN 0 to HW filter on device bond0 [ 90.011864][ T7655] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 90.022962][ T7655] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 90.091720][ T7655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 90.115960][ T7655] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 90.126812][ T7655] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.133977][ T7655] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.157361][ T8174] splice write not supported for file net/ipv4/vs/lblcr_expiration (pid: 8174 comm: syz-executor.0) [ 90.169151][ T7655] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 90.181340][ T7655] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 90.190304][ T7655] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.197481][ T7655] bridge0: port 2(bridge_slave_1) entered forwarding state 10:29:25 executing program 0: setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) socket$caif_stream(0x25, 0x1, 0x3) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff00, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) read$midi(r1, &(0x7f00000002c0)=""/4096, 0x1000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xe00}}, {@default_permissions='default_permissions'}], [{@smackfshat={'smackfshat', 0x3d, '/dev/loop-control\x00'}}]}}) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 90.206582][ T7655] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 90.215646][ T7655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 90.230132][ T8152] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 90.255223][ T8152] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 90.263088][ T8152] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 90.271782][ T8152] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 90.286384][ T6986] device veth0_vlan entered promiscuous mode [ 90.310524][ T7038] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 90.350134][ T7164] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.377137][ T6986] device veth1_vlan entered promiscuous mode [ 90.412163][ T7432] 8021q: adding VLAN 0 to HW filter on device bond0 [ 90.434973][ T8179] splice write not supported for file net/ipv4/vs/lblcr_expiration (pid: 8179 comm: syz-executor.0) [ 90.452113][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 90.467651][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 90.476791][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 90.485637][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 10:29:26 executing program 0: setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) socket$caif_stream(0x25, 0x1, 0x3) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff00, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) read$midi(r1, &(0x7f00000002c0)=""/4096, 0x1000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xe00}}, {@default_permissions='default_permissions'}], [{@smackfshat={'smackfshat', 0x3d, '/dev/loop-control\x00'}}]}}) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 90.583772][ T7176] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 90.600254][ T7176] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 90.632252][ T8183] splice write not supported for file net/ipv4/vs/lblcr_expiration (pid: 8183 comm: syz-executor.0) [ 90.644321][ T7176] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 90.657530][ T7176] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.664686][ T7176] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.674258][ T7176] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 90.684754][ T7176] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 90.694254][ T7176] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 90.702201][ T7176] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 90.724352][ T7176] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready 10:29:26 executing program 0: setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) socket$caif_stream(0x25, 0x1, 0x3) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff00, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) read$midi(r1, &(0x7f00000002c0)=""/4096, 0x1000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xe00}}, {@default_permissions='default_permissions'}], [{@smackfshat={'smackfshat', 0x3d, '/dev/loop-control\x00'}}]}}) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 90.743965][ T7176] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 90.752713][ T7176] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 90.769466][ T7176] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 90.784127][ T7176] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 90.792949][ T7176] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 90.802326][ T7176] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.809579][ T7176] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.818161][ T7176] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 90.827545][ T7176] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 90.853831][ T7899] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 90.861826][ T7899] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 90.884748][ T8187] splice write not supported for file net/ipv4/vs/lblcr_expiration (pid: 8187 comm: syz-executor.0) [ 90.906860][ T7432] 8021q: adding VLAN 0 to HW filter on device team0 10:29:26 executing program 0: setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) socket$caif_stream(0x25, 0x1, 0x3) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff00, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) read$midi(r1, &(0x7f00000002c0)=""/4096, 0x1000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xe00}}, {@default_permissions='default_permissions'}], [{@smackfshat={'smackfshat', 0x3d, '/dev/loop-control\x00'}}]}}) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 90.973051][ T6986] device veth0_macvtap entered promiscuous mode [ 91.013860][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 91.030289][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 91.039749][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 91.054910][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 91.072782][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 91.092936][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 91.103026][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 91.119145][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 91.133012][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 91.148258][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 91.159733][ T2577] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.161383][ T8191] splice write not supported for file net/ipv4/vs/lblcr_expiration (pid: 8191 comm: syz-executor.0) [ 91.166878][ T2577] bridge0: port 1(bridge_slave_0) entered forwarding state [ 91.176713][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 91.199645][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 91.208074][ T2577] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.215204][ T2577] bridge0: port 2(bridge_slave_1) entered forwarding state [ 91.226375][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 91.252151][ T7201] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 10:29:26 executing program 0: setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) socket$caif_stream(0x25, 0x1, 0x3) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff00, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) read$midi(r1, &(0x7f00000002c0)=""/4096, 0x1000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xe00}}, {@default_permissions='default_permissions'}], [{@smackfshat={'smackfshat', 0x3d, '/dev/loop-control\x00'}}]}}) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 91.270186][ T7201] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 91.285924][ T6986] device veth1_macvtap entered promiscuous mode [ 91.320955][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 91.332084][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 91.351621][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 91.368211][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 91.380584][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 91.392800][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 91.409555][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 91.430549][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 91.434608][ T8195] splice write not supported for file net/ipv4/vs/lblcr_expiration (pid: 8195 comm: syz-executor.0) [ 91.440193][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 91.464879][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 91.478693][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 91.491102][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 91.502087][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 91.511825][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 10:29:27 executing program 0: setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) socket$caif_stream(0x25, 0x1, 0x3) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff00, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) read$midi(r1, &(0x7f00000002c0)=""/4096, 0x1000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xe00}}, {@default_permissions='default_permissions'}], [{@smackfshat={'smackfshat', 0x3d, '/dev/loop-control\x00'}}]}}) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 91.528798][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 91.538531][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 91.547747][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 91.557915][ T7038] device veth0_vlan entered promiscuous mode [ 91.572133][ T7164] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 91.631889][ T8152] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 91.640844][ T8152] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 91.656479][ T8152] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 91.666849][ T8199] splice write not supported for file net/ipv4/vs/lblcr_expiration (pid: 8199 comm: syz-executor.0) [ 91.668828][ T8152] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 91.692896][ T8152] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 91.701625][ T8152] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 91.716728][ T8152] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 91.771711][ T6986] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 91.787224][ T6986] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 91.799020][ T6986] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 91.811561][ T7432] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 91.824767][ T7655] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 91.832259][ T7655] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 91.844065][ T7655] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 91.852557][ T7655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 91.871965][ T6986] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 91.885589][ T6986] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 91.897679][ T6986] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 91.908517][ T7038] device veth1_vlan entered promiscuous mode [ 91.924791][ T7201] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 91.939020][ T7164] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 91.954978][ T7655] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 91.962408][ T7655] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 91.979763][ T7655] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 91.988817][ T7655] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 92.022958][ T6986] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.039624][ T6986] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.049882][ T6986] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.058697][ T6986] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.086580][ T7899] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 92.098177][ T7899] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 92.130270][ T7432] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 92.165869][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 92.175940][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 92.193778][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 92.202417][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 92.232163][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 92.248425][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 92.261072][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 92.270854][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 92.426870][ T7038] device veth0_macvtap entered promiscuous mode [ 92.453473][ T7899] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 92.475658][ T7899] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 92.492734][ T7899] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 10:29:28 executing program 1: creat(&(0x7f0000000100)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x3d}}) [ 92.525663][ T7164] device veth0_vlan entered promiscuous mode [ 92.546903][ T7038] device veth1_macvtap entered promiscuous mode [ 92.608236][ T7164] device veth1_vlan entered promiscuous mode [ 92.657916][ T7655] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 92.675684][ T7655] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 92.698324][ T7655] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 92.739106][ T7655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 92.772013][ T7655] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 92.781279][ T7655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 92.795687][ T7201] device veth0_vlan entered promiscuous mode [ 92.845291][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 92.857813][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 92.866735][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 92.875691][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 92.885418][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 92.895741][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 92.904363][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 92.916550][ T7432] device veth0_vlan entered promiscuous mode [ 92.940823][ T7038] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 92.959913][ T7038] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 92.970943][ T7038] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 92.989316][ T7038] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 93.001655][ T7038] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 93.031124][ T7201] device veth1_vlan entered promiscuous mode [ 93.041464][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 93.055062][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 93.067615][ T7038] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 93.078564][ T7038] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 93.090471][ T7038] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 93.101432][ T7038] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 93.113066][ T7038] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 93.127744][ T7432] device veth1_vlan entered promiscuous mode [ 93.145659][ T7038] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.159443][ T7038] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.169603][ T7038] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.182203][ T7038] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.199860][ T7899] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 93.209530][ T7899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 93.222216][ T7899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 93.231064][ T7899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 93.246860][ T7164] device veth0_macvtap entered promiscuous mode [ 93.265659][ T7164] device veth1_macvtap entered promiscuous mode [ 93.338224][ T7201] device veth0_macvtap entered promiscuous mode [ 93.503545][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 93.512051][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 93.522054][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 93.532275][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 93.542271][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 93.557658][ T2577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 93.570285][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 93.583607][ T7201] device veth1_macvtap entered promiscuous mode [ 93.591963][ T7432] device veth0_macvtap entered promiscuous mode [ 93.614549][ T7432] device veth1_macvtap entered promiscuous mode [ 93.630605][ T7164] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 93.658139][ T7164] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 93.670751][ T7164] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 93.693699][ T7164] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 93.704165][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 93.707537][ T7164] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 93.730183][ T7164] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 93.742320][ T7164] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 93.775118][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 93.785183][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 93.794358][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 93.802581][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 93.813157][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 93.831928][ T7164] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 93.855213][ T7164] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 93.873019][ T7164] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 93.891366][ T7164] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 93.910435][ T7164] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 93.922050][ T7164] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 93.940496][ T7164] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 93.948791][ T7432] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 93.963136][ T7432] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 93.976318][ T7432] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 93.987446][ T7432] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 94.000016][ T7432] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 94.011131][ T7432] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 94.022017][ T7432] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 94.033126][ T7432] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 94.046090][ T7432] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 94.058344][ T7201] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 94.070385][ T7201] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 94.085901][ T7201] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 94.099609][ T7201] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 94.111589][ T7201] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 94.125083][ T7201] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 94.137825][ T7201] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 94.150005][ T7201] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 94.162763][ T7201] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 94.178142][ T7201] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 94.189861][ T7201] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 94.201914][ T8227] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 94.211294][ T8227] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 94.220893][ T8227] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 94.230266][ T8227] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 94.239359][ T8227] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 94.249236][ T8227] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 94.262004][ T7164] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.272170][ T7164] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.281080][ T7164] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.291685][ T7164] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.305960][ T7432] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 94.318984][ T7432] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 94.328996][ T7432] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 94.339616][ T7432] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 94.349544][ T7432] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 94.360654][ T7432] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 94.376894][ T7432] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 94.389464][ T7432] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 94.406267][ T7432] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 94.425997][ T7201] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 94.438405][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 94.446131][ T7201] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 94.459365][ T7201] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 94.470090][ T7201] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 94.480026][ T7201] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 94.490520][ T7201] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 94.500446][ T7201] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 94.512362][ T7201] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 94.522347][ T7201] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 94.533992][ T7201] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 94.546453][ T7201] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 94.563383][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 94.572166][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 94.582230][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready 10:29:30 executing program 2: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000884, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r4, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) shutdown(r4, 0x1) sendto$inet6(r1, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x30) [ 94.591163][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 94.614341][ T7432] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.623061][ T7432] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.664144][ T7432] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.672862][ T7432] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.715871][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 94.716467][ T7201] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.742980][ T7201] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.752216][ T7201] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.765848][ T7201] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 10:29:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x96) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e31, 0x40, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x5f) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x10, &(0x7f0000000440), 0x4) r2 = gettid() syz_open_procfs(r2, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) gettid() syz_open_procfs(0x0, 0xfffffffffffffffe) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f00000002c0)='\b', 0x1, 0x3fffffa, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@gcm_128={{}, "000000070000fea1", "0000000000ff3111822eadd32a9c00", '\x00', "00f45000000b00"}, 0x28) [ 95.633130][ T8265] gfs2: not a GFS2 filesystem 10:29:31 executing program 4: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@acl='acl'}]}) [ 95.798313][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #08!!! 10:29:31 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xffffff88, 0x0, 0x26}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) 10:29:31 executing program 0: setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) socket$caif_stream(0x25, 0x1, 0x3) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff00, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) read$midi(r1, &(0x7f00000002c0)=""/4096, 0x1000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xe00}}, {@default_permissions='default_permissions'}], [{@smackfshat={'smackfshat', 0x3d, '/dev/loop-control\x00'}}]}}) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:29:31 executing program 1: creat(&(0x7f0000000100)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x3d}}) 10:29:31 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x96) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e31, 0x40, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x5f) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x10, &(0x7f0000000440), 0x4) r2 = gettid() syz_open_procfs(r2, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) gettid() syz_open_procfs(0x0, 0xfffffffffffffffe) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f00000002c0)='\b', 0x1, 0x3fffffa, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@gcm_128={{}, "000000070000fea1", "0000000000ff3111822eadd32a9c00", '\x00', "00f45000000b00"}, 0x28) 10:29:31 executing program 2: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000884, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r4, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) shutdown(r4, 0x1) sendto$inet6(r1, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x30) [ 95.940158][ T8270] gfs2: not a GFS2 filesystem 10:29:31 executing program 4: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@acl='acl'}]}) 10:29:31 executing program 1: creat(&(0x7f0000000100)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x3d}}) [ 96.101650][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:29:31 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x96) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e31, 0x40, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x5f) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x10, &(0x7f0000000440), 0x4) r2 = gettid() syz_open_procfs(r2, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) gettid() syz_open_procfs(0x0, 0xfffffffffffffffe) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f00000002c0)='\b', 0x1, 0x3fffffa, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@gcm_128={{}, "000000070000fea1", "0000000000ff3111822eadd32a9c00", '\x00', "00f45000000b00"}, 0x28) 10:29:31 executing program 0: setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) socket$caif_stream(0x25, 0x1, 0x3) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff00, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) read$midi(r1, &(0x7f00000002c0)=""/4096, 0x1000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xe00}}, {@default_permissions='default_permissions'}], [{@smackfshat={'smackfshat', 0x3d, '/dev/loop-control\x00'}}]}}) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:29:31 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xffffff88, 0x0, 0x26}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) [ 96.273322][ T8293] gfs2: not a GFS2 filesystem 10:29:32 executing program 4: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@acl='acl'}]}) 10:29:32 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xffffff88, 0x0, 0x26}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) [ 96.620046][ T8311] gfs2: not a GFS2 filesystem 10:29:32 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x96) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e31, 0x40, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x5f) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x10, &(0x7f0000000440), 0x4) r2 = gettid() syz_open_procfs(r2, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) gettid() syz_open_procfs(0x0, 0xfffffffffffffffe) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f00000002c0)='\b', 0x1, 0x3fffffa, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@gcm_128={{}, "000000070000fea1", "0000000000ff3111822eadd32a9c00", '\x00', "00f45000000b00"}, 0x28) 10:29:32 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x96) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e31, 0x40, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x5f) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x10, &(0x7f0000000440), 0x4) r2 = gettid() syz_open_procfs(r2, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) gettid() syz_open_procfs(0x0, 0xfffffffffffffffe) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f00000002c0)='\b', 0x1, 0x3fffffa, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@gcm_128={{}, "000000070000fea1", "0000000000ff3111822eadd32a9c00", '\x00', "00f45000000b00"}, 0x28) 10:29:32 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x96) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e31, 0x40, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x5f) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x10, &(0x7f0000000440), 0x4) r2 = gettid() syz_open_procfs(r2, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) gettid() syz_open_procfs(0x0, 0xfffffffffffffffe) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f00000002c0)='\b', 0x1, 0x3fffffa, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@gcm_128={{}, "000000070000fea1", "0000000000ff3111822eadd32a9c00", '\x00', "00f45000000b00"}, 0x28) 10:29:32 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x96) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e31, 0x40, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x5f) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x10, &(0x7f0000000440), 0x4) r2 = gettid() syz_open_procfs(r2, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) gettid() syz_open_procfs(0x0, 0xfffffffffffffffe) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f00000002c0)='\b', 0x1, 0x3fffffa, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@gcm_128={{}, "000000070000fea1", "0000000000ff3111822eadd32a9c00", '\x00', "00f45000000b00"}, 0x28) 10:29:32 executing program 2: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000884, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r4, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) shutdown(r4, 0x1) sendto$inet6(r1, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x30) 10:29:32 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x96) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e31, 0x40, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x5f) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x10, &(0x7f0000000440), 0x4) r2 = gettid() syz_open_procfs(r2, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) gettid() syz_open_procfs(0x0, 0xfffffffffffffffe) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f00000002c0)='\b', 0x1, 0x3fffffa, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@gcm_128={{}, "000000070000fea1", "0000000000ff3111822eadd32a9c00", '\x00', "00f45000000b00"}, 0x28) 10:29:32 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x96) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e31, 0x40, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x5f) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x10, &(0x7f0000000440), 0x4) r2 = gettid() syz_open_procfs(r2, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) gettid() syz_open_procfs(0x0, 0xfffffffffffffffe) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f00000002c0)='\b', 0x1, 0x3fffffa, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@gcm_128={{}, "000000070000fea1", "0000000000ff3111822eadd32a9c00", '\x00', "00f45000000b00"}, 0x28) 10:29:32 executing program 5: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000884, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r4, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) shutdown(r4, 0x1) sendto$inet6(r1, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x30) 10:29:32 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x96) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e31, 0x40, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x5f) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x10, &(0x7f0000000440), 0x4) r2 = gettid() syz_open_procfs(r2, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) gettid() syz_open_procfs(0x0, 0xfffffffffffffffe) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f00000002c0)='\b', 0x1, 0x3fffffa, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@gcm_128={{}, "000000070000fea1", "0000000000ff3111822eadd32a9c00", '\x00', "00f45000000b00"}, 0x28) [ 97.201681][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 97.218892][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:29:32 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x96) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e31, 0x40, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x5f) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x10, &(0x7f0000000440), 0x4) r2 = gettid() syz_open_procfs(r2, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) gettid() syz_open_procfs(0x0, 0xfffffffffffffffe) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f00000002c0)='\b', 0x1, 0x3fffffa, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@gcm_128={{}, "000000070000fea1", "0000000000ff3111822eadd32a9c00", '\x00', "00f45000000b00"}, 0x28) 10:29:32 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x96) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e31, 0x40, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x5f) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x10, &(0x7f0000000440), 0x4) r2 = gettid() syz_open_procfs(r2, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) gettid() syz_open_procfs(0x0, 0xfffffffffffffffe) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f00000002c0)='\b', 0x1, 0x3fffffa, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@gcm_128={{}, "000000070000fea1", "0000000000ff3111822eadd32a9c00", '\x00', "00f45000000b00"}, 0x28) 10:29:32 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x96) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e31, 0x40, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x5f) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x10, &(0x7f0000000440), 0x4) r2 = gettid() syz_open_procfs(r2, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) gettid() syz_open_procfs(0x0, 0xfffffffffffffffe) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f00000002c0)='\b', 0x1, 0x3fffffa, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@gcm_128={{}, "000000070000fea1", "0000000000ff3111822eadd32a9c00", '\x00', "00f45000000b00"}, 0x28) 10:29:33 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x96) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e31, 0x40, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x5f) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x10, &(0x7f0000000440), 0x4) r2 = gettid() syz_open_procfs(r2, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) gettid() syz_open_procfs(0x0, 0xfffffffffffffffe) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f00000002c0)='\b', 0x1, 0x3fffffa, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@gcm_128={{}, "000000070000fea1", "0000000000ff3111822eadd32a9c00", '\x00', "00f45000000b00"}, 0x28) 10:29:33 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x96) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e31, 0x40, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x5f) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x10, &(0x7f0000000440), 0x4) r2 = gettid() syz_open_procfs(r2, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) gettid() syz_open_procfs(0x0, 0xfffffffffffffffe) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f00000002c0)='\b', 0x1, 0x3fffffa, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@gcm_128={{}, "000000070000fea1", "0000000000ff3111822eadd32a9c00", '\x00', "00f45000000b00"}, 0x28) 10:29:33 executing program 1: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000884, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r4, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) shutdown(r4, 0x1) sendto$inet6(r1, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x30) 10:29:33 executing program 3: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000884, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r4, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) shutdown(r4, 0x1) sendto$inet6(r1, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x30) [ 97.874966][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 97.906956][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:29:33 executing program 4: setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) socket$caif_stream(0x25, 0x1, 0x3) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff00, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) read$midi(r1, &(0x7f00000002c0)=""/4096, 0x1000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xe00}}, {@default_permissions='default_permissions'}], [{@smackfshat={'smackfshat', 0x3d, '/dev/loop-control\x00'}}]}}) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:29:33 executing program 0: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000884, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r4, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) shutdown(r4, 0x1) sendto$inet6(r1, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x30) 10:29:33 executing program 5: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000884, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r4, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) shutdown(r4, 0x1) sendto$inet6(r1, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x30) 10:29:33 executing program 2: setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) socket$caif_stream(0x25, 0x1, 0x3) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff00, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) read$midi(r1, &(0x7f00000002c0)=""/4096, 0x1000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xe00}}, {@default_permissions='default_permissions'}], [{@smackfshat={'smackfshat', 0x3d, '/dev/loop-control\x00'}}]}}) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 98.475539][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 98.535559][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:29:34 executing program 4: setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) socket$caif_stream(0x25, 0x1, 0x3) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff00, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) read$midi(r1, &(0x7f00000002c0)=""/4096, 0x1000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xe00}}, {@default_permissions='default_permissions'}], [{@smackfshat={'smackfshat', 0x3d, '/dev/loop-control\x00'}}]}}) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 98.615273][ T8410] splice write not supported for file net/ipv4/vs/lblcr_expiration (pid: 8410 comm: syz-executor.2) 10:29:34 executing program 2: setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) socket$caif_stream(0x25, 0x1, 0x3) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff00, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) read$midi(r1, &(0x7f00000002c0)=""/4096, 0x1000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xe00}}, {@default_permissions='default_permissions'}], [{@smackfshat={'smackfshat', 0x3d, '/dev/loop-control\x00'}}]}}) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:29:34 executing program 3: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000884, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r4, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) shutdown(r4, 0x1) sendto$inet6(r1, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x30) 10:29:34 executing program 4: setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) socket$caif_stream(0x25, 0x1, 0x3) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff00, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) read$midi(r1, &(0x7f00000002c0)=""/4096, 0x1000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xe00}}, {@default_permissions='default_permissions'}], [{@smackfshat={'smackfshat', 0x3d, '/dev/loop-control\x00'}}]}}) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:29:34 executing program 1: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000884, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r4, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) shutdown(r4, 0x1) sendto$inet6(r1, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x30) 10:29:34 executing program 2: setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) socket$caif_stream(0x25, 0x1, 0x3) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff00, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) read$midi(r1, &(0x7f00000002c0)=""/4096, 0x1000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xe00}}, {@default_permissions='default_permissions'}], [{@smackfshat={'smackfshat', 0x3d, '/dev/loop-control\x00'}}]}}) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 99.343171][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 99.413603][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:29:35 executing program 4: setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) socket$caif_stream(0x25, 0x1, 0x3) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff00, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) read$midi(r1, &(0x7f00000002c0)=""/4096, 0x1000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xe00}}, {@default_permissions='default_permissions'}], [{@smackfshat={'smackfshat', 0x3d, '/dev/loop-control\x00'}}]}}) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:29:35 executing program 0: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000884, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r4, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) shutdown(r4, 0x1) sendto$inet6(r1, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x30) 10:29:35 executing program 2: setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) socket$caif_stream(0x25, 0x1, 0x3) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff00, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) read$midi(r1, &(0x7f00000002c0)=""/4096, 0x1000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xe00}}, {@default_permissions='default_permissions'}], [{@smackfshat={'smackfshat', 0x3d, '/dev/loop-control\x00'}}]}}) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:29:35 executing program 5: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000884, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r4, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) shutdown(r4, 0x1) sendto$inet6(r1, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x30) 10:29:35 executing program 4: setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) socket$caif_stream(0x25, 0x1, 0x3) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff00, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) read$midi(r1, &(0x7f00000002c0)=""/4096, 0x1000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xe00}}, {@default_permissions='default_permissions'}], [{@smackfshat={'smackfshat', 0x3d, '/dev/loop-control\x00'}}]}}) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 99.857914][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 99.964832][ T8441] splice write not supported for file net/ipv4/vs/lblcr_expiration (pid: 8441 comm: syz-executor.2) [ 99.990702][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:29:35 executing program 2: setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) socket$caif_stream(0x25, 0x1, 0x3) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff00, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) read$midi(r1, &(0x7f00000002c0)=""/4096, 0x1000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xe00}}, {@default_permissions='default_permissions'}], [{@smackfshat={'smackfshat', 0x3d, '/dev/loop-control\x00'}}]}}) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:29:35 executing program 4: setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) socket$caif_stream(0x25, 0x1, 0x3) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff00, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) read$midi(r1, &(0x7f00000002c0)=""/4096, 0x1000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xe00}}, {@default_permissions='default_permissions'}], [{@smackfshat={'smackfshat', 0x3d, '/dev/loop-control\x00'}}]}}) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:29:36 executing program 1: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000884, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r4, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) shutdown(r4, 0x1) sendto$inet6(r1, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x30) 10:29:36 executing program 3: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000884, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r4, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) shutdown(r4, 0x1) sendto$inet6(r1, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x30) 10:29:36 executing program 2: setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x100000114, 0x2, 0x0, 0x0) socket$caif_stream(0x25, 0x1, 0x3) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff00, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) read$midi(r1, &(0x7f00000002c0)=""/4096, 0x1000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xe00}}, {@default_permissions='default_permissions'}], [{@smackfshat={'smackfshat', 0x3d, '/dev/loop-control\x00'}}]}}) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:29:36 executing program 4: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x14, r0, 0x1}, 0x14}}, 0x0) [ 100.769543][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 100.784916][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:29:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fremovexattr(r1, &(0x7f0000000080)=@random={'btrfs.', '$]\x00'}) 10:29:36 executing program 0: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000884, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r4, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) shutdown(r4, 0x1) sendto$inet6(r1, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x30) 10:29:36 executing program 4: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x14, r0, 0x1}, 0x14}}, 0x0) 10:29:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000200)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="c800000000000000000000027f000000f25440660bf7437039f6dfcf9fb3a0f53cb94bcdcb34fee193ff3da7cbc078e8741d445c125f330ee2d0a77105f88f1de7c2b640d778abc81873931bf1f08ef2"], 0xc8}, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, 0x0) close(0xffffffffffffffff) chdir(&(0x7f00000002c0)='./bus\x00') socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100), 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000000)={0x0, 0x3}, 0x8) [ 101.177489][ T8480] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 10:29:36 executing program 4: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x14, r0, 0x1}, 0x14}}, 0x0) [ 101.314071][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:29:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fremovexattr(r1, &(0x7f0000000080)=@random={'btrfs.', '$]\x00'}) 10:29:37 executing program 4: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x14, r0, 0x1}, 0x14}}, 0x0) 10:29:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000200)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="c800000000000000000000027f000000f25440660bf7437039f6dfcf9fb3a0f53cb94bcdcb34fee193ff3da7cbc078e8741d445c125f330ee2d0a77105f88f1de7c2b640d778abc81873931bf1f08ef2"], 0xc8}, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, 0x0) close(0xffffffffffffffff) chdir(&(0x7f00000002c0)='./bus\x00') socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100), 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000000)={0x0, 0x3}, 0x8) 10:29:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fremovexattr(r1, &(0x7f0000000080)=@random={'btrfs.', '$]\x00'}) 10:29:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000200)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="c800000000000000000000027f000000f25440660bf7437039f6dfcf9fb3a0f53cb94bcdcb34fee193ff3da7cbc078e8741d445c125f330ee2d0a77105f88f1de7c2b640d778abc81873931bf1f08ef2"], 0xc8}, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, 0x0) close(0xffffffffffffffff) chdir(&(0x7f00000002c0)='./bus\x00') socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100), 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000000)={0x0, 0x3}, 0x8) 10:29:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000200)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="c800000000000000000000027f000000f25440660bf7437039f6dfcf9fb3a0f53cb94bcdcb34fee193ff3da7cbc078e8741d445c125f330ee2d0a77105f88f1de7c2b640d778abc81873931bf1f08ef2"], 0xc8}, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, 0x0) close(0xffffffffffffffff) chdir(&(0x7f00000002c0)='./bus\x00') socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100), 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000000)={0x0, 0x3}, 0x8) 10:29:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="c7300000dd80d63d462719"], 0x14}, 0x1, 0xf618000000000000}, 0x0) 10:29:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fremovexattr(r1, &(0x7f0000000080)=@random={'btrfs.', '$]\x00'}) 10:29:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f00000001c0)={0x3, [0x2de8000000000, 0x6, 0xffffffffffffff45]}) r3 = creat(&(0x7f0000000280)='./file0\x00', 0xab) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000a80)='\xa11\xc2\x1fQ\x88\xebH\xe7\xcf/\x83\xb3+\xc5\xa0\xa6\xbf\x85\xf0;\xea\x8a\xd5b\xb0\xe7=\xf41\xf5\xb4\xb9\aPk\x94csn\x8bu\bHD\x06\f\xccU\x19\xaa\xe0\xed\x85\xb1%\xd8\x82\xaeW\x8764\x93\xb6`\x90\xb1\x1d\xd6\x91\x9a\xf5I:=\xd9\x98\t\x03\x13\xa4f\x13\xeb\x11\xd5\x17J]\x8b\xc18v\xfc\xa9\xcb|\xd4\x1a\x91\x81c\xeb\r|\xdbo\xa8?\xa8\x192\t\x10\x1bhGZ\xc0\xe7\xc3{b\xc0Z\xe5&\r\n\x858\x94V\x9f\xbah\x8f\x91\xa4\x8a\x90\xa7\x10\x85kYh\xb6\x0f\t0-\x9f@\xc2\xbbR.>\xc5;\xceJ\x14QJ0CrCP\x1e\xea\x8b\xc3z\xb8\x7f+\x94LV&\x8e\xce\xecA\xd6\x12#\xdb\x90\xf9\x9d\x03T\x89[G\xa8\xa4\xa9\xa7r\xd8x(\x9dv9\x16\x1dH=\x82?>-\x84R\x11\x94\x17\x01\x03\xc4\xa3\xb3?\xecyq\x86Y'], &(0x7f0000000140)=[&(0x7f0000000480)='\xa11\xc2\x1fQ\x88\xebH\xe7\xcf/\x83\xb3+\xc5\xa0\xa6\xbf\x85\xf0;\xea\x8a\xd5b\xb0\xe7=\xf41\xf5\xb4\xb9\aPk\x94csn\x8bu\bHD\x06\f\xccU\x19\xaa\xe0\xed\x85\xb1%\xd8\x82\xaeW\x8764\x93\xb6`\x90\xb1\x1d\xd6\x91\x9a\xf5I:=\xd9\x98\t\x03\x13\xa4f\x13\xeb\x11\xd5\x17J]\x8b\xc18v\xfc\xa9\xcb|\xd4\x1a\x91\x81c\xeb\r|\xdbo\xa8?\xa8\x192\t\x10\x1bhGZ\xc0\xe7\xc3{b\xc0Z\xe5&\r\n\x858\x94V\x9f\xbah\x8f\x91\xa4\x8a\x90\xa7\x10\x85kYh\xb6\x0f\t0-\x9f@\xc2\xbbR.>\xc5;\xceJ\x14QJ0CrCP\x1e\xea\x8b\xc3z\xb8\x7f+\x94LV&\x8e\xce\xecA\xd6\x12#\xdb\x90\xf9\x9d\x03T\x89[G\xa8\xa4\xa9\xa7r\xd8x(\x9dv9\x16\x1dH=\x82?>-\x84R\x11\x94\x17\x01\x03\xc4\xa3\xb3?\xecyq\x86Y', 0x0]) ptrace$setopts(0x4206, r1, 0x0, 0x2) 10:29:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="c7300000dd80d63d462719"], 0x14}, 0x1, 0xf618000000000000}, 0x0) 10:29:38 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', 0x0, 0x0, 0x0) 10:29:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000200)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="c800000000000000000000027f000000f25440660bf7437039f6dfcf9fb3a0f53cb94bcdcb34fee193ff3da7cbc078e8741d445c125f330ee2d0a77105f88f1de7c2b640d778abc81873931bf1f08ef2"], 0xc8}, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, 0x0) close(0xffffffffffffffff) chdir(&(0x7f00000002c0)='./bus\x00') socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100), 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000000)={0x0, 0x3}, 0x8) 10:29:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="c7300000dd80d63d462719"], 0x14}, 0x1, 0xf618000000000000}, 0x0) 10:29:38 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', 0x0, 0x0, 0x0) [ 102.908534][ T8534] ptrace attach of "/root/syz-executor.2"[8532] was attempted by "/root/syz-executor.2"[8534] 10:29:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000200)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="c800000000000000000000027f000000f25440660bf7437039f6dfcf9fb3a0f53cb94bcdcb34fee193ff3da7cbc078e8741d445c125f330ee2d0a77105f88f1de7c2b640d778abc81873931bf1f08ef2"], 0xc8}, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, 0x0) close(0xffffffffffffffff) chdir(&(0x7f00000002c0)='./bus\x00') socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100), 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000000)={0x0, 0x3}, 0x8) 10:29:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="c7300000dd80d63d462719"], 0x14}, 0x1, 0xf618000000000000}, 0x0) 10:29:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000200)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="c800000000000000000000027f000000f25440660bf7437039f6dfcf9fb3a0f53cb94bcdcb34fee193ff3da7cbc078e8741d445c125f330ee2d0a77105f88f1de7c2b640d778abc81873931bf1f08ef2"], 0xc8}, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, 0x0) close(0xffffffffffffffff) chdir(&(0x7f00000002c0)='./bus\x00') socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100), 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000000)={0x0, 0x3}, 0x8) 10:29:39 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', 0x0, 0x0, 0x0) 10:29:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f00000001c0)={0x3, [0x2de8000000000, 0x6, 0xffffffffffffff45]}) r3 = creat(&(0x7f0000000280)='./file0\x00', 0xab) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000a80)='\xa11\xc2\x1fQ\x88\xebH\xe7\xcf/\x83\xb3+\xc5\xa0\xa6\xbf\x85\xf0;\xea\x8a\xd5b\xb0\xe7=\xf41\xf5\xb4\xb9\aPk\x94csn\x8bu\bHD\x06\f\xccU\x19\xaa\xe0\xed\x85\xb1%\xd8\x82\xaeW\x8764\x93\xb6`\x90\xb1\x1d\xd6\x91\x9a\xf5I:=\xd9\x98\t\x03\x13\xa4f\x13\xeb\x11\xd5\x17J]\x8b\xc18v\xfc\xa9\xcb|\xd4\x1a\x91\x81c\xeb\r|\xdbo\xa8?\xa8\x192\t\x10\x1bhGZ\xc0\xe7\xc3{b\xc0Z\xe5&\r\n\x858\x94V\x9f\xbah\x8f\x91\xa4\x8a\x90\xa7\x10\x85kYh\xb6\x0f\t0-\x9f@\xc2\xbbR.>\xc5;\xceJ\x14QJ0CrCP\x1e\xea\x8b\xc3z\xb8\x7f+\x94LV&\x8e\xce\xecA\xd6\x12#\xdb\x90\xf9\x9d\x03T\x89[G\xa8\xa4\xa9\xa7r\xd8x(\x9dv9\x16\x1dH=\x82?>-\x84R\x11\x94\x17\x01\x03\xc4\xa3\xb3?\xecyq\x86Y'], &(0x7f0000000140)=[&(0x7f0000000480)='\xa11\xc2\x1fQ\x88\xebH\xe7\xcf/\x83\xb3+\xc5\xa0\xa6\xbf\x85\xf0;\xea\x8a\xd5b\xb0\xe7=\xf41\xf5\xb4\xb9\aPk\x94csn\x8bu\bHD\x06\f\xccU\x19\xaa\xe0\xed\x85\xb1%\xd8\x82\xaeW\x8764\x93\xb6`\x90\xb1\x1d\xd6\x91\x9a\xf5I:=\xd9\x98\t\x03\x13\xa4f\x13\xeb\x11\xd5\x17J]\x8b\xc18v\xfc\xa9\xcb|\xd4\x1a\x91\x81c\xeb\r|\xdbo\xa8?\xa8\x192\t\x10\x1bhGZ\xc0\xe7\xc3{b\xc0Z\xe5&\r\n\x858\x94V\x9f\xbah\x8f\x91\xa4\x8a\x90\xa7\x10\x85kYh\xb6\x0f\t0-\x9f@\xc2\xbbR.>\xc5;\xceJ\x14QJ0CrCP\x1e\xea\x8b\xc3z\xb8\x7f+\x94LV&\x8e\xce\xecA\xd6\x12#\xdb\x90\xf9\x9d\x03T\x89[G\xa8\xa4\xa9\xa7r\xd8x(\x9dv9\x16\x1dH=\x82?>-\x84R\x11\x94\x17\x01\x03\xc4\xa3\xb3?\xecyq\x86Y', 0x0]) ptrace$setopts(0x4206, r1, 0x0, 0x2) 10:29:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000200)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="c800000000000000000000027f000000f25440660bf7437039f6dfcf9fb3a0f53cb94bcdcb34fee193ff3da7cbc078e8741d445c125f330ee2d0a77105f88f1de7c2b640d778abc81873931bf1f08ef2"], 0xc8}, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, 0x0) close(0xffffffffffffffff) chdir(&(0x7f00000002c0)='./bus\x00') socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100), 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000000)={0x0, 0x3}, 0x8) 10:29:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f00000001c0)={0x3, [0x2de8000000000, 0x6, 0xffffffffffffff45]}) r3 = creat(&(0x7f0000000280)='./file0\x00', 0xab) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000a80)='\xa11\xc2\x1fQ\x88\xebH\xe7\xcf/\x83\xb3+\xc5\xa0\xa6\xbf\x85\xf0;\xea\x8a\xd5b\xb0\xe7=\xf41\xf5\xb4\xb9\aPk\x94csn\x8bu\bHD\x06\f\xccU\x19\xaa\xe0\xed\x85\xb1%\xd8\x82\xaeW\x8764\x93\xb6`\x90\xb1\x1d\xd6\x91\x9a\xf5I:=\xd9\x98\t\x03\x13\xa4f\x13\xeb\x11\xd5\x17J]\x8b\xc18v\xfc\xa9\xcb|\xd4\x1a\x91\x81c\xeb\r|\xdbo\xa8?\xa8\x192\t\x10\x1bhGZ\xc0\xe7\xc3{b\xc0Z\xe5&\r\n\x858\x94V\x9f\xbah\x8f\x91\xa4\x8a\x90\xa7\x10\x85kYh\xb6\x0f\t0-\x9f@\xc2\xbbR.>\xc5;\xceJ\x14QJ0CrCP\x1e\xea\x8b\xc3z\xb8\x7f+\x94LV&\x8e\xce\xecA\xd6\x12#\xdb\x90\xf9\x9d\x03T\x89[G\xa8\xa4\xa9\xa7r\xd8x(\x9dv9\x16\x1dH=\x82?>-\x84R\x11\x94\x17\x01\x03\xc4\xa3\xb3?\xecyq\x86Y'], &(0x7f0000000140)=[&(0x7f0000000480)='\xa11\xc2\x1fQ\x88\xebH\xe7\xcf/\x83\xb3+\xc5\xa0\xa6\xbf\x85\xf0;\xea\x8a\xd5b\xb0\xe7=\xf41\xf5\xb4\xb9\aPk\x94csn\x8bu\bHD\x06\f\xccU\x19\xaa\xe0\xed\x85\xb1%\xd8\x82\xaeW\x8764\x93\xb6`\x90\xb1\x1d\xd6\x91\x9a\xf5I:=\xd9\x98\t\x03\x13\xa4f\x13\xeb\x11\xd5\x17J]\x8b\xc18v\xfc\xa9\xcb|\xd4\x1a\x91\x81c\xeb\r|\xdbo\xa8?\xa8\x192\t\x10\x1bhGZ\xc0\xe7\xc3{b\xc0Z\xe5&\r\n\x858\x94V\x9f\xbah\x8f\x91\xa4\x8a\x90\xa7\x10\x85kYh\xb6\x0f\t0-\x9f@\xc2\xbbR.>\xc5;\xceJ\x14QJ0CrCP\x1e\xea\x8b\xc3z\xb8\x7f+\x94LV&\x8e\xce\xecA\xd6\x12#\xdb\x90\xf9\x9d\x03T\x89[G\xa8\xa4\xa9\xa7r\xd8x(\x9dv9\x16\x1dH=\x82?>-\x84R\x11\x94\x17\x01\x03\xc4\xa3\xb3?\xecyq\x86Y', 0x0]) ptrace$setopts(0x4206, r1, 0x0, 0x2) 10:29:39 executing program 0: r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', 0x0, 0x0, 0x0) 10:29:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f00000001c0)={0x3, [0x2de8000000000, 0x6, 0xffffffffffffff45]}) r3 = creat(&(0x7f0000000280)='./file0\x00', 0xab) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000a80)='\xa11\xc2\x1fQ\x88\xebH\xe7\xcf/\x83\xb3+\xc5\xa0\xa6\xbf\x85\xf0;\xea\x8a\xd5b\xb0\xe7=\xf41\xf5\xb4\xb9\aPk\x94csn\x8bu\bHD\x06\f\xccU\x19\xaa\xe0\xed\x85\xb1%\xd8\x82\xaeW\x8764\x93\xb6`\x90\xb1\x1d\xd6\x91\x9a\xf5I:=\xd9\x98\t\x03\x13\xa4f\x13\xeb\x11\xd5\x17J]\x8b\xc18v\xfc\xa9\xcb|\xd4\x1a\x91\x81c\xeb\r|\xdbo\xa8?\xa8\x192\t\x10\x1bhGZ\xc0\xe7\xc3{b\xc0Z\xe5&\r\n\x858\x94V\x9f\xbah\x8f\x91\xa4\x8a\x90\xa7\x10\x85kYh\xb6\x0f\t0-\x9f@\xc2\xbbR.>\xc5;\xceJ\x14QJ0CrCP\x1e\xea\x8b\xc3z\xb8\x7f+\x94LV&\x8e\xce\xecA\xd6\x12#\xdb\x90\xf9\x9d\x03T\x89[G\xa8\xa4\xa9\xa7r\xd8x(\x9dv9\x16\x1dH=\x82?>-\x84R\x11\x94\x17\x01\x03\xc4\xa3\xb3?\xecyq\x86Y'], &(0x7f0000000140)=[&(0x7f0000000480)='\xa11\xc2\x1fQ\x88\xebH\xe7\xcf/\x83\xb3+\xc5\xa0\xa6\xbf\x85\xf0;\xea\x8a\xd5b\xb0\xe7=\xf41\xf5\xb4\xb9\aPk\x94csn\x8bu\bHD\x06\f\xccU\x19\xaa\xe0\xed\x85\xb1%\xd8\x82\xaeW\x8764\x93\xb6`\x90\xb1\x1d\xd6\x91\x9a\xf5I:=\xd9\x98\t\x03\x13\xa4f\x13\xeb\x11\xd5\x17J]\x8b\xc18v\xfc\xa9\xcb|\xd4\x1a\x91\x81c\xeb\r|\xdbo\xa8?\xa8\x192\t\x10\x1bhGZ\xc0\xe7\xc3{b\xc0Z\xe5&\r\n\x858\x94V\x9f\xbah\x8f\x91\xa4\x8a\x90\xa7\x10\x85kYh\xb6\x0f\t0-\x9f@\xc2\xbbR.>\xc5;\xceJ\x14QJ0CrCP\x1e\xea\x8b\xc3z\xb8\x7f+\x94LV&\x8e\xce\xecA\xd6\x12#\xdb\x90\xf9\x9d\x03T\x89[G\xa8\xa4\xa9\xa7r\xd8x(\x9dv9\x16\x1dH=\x82?>-\x84R\x11\x94\x17\x01\x03\xc4\xa3\xb3?\xecyq\x86Y', 0x0]) ptrace$setopts(0x4206, r1, 0x0, 0x2) 10:29:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f00000001c0)={0x3, [0x2de8000000000, 0x6, 0xffffffffffffff45]}) r3 = creat(&(0x7f0000000280)='./file0\x00', 0xab) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000a80)='\xa11\xc2\x1fQ\x88\xebH\xe7\xcf/\x83\xb3+\xc5\xa0\xa6\xbf\x85\xf0;\xea\x8a\xd5b\xb0\xe7=\xf41\xf5\xb4\xb9\aPk\x94csn\x8bu\bHD\x06\f\xccU\x19\xaa\xe0\xed\x85\xb1%\xd8\x82\xaeW\x8764\x93\xb6`\x90\xb1\x1d\xd6\x91\x9a\xf5I:=\xd9\x98\t\x03\x13\xa4f\x13\xeb\x11\xd5\x17J]\x8b\xc18v\xfc\xa9\xcb|\xd4\x1a\x91\x81c\xeb\r|\xdbo\xa8?\xa8\x192\t\x10\x1bhGZ\xc0\xe7\xc3{b\xc0Z\xe5&\r\n\x858\x94V\x9f\xbah\x8f\x91\xa4\x8a\x90\xa7\x10\x85kYh\xb6\x0f\t0-\x9f@\xc2\xbbR.>\xc5;\xceJ\x14QJ0CrCP\x1e\xea\x8b\xc3z\xb8\x7f+\x94LV&\x8e\xce\xecA\xd6\x12#\xdb\x90\xf9\x9d\x03T\x89[G\xa8\xa4\xa9\xa7r\xd8x(\x9dv9\x16\x1dH=\x82?>-\x84R\x11\x94\x17\x01\x03\xc4\xa3\xb3?\xecyq\x86Y'], &(0x7f0000000140)=[&(0x7f0000000480)='\xa11\xc2\x1fQ\x88\xebH\xe7\xcf/\x83\xb3+\xc5\xa0\xa6\xbf\x85\xf0;\xea\x8a\xd5b\xb0\xe7=\xf41\xf5\xb4\xb9\aPk\x94csn\x8bu\bHD\x06\f\xccU\x19\xaa\xe0\xed\x85\xb1%\xd8\x82\xaeW\x8764\x93\xb6`\x90\xb1\x1d\xd6\x91\x9a\xf5I:=\xd9\x98\t\x03\x13\xa4f\x13\xeb\x11\xd5\x17J]\x8b\xc18v\xfc\xa9\xcb|\xd4\x1a\x91\x81c\xeb\r|\xdbo\xa8?\xa8\x192\t\x10\x1bhGZ\xc0\xe7\xc3{b\xc0Z\xe5&\r\n\x858\x94V\x9f\xbah\x8f\x91\xa4\x8a\x90\xa7\x10\x85kYh\xb6\x0f\t0-\x9f@\xc2\xbbR.>\xc5;\xceJ\x14QJ0CrCP\x1e\xea\x8b\xc3z\xb8\x7f+\x94LV&\x8e\xce\xecA\xd6\x12#\xdb\x90\xf9\x9d\x03T\x89[G\xa8\xa4\xa9\xa7r\xd8x(\x9dv9\x16\x1dH=\x82?>-\x84R\x11\x94\x17\x01\x03\xc4\xa3\xb3?\xecyq\x86Y', 0x0]) ptrace$setopts(0x4206, r1, 0x0, 0x2) 10:29:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f00000001c0)={0x3, [0x2de8000000000, 0x6, 0xffffffffffffff45]}) r3 = creat(&(0x7f0000000280)='./file0\x00', 0xab) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000a80)='\xa11\xc2\x1fQ\x88\xebH\xe7\xcf/\x83\xb3+\xc5\xa0\xa6\xbf\x85\xf0;\xea\x8a\xd5b\xb0\xe7=\xf41\xf5\xb4\xb9\aPk\x94csn\x8bu\bHD\x06\f\xccU\x19\xaa\xe0\xed\x85\xb1%\xd8\x82\xaeW\x8764\x93\xb6`\x90\xb1\x1d\xd6\x91\x9a\xf5I:=\xd9\x98\t\x03\x13\xa4f\x13\xeb\x11\xd5\x17J]\x8b\xc18v\xfc\xa9\xcb|\xd4\x1a\x91\x81c\xeb\r|\xdbo\xa8?\xa8\x192\t\x10\x1bhGZ\xc0\xe7\xc3{b\xc0Z\xe5&\r\n\x858\x94V\x9f\xbah\x8f\x91\xa4\x8a\x90\xa7\x10\x85kYh\xb6\x0f\t0-\x9f@\xc2\xbbR.>\xc5;\xceJ\x14QJ0CrCP\x1e\xea\x8b\xc3z\xb8\x7f+\x94LV&\x8e\xce\xecA\xd6\x12#\xdb\x90\xf9\x9d\x03T\x89[G\xa8\xa4\xa9\xa7r\xd8x(\x9dv9\x16\x1dH=\x82?>-\x84R\x11\x94\x17\x01\x03\xc4\xa3\xb3?\xecyq\x86Y'], &(0x7f0000000140)=[&(0x7f0000000480)='\xa11\xc2\x1fQ\x88\xebH\xe7\xcf/\x83\xb3+\xc5\xa0\xa6\xbf\x85\xf0;\xea\x8a\xd5b\xb0\xe7=\xf41\xf5\xb4\xb9\aPk\x94csn\x8bu\bHD\x06\f\xccU\x19\xaa\xe0\xed\x85\xb1%\xd8\x82\xaeW\x8764\x93\xb6`\x90\xb1\x1d\xd6\x91\x9a\xf5I:=\xd9\x98\t\x03\x13\xa4f\x13\xeb\x11\xd5\x17J]\x8b\xc18v\xfc\xa9\xcb|\xd4\x1a\x91\x81c\xeb\r|\xdbo\xa8?\xa8\x192\t\x10\x1bhGZ\xc0\xe7\xc3{b\xc0Z\xe5&\r\n\x858\x94V\x9f\xbah\x8f\x91\xa4\x8a\x90\xa7\x10\x85kYh\xb6\x0f\t0-\x9f@\xc2\xbbR.>\xc5;\xceJ\x14QJ0CrCP\x1e\xea\x8b\xc3z\xb8\x7f+\x94LV&\x8e\xce\xecA\xd6\x12#\xdb\x90\xf9\x9d\x03T\x89[G\xa8\xa4\xa9\xa7r\xd8x(\x9dv9\x16\x1dH=\x82?>-\x84R\x11\x94\x17\x01\x03\xc4\xa3\xb3?\xecyq\x86Y', 0x0]) ptrace$setopts(0x4206, r1, 0x0, 0x2) 10:29:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f00000001c0)={0x3, [0x2de8000000000, 0x6, 0xffffffffffffff45]}) r3 = creat(&(0x7f0000000280)='./file0\x00', 0xab) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000a80)='\xa11\xc2\x1fQ\x88\xebH\xe7\xcf/\x83\xb3+\xc5\xa0\xa6\xbf\x85\xf0;\xea\x8a\xd5b\xb0\xe7=\xf41\xf5\xb4\xb9\aPk\x94csn\x8bu\bHD\x06\f\xccU\x19\xaa\xe0\xed\x85\xb1%\xd8\x82\xaeW\x8764\x93\xb6`\x90\xb1\x1d\xd6\x91\x9a\xf5I:=\xd9\x98\t\x03\x13\xa4f\x13\xeb\x11\xd5\x17J]\x8b\xc18v\xfc\xa9\xcb|\xd4\x1a\x91\x81c\xeb\r|\xdbo\xa8?\xa8\x192\t\x10\x1bhGZ\xc0\xe7\xc3{b\xc0Z\xe5&\r\n\x858\x94V\x9f\xbah\x8f\x91\xa4\x8a\x90\xa7\x10\x85kYh\xb6\x0f\t0-\x9f@\xc2\xbbR.>\xc5;\xceJ\x14QJ0CrCP\x1e\xea\x8b\xc3z\xb8\x7f+\x94LV&\x8e\xce\xecA\xd6\x12#\xdb\x90\xf9\x9d\x03T\x89[G\xa8\xa4\xa9\xa7r\xd8x(\x9dv9\x16\x1dH=\x82?>-\x84R\x11\x94\x17\x01\x03\xc4\xa3\xb3?\xecyq\x86Y'], &(0x7f0000000140)=[&(0x7f0000000480)='\xa11\xc2\x1fQ\x88\xebH\xe7\xcf/\x83\xb3+\xc5\xa0\xa6\xbf\x85\xf0;\xea\x8a\xd5b\xb0\xe7=\xf41\xf5\xb4\xb9\aPk\x94csn\x8bu\bHD\x06\f\xccU\x19\xaa\xe0\xed\x85\xb1%\xd8\x82\xaeW\x8764\x93\xb6`\x90\xb1\x1d\xd6\x91\x9a\xf5I:=\xd9\x98\t\x03\x13\xa4f\x13\xeb\x11\xd5\x17J]\x8b\xc18v\xfc\xa9\xcb|\xd4\x1a\x91\x81c\xeb\r|\xdbo\xa8?\xa8\x192\t\x10\x1bhGZ\xc0\xe7\xc3{b\xc0Z\xe5&\r\n\x858\x94V\x9f\xbah\x8f\x91\xa4\x8a\x90\xa7\x10\x85kYh\xb6\x0f\t0-\x9f@\xc2\xbbR.>\xc5;\xceJ\x14QJ0CrCP\x1e\xea\x8b\xc3z\xb8\x7f+\x94LV&\x8e\xce\xecA\xd6\x12#\xdb\x90\xf9\x9d\x03T\x89[G\xa8\xa4\xa9\xa7r\xd8x(\x9dv9\x16\x1dH=\x82?>-\x84R\x11\x94\x17\x01\x03\xc4\xa3\xb3?\xecyq\x86Y', 0x0]) ptrace$setopts(0x4206, r1, 0x0, 0x2) [ 104.239741][ T8585] ptrace attach of "/root/syz-executor.2"[8580] was attempted by "/root/syz-executor.2"[8585] [ 104.373609][ T8591] ptrace attach of "/root/syz-executor.4"[8588] was attempted by "/root/syz-executor.4"[8591] 10:29:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000200)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="c800000000000000000000027f000000f25440660bf7437039f6dfcf9fb3a0f53cb94bcdcb34fee193ff3da7cbc078e8741d445c125f330ee2d0a77105f88f1de7c2b640d778abc81873931bf1f08ef2"], 0xc8}, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, 0x0) close(0xffffffffffffffff) chdir(&(0x7f00000002c0)='./bus\x00') socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100), 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000000)={0x0, 0x3}, 0x8) 10:29:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000200)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="c800000000000000000000027f000000f25440660bf7437039f6dfcf9fb3a0f53cb94bcdcb34fee193ff3da7cbc078e8741d445c125f330ee2d0a77105f88f1de7c2b640d778abc81873931bf1f08ef2"], 0xc8}, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, 0x0) close(0xffffffffffffffff) chdir(&(0x7f00000002c0)='./bus\x00') socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100), 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000000)={0x0, 0x3}, 0x8) 10:29:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f00000001c0)={0x3, [0x2de8000000000, 0x6, 0xffffffffffffff45]}) r3 = creat(&(0x7f0000000280)='./file0\x00', 0xab) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000a80)='\xa11\xc2\x1fQ\x88\xebH\xe7\xcf/\x83\xb3+\xc5\xa0\xa6\xbf\x85\xf0;\xea\x8a\xd5b\xb0\xe7=\xf41\xf5\xb4\xb9\aPk\x94csn\x8bu\bHD\x06\f\xccU\x19\xaa\xe0\xed\x85\xb1%\xd8\x82\xaeW\x8764\x93\xb6`\x90\xb1\x1d\xd6\x91\x9a\xf5I:=\xd9\x98\t\x03\x13\xa4f\x13\xeb\x11\xd5\x17J]\x8b\xc18v\xfc\xa9\xcb|\xd4\x1a\x91\x81c\xeb\r|\xdbo\xa8?\xa8\x192\t\x10\x1bhGZ\xc0\xe7\xc3{b\xc0Z\xe5&\r\n\x858\x94V\x9f\xbah\x8f\x91\xa4\x8a\x90\xa7\x10\x85kYh\xb6\x0f\t0-\x9f@\xc2\xbbR.>\xc5;\xceJ\x14QJ0CrCP\x1e\xea\x8b\xc3z\xb8\x7f+\x94LV&\x8e\xce\xecA\xd6\x12#\xdb\x90\xf9\x9d\x03T\x89[G\xa8\xa4\xa9\xa7r\xd8x(\x9dv9\x16\x1dH=\x82?>-\x84R\x11\x94\x17\x01\x03\xc4\xa3\xb3?\xecyq\x86Y'], &(0x7f0000000140)=[&(0x7f0000000480)='\xa11\xc2\x1fQ\x88\xebH\xe7\xcf/\x83\xb3+\xc5\xa0\xa6\xbf\x85\xf0;\xea\x8a\xd5b\xb0\xe7=\xf41\xf5\xb4\xb9\aPk\x94csn\x8bu\bHD\x06\f\xccU\x19\xaa\xe0\xed\x85\xb1%\xd8\x82\xaeW\x8764\x93\xb6`\x90\xb1\x1d\xd6\x91\x9a\xf5I:=\xd9\x98\t\x03\x13\xa4f\x13\xeb\x11\xd5\x17J]\x8b\xc18v\xfc\xa9\xcb|\xd4\x1a\x91\x81c\xeb\r|\xdbo\xa8?\xa8\x192\t\x10\x1bhGZ\xc0\xe7\xc3{b\xc0Z\xe5&\r\n\x858\x94V\x9f\xbah\x8f\x91\xa4\x8a\x90\xa7\x10\x85kYh\xb6\x0f\t0-\x9f@\xc2\xbbR.>\xc5;\xceJ\x14QJ0CrCP\x1e\xea\x8b\xc3z\xb8\x7f+\x94LV&\x8e\xce\xecA\xd6\x12#\xdb\x90\xf9\x9d\x03T\x89[G\xa8\xa4\xa9\xa7r\xd8x(\x9dv9\x16\x1dH=\x82?>-\x84R\x11\x94\x17\x01\x03\xc4\xa3\xb3?\xecyq\x86Y', 0x0]) ptrace$setopts(0x4206, r1, 0x0, 0x2) 10:29:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f00000001c0)={0x3, [0x2de8000000000, 0x6, 0xffffffffffffff45]}) r3 = creat(&(0x7f0000000280)='./file0\x00', 0xab) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000a80)='\xa11\xc2\x1fQ\x88\xebH\xe7\xcf/\x83\xb3+\xc5\xa0\xa6\xbf\x85\xf0;\xea\x8a\xd5b\xb0\xe7=\xf41\xf5\xb4\xb9\aPk\x94csn\x8bu\bHD\x06\f\xccU\x19\xaa\xe0\xed\x85\xb1%\xd8\x82\xaeW\x8764\x93\xb6`\x90\xb1\x1d\xd6\x91\x9a\xf5I:=\xd9\x98\t\x03\x13\xa4f\x13\xeb\x11\xd5\x17J]\x8b\xc18v\xfc\xa9\xcb|\xd4\x1a\x91\x81c\xeb\r|\xdbo\xa8?\xa8\x192\t\x10\x1bhGZ\xc0\xe7\xc3{b\xc0Z\xe5&\r\n\x858\x94V\x9f\xbah\x8f\x91\xa4\x8a\x90\xa7\x10\x85kYh\xb6\x0f\t0-\x9f@\xc2\xbbR.>\xc5;\xceJ\x14QJ0CrCP\x1e\xea\x8b\xc3z\xb8\x7f+\x94LV&\x8e\xce\xecA\xd6\x12#\xdb\x90\xf9\x9d\x03T\x89[G\xa8\xa4\xa9\xa7r\xd8x(\x9dv9\x16\x1dH=\x82?>-\x84R\x11\x94\x17\x01\x03\xc4\xa3\xb3?\xecyq\x86Y'], &(0x7f0000000140)=[&(0x7f0000000480)='\xa11\xc2\x1fQ\x88\xebH\xe7\xcf/\x83\xb3+\xc5\xa0\xa6\xbf\x85\xf0;\xea\x8a\xd5b\xb0\xe7=\xf41\xf5\xb4\xb9\aPk\x94csn\x8bu\bHD\x06\f\xccU\x19\xaa\xe0\xed\x85\xb1%\xd8\x82\xaeW\x8764\x93\xb6`\x90\xb1\x1d\xd6\x91\x9a\xf5I:=\xd9\x98\t\x03\x13\xa4f\x13\xeb\x11\xd5\x17J]\x8b\xc18v\xfc\xa9\xcb|\xd4\x1a\x91\x81c\xeb\r|\xdbo\xa8?\xa8\x192\t\x10\x1bhGZ\xc0\xe7\xc3{b\xc0Z\xe5&\r\n\x858\x94V\x9f\xbah\x8f\x91\xa4\x8a\x90\xa7\x10\x85kYh\xb6\x0f\t0-\x9f@\xc2\xbbR.>\xc5;\xceJ\x14QJ0CrCP\x1e\xea\x8b\xc3z\xb8\x7f+\x94LV&\x8e\xce\xecA\xd6\x12#\xdb\x90\xf9\x9d\x03T\x89[G\xa8\xa4\xa9\xa7r\xd8x(\x9dv9\x16\x1dH=\x82?>-\x84R\x11\x94\x17\x01\x03\xc4\xa3\xb3?\xecyq\x86Y', 0x0]) ptrace$setopts(0x4206, r1, 0x0, 0x2) 10:29:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f00000001c0)={0x3, [0x2de8000000000, 0x6, 0xffffffffffffff45]}) r3 = creat(&(0x7f0000000280)='./file0\x00', 0xab) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000a80)='\xa11\xc2\x1fQ\x88\xebH\xe7\xcf/\x83\xb3+\xc5\xa0\xa6\xbf\x85\xf0;\xea\x8a\xd5b\xb0\xe7=\xf41\xf5\xb4\xb9\aPk\x94csn\x8bu\bHD\x06\f\xccU\x19\xaa\xe0\xed\x85\xb1%\xd8\x82\xaeW\x8764\x93\xb6`\x90\xb1\x1d\xd6\x91\x9a\xf5I:=\xd9\x98\t\x03\x13\xa4f\x13\xeb\x11\xd5\x17J]\x8b\xc18v\xfc\xa9\xcb|\xd4\x1a\x91\x81c\xeb\r|\xdbo\xa8?\xa8\x192\t\x10\x1bhGZ\xc0\xe7\xc3{b\xc0Z\xe5&\r\n\x858\x94V\x9f\xbah\x8f\x91\xa4\x8a\x90\xa7\x10\x85kYh\xb6\x0f\t0-\x9f@\xc2\xbbR.>\xc5;\xceJ\x14QJ0CrCP\x1e\xea\x8b\xc3z\xb8\x7f+\x94LV&\x8e\xce\xecA\xd6\x12#\xdb\x90\xf9\x9d\x03T\x89[G\xa8\xa4\xa9\xa7r\xd8x(\x9dv9\x16\x1dH=\x82?>-\x84R\x11\x94\x17\x01\x03\xc4\xa3\xb3?\xecyq\x86Y'], &(0x7f0000000140)=[&(0x7f0000000480)='\xa11\xc2\x1fQ\x88\xebH\xe7\xcf/\x83\xb3+\xc5\xa0\xa6\xbf\x85\xf0;\xea\x8a\xd5b\xb0\xe7=\xf41\xf5\xb4\xb9\aPk\x94csn\x8bu\bHD\x06\f\xccU\x19\xaa\xe0\xed\x85\xb1%\xd8\x82\xaeW\x8764\x93\xb6`\x90\xb1\x1d\xd6\x91\x9a\xf5I:=\xd9\x98\t\x03\x13\xa4f\x13\xeb\x11\xd5\x17J]\x8b\xc18v\xfc\xa9\xcb|\xd4\x1a\x91\x81c\xeb\r|\xdbo\xa8?\xa8\x192\t\x10\x1bhGZ\xc0\xe7\xc3{b\xc0Z\xe5&\r\n\x858\x94V\x9f\xbah\x8f\x91\xa4\x8a\x90\xa7\x10\x85kYh\xb6\x0f\t0-\x9f@\xc2\xbbR.>\xc5;\xceJ\x14QJ0CrCP\x1e\xea\x8b\xc3z\xb8\x7f+\x94LV&\x8e\xce\xecA\xd6\x12#\xdb\x90\xf9\x9d\x03T\x89[G\xa8\xa4\xa9\xa7r\xd8x(\x9dv9\x16\x1dH=\x82?>-\x84R\x11\x94\x17\x01\x03\xc4\xa3\xb3?\xecyq\x86Y', 0x0]) ptrace$setopts(0x4206, r1, 0x0, 0x2) 10:29:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f00000001c0)={0x3, [0x2de8000000000, 0x6, 0xffffffffffffff45]}) r3 = creat(&(0x7f0000000280)='./file0\x00', 0xab) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000a80)='\xa11\xc2\x1fQ\x88\xebH\xe7\xcf/\x83\xb3+\xc5\xa0\xa6\xbf\x85\xf0;\xea\x8a\xd5b\xb0\xe7=\xf41\xf5\xb4\xb9\aPk\x94csn\x8bu\bHD\x06\f\xccU\x19\xaa\xe0\xed\x85\xb1%\xd8\x82\xaeW\x8764\x93\xb6`\x90\xb1\x1d\xd6\x91\x9a\xf5I:=\xd9\x98\t\x03\x13\xa4f\x13\xeb\x11\xd5\x17J]\x8b\xc18v\xfc\xa9\xcb|\xd4\x1a\x91\x81c\xeb\r|\xdbo\xa8?\xa8\x192\t\x10\x1bhGZ\xc0\xe7\xc3{b\xc0Z\xe5&\r\n\x858\x94V\x9f\xbah\x8f\x91\xa4\x8a\x90\xa7\x10\x85kYh\xb6\x0f\t0-\x9f@\xc2\xbbR.>\xc5;\xceJ\x14QJ0CrCP\x1e\xea\x8b\xc3z\xb8\x7f+\x94LV&\x8e\xce\xecA\xd6\x12#\xdb\x90\xf9\x9d\x03T\x89[G\xa8\xa4\xa9\xa7r\xd8x(\x9dv9\x16\x1dH=\x82?>-\x84R\x11\x94\x17\x01\x03\xc4\xa3\xb3?\xecyq\x86Y'], &(0x7f0000000140)=[&(0x7f0000000480)='\xa11\xc2\x1fQ\x88\xebH\xe7\xcf/\x83\xb3+\xc5\xa0\xa6\xbf\x85\xf0;\xea\x8a\xd5b\xb0\xe7=\xf41\xf5\xb4\xb9\aPk\x94csn\x8bu\bHD\x06\f\xccU\x19\xaa\xe0\xed\x85\xb1%\xd8\x82\xaeW\x8764\x93\xb6`\x90\xb1\x1d\xd6\x91\x9a\xf5I:=\xd9\x98\t\x03\x13\xa4f\x13\xeb\x11\xd5\x17J]\x8b\xc18v\xfc\xa9\xcb|\xd4\x1a\x91\x81c\xeb\r|\xdbo\xa8?\xa8\x192\t\x10\x1bhGZ\xc0\xe7\xc3{b\xc0Z\xe5&\r\n\x858\x94V\x9f\xbah\x8f\x91\xa4\x8a\x90\xa7\x10\x85kYh\xb6\x0f\t0-\x9f@\xc2\xbbR.>\xc5;\xceJ\x14QJ0CrCP\x1e\xea\x8b\xc3z\xb8\x7f+\x94LV&\x8e\xce\xecA\xd6\x12#\xdb\x90\xf9\x9d\x03T\x89[G\xa8\xa4\xa9\xa7r\xd8x(\x9dv9\x16\x1dH=\x82?>-\x84R\x11\x94\x17\x01\x03\xc4\xa3\xb3?\xecyq\x86Y', 0x0]) ptrace$setopts(0x4206, r1, 0x0, 0x2) 10:29:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f00000001c0)={0x3, [0x2de8000000000, 0x6, 0xffffffffffffff45]}) r3 = creat(&(0x7f0000000280)='./file0\x00', 0xab) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000a80)='\xa11\xc2\x1fQ\x88\xebH\xe7\xcf/\x83\xb3+\xc5\xa0\xa6\xbf\x85\xf0;\xea\x8a\xd5b\xb0\xe7=\xf41\xf5\xb4\xb9\aPk\x94csn\x8bu\bHD\x06\f\xccU\x19\xaa\xe0\xed\x85\xb1%\xd8\x82\xaeW\x8764\x93\xb6`\x90\xb1\x1d\xd6\x91\x9a\xf5I:=\xd9\x98\t\x03\x13\xa4f\x13\xeb\x11\xd5\x17J]\x8b\xc18v\xfc\xa9\xcb|\xd4\x1a\x91\x81c\xeb\r|\xdbo\xa8?\xa8\x192\t\x10\x1bhGZ\xc0\xe7\xc3{b\xc0Z\xe5&\r\n\x858\x94V\x9f\xbah\x8f\x91\xa4\x8a\x90\xa7\x10\x85kYh\xb6\x0f\t0-\x9f@\xc2\xbbR.>\xc5;\xceJ\x14QJ0CrCP\x1e\xea\x8b\xc3z\xb8\x7f+\x94LV&\x8e\xce\xecA\xd6\x12#\xdb\x90\xf9\x9d\x03T\x89[G\xa8\xa4\xa9\xa7r\xd8x(\x9dv9\x16\x1dH=\x82?>-\x84R\x11\x94\x17\x01\x03\xc4\xa3\xb3?\xecyq\x86Y'], &(0x7f0000000140)=[&(0x7f0000000480)='\xa11\xc2\x1fQ\x88\xebH\xe7\xcf/\x83\xb3+\xc5\xa0\xa6\xbf\x85\xf0;\xea\x8a\xd5b\xb0\xe7=\xf41\xf5\xb4\xb9\aPk\x94csn\x8bu\bHD\x06\f\xccU\x19\xaa\xe0\xed\x85\xb1%\xd8\x82\xaeW\x8764\x93\xb6`\x90\xb1\x1d\xd6\x91\x9a\xf5I:=\xd9\x98\t\x03\x13\xa4f\x13\xeb\x11\xd5\x17J]\x8b\xc18v\xfc\xa9\xcb|\xd4\x1a\x91\x81c\xeb\r|\xdbo\xa8?\xa8\x192\t\x10\x1bhGZ\xc0\xe7\xc3{b\xc0Z\xe5&\r\n\x858\x94V\x9f\xbah\x8f\x91\xa4\x8a\x90\xa7\x10\x85kYh\xb6\x0f\t0-\x9f@\xc2\xbbR.>\xc5;\xceJ\x14QJ0CrCP\x1e\xea\x8b\xc3z\xb8\x7f+\x94LV&\x8e\xce\xecA\xd6\x12#\xdb\x90\xf9\x9d\x03T\x89[G\xa8\xa4\xa9\xa7r\xd8x(\x9dv9\x16\x1dH=\x82?>-\x84R\x11\x94\x17\x01\x03\xc4\xa3\xb3?\xecyq\x86Y', 0x0]) ptrace$setopts(0x4206, r1, 0x0, 0x2) 10:29:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) sendmsg$AUDIT_SIGNAL_INFO(0xffffffffffffffff, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) r1 = socket(0x11, 0x800000003, 0x8) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) 10:29:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f00000001c0)={0x3, [0x2de8000000000, 0x6, 0xffffffffffffff45]}) r3 = creat(&(0x7f0000000280)='./file0\x00', 0xab) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000a80)='\xa11\xc2\x1fQ\x88\xebH\xe7\xcf/\x83\xb3+\xc5\xa0\xa6\xbf\x85\xf0;\xea\x8a\xd5b\xb0\xe7=\xf41\xf5\xb4\xb9\aPk\x94csn\x8bu\bHD\x06\f\xccU\x19\xaa\xe0\xed\x85\xb1%\xd8\x82\xaeW\x8764\x93\xb6`\x90\xb1\x1d\xd6\x91\x9a\xf5I:=\xd9\x98\t\x03\x13\xa4f\x13\xeb\x11\xd5\x17J]\x8b\xc18v\xfc\xa9\xcb|\xd4\x1a\x91\x81c\xeb\r|\xdbo\xa8?\xa8\x192\t\x10\x1bhGZ\xc0\xe7\xc3{b\xc0Z\xe5&\r\n\x858\x94V\x9f\xbah\x8f\x91\xa4\x8a\x90\xa7\x10\x85kYh\xb6\x0f\t0-\x9f@\xc2\xbbR.>\xc5;\xceJ\x14QJ0CrCP\x1e\xea\x8b\xc3z\xb8\x7f+\x94LV&\x8e\xce\xecA\xd6\x12#\xdb\x90\xf9\x9d\x03T\x89[G\xa8\xa4\xa9\xa7r\xd8x(\x9dv9\x16\x1dH=\x82?>-\x84R\x11\x94\x17\x01\x03\xc4\xa3\xb3?\xecyq\x86Y'], &(0x7f0000000140)=[&(0x7f0000000480)='\xa11\xc2\x1fQ\x88\xebH\xe7\xcf/\x83\xb3+\xc5\xa0\xa6\xbf\x85\xf0;\xea\x8a\xd5b\xb0\xe7=\xf41\xf5\xb4\xb9\aPk\x94csn\x8bu\bHD\x06\f\xccU\x19\xaa\xe0\xed\x85\xb1%\xd8\x82\xaeW\x8764\x93\xb6`\x90\xb1\x1d\xd6\x91\x9a\xf5I:=\xd9\x98\t\x03\x13\xa4f\x13\xeb\x11\xd5\x17J]\x8b\xc18v\xfc\xa9\xcb|\xd4\x1a\x91\x81c\xeb\r|\xdbo\xa8?\xa8\x192\t\x10\x1bhGZ\xc0\xe7\xc3{b\xc0Z\xe5&\r\n\x858\x94V\x9f\xbah\x8f\x91\xa4\x8a\x90\xa7\x10\x85kYh\xb6\x0f\t0-\x9f@\xc2\xbbR.>\xc5;\xceJ\x14QJ0CrCP\x1e\xea\x8b\xc3z\xb8\x7f+\x94LV&\x8e\xce\xecA\xd6\x12#\xdb\x90\xf9\x9d\x03T\x89[G\xa8\xa4\xa9\xa7r\xd8x(\x9dv9\x16\x1dH=\x82?>-\x84R\x11\x94\x17\x01\x03\xc4\xa3\xb3?\xecyq\x86Y', 0x0]) ptrace$setopts(0x4206, r1, 0x0, 0x2) [ 105.043936][ T8613] ptrace attach of "/root/syz-executor.4"[8603] was attempted by "/root/syz-executor.4"[8613] 10:29:40 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x19, &(0x7f0000000000), 0x8) [ 105.136383][ T8610] ptrace attach of "/root/syz-executor.3"[8604] was attempted by "/root/syz-executor.3"[8610] 10:29:40 executing program 5: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xfffffffffffffe83}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02020609100000000000004c9e0000000200130002000000000000000000004105000600200000000a00000000000000000500e5000807ff00001f00000000000009200000000000020001000000000000000002000098a805000500000000000a"], 0x80}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x393, 0x0) 10:29:40 executing program 0: preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f0000000100)=""/4116, 0x1014}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000001c0)='highspeed\x00', 0xa) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @local}, 0x10) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='highspeed\x00', 0xa) socket$inet(0x2, 0x80001, 0x84) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x218, 0x1000000) 10:29:41 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x19, &(0x7f0000000000), 0x8) [ 105.528261][ T8636] general protection fault, probably for non-canonical address 0xdffffc0000000104: 0000 [#1] PREEMPT SMP KASAN [ 105.540333][ T8636] KASAN: null-ptr-deref in range [0x0000000000000820-0x0000000000000827] [ 105.549024][ T8636] CPU: 1 PID: 8636 Comm: syz-executor.5 Not tainted 5.8.0-rc4-next-20200713-syzkaller #0 [ 105.558983][ T8636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 105.569087][ T8636] RIP: 0010:__xfrm6_tunnel_spi_lookup+0x22b/0x3b0 [ 105.575720][ T8636] Code: 89 e0 48 c1 e8 03 80 3c 28 00 0f 85 5b 01 00 00 4d 8b 24 24 4d 85 e4 74 53 e8 31 fa 7b fa 49 8d 7c 24 20 48 89 f8 48 c1 e8 03 <80> 3c 28 00 0f 85 2d 01 00 00 4d 8b 7c 24 20 49 8d 7c 24 28 48 89 [ 105.595788][ T8636] RSP: 0018:ffffc9001725f580 EFLAGS: 00010202 [ 105.601882][ T8636] RAX: 0000000000000104 RBX: ffffffffffffffff RCX: ffffc90013ac3000 [ 105.609999][ T8636] RDX: 0000000000040000 RSI: ffffffff86f8373f RDI: 0000000000000820 [ 105.618134][ T8636] RBP: dffffc0000000000 R08: 0000000000000001 R09: ffff8880a0e48e50 [ 105.626354][ T8636] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000800 [ 105.634339][ T8636] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 105.642430][ T8636] FS: 00007fb714640700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 [ 105.651512][ T8636] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 105.658267][ T8636] CR2: 00007ffc2ac6bb20 CR3: 000000008cb95000 CR4: 00000000001506e0 [ 105.668166][ T8636] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 105.676288][ T8636] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 105.684263][ T8636] Call Trace: [ 105.687572][ T8636] xfrm6_tunnel_spi_lookup+0x8a/0x1d0 [ 105.692963][ T8636] ipcomp6_init_state+0x1de/0x700 [ 105.698005][ T8636] __xfrm_init_state+0x9a6/0x14b0 [ 105.703268][ T8636] xfrm_init_state+0x1a/0x70 [ 105.707873][ T8636] pfkey_add+0x1a10/0x2b70 [ 105.712304][ T8636] ? pfkey_get+0x700/0x700 [ 105.716730][ T8636] ? pfkey_process+0x223/0x7a0 [ 105.721501][ T8636] ? pfkey_get+0x700/0x700 [ 105.725928][ T8636] pfkey_process+0x66d/0x7a0 [ 105.730717][ T8636] ? pfkey_broadcast+0x630/0x630 [ 105.735672][ T8636] ? __mutex_lock+0x626/0x10d0 [ 105.740627][ T8636] ? _copy_from_iter_full+0x247/0x890 [ 105.746132][ T8636] ? __phys_addr+0x9a/0x110 [ 105.750693][ T8636] ? __phys_addr_symbol+0x2c/0x70 [ 105.755815][ T8636] ? __check_object_size+0x171/0x3e4 [ 105.761171][ T8636] pfkey_sendmsg+0x42d/0x800 [ 105.765784][ T8636] ? pfkey_send_new_mapping+0x11b0/0x11b0 [ 105.771512][ T8636] sock_sendmsg+0xcf/0x120 [ 105.775939][ T8636] ____sys_sendmsg+0x331/0x810 [ 105.780934][ T8636] ? kernel_sendmsg+0x50/0x50 [ 105.785619][ T8636] ? do_recvmmsg+0x6d0/0x6d0 [ 105.790218][ T8636] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 105.796216][ T8636] ___sys_sendmsg+0xf3/0x170 [ 105.800912][ T8636] ? sendmsg_copy_msghdr+0x160/0x160 [ 105.806206][ T8636] ? __fget_files+0x272/0x400 [ 105.810893][ T8636] ? kvm_sched_clock_read+0x14/0x40 [ 105.816097][ T8636] ? sched_clock+0x2a/0x40 [ 105.820519][ T8636] ? sched_clock_cpu+0x18/0x1b0 [ 105.825463][ T8636] ? sched_clock_cpu+0x18/0x1b0 [ 105.830391][ T8636] ? lockdep_hardirqs_on+0x6a/0xe0 [ 105.835602][ T8636] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 105.841766][ T8636] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 105.851494][ T8636] ? trace_hardirqs_on+0x5f/0x220 [ 105.856523][ T8636] ? lockdep_hardirqs_on+0x6a/0xe0 [ 105.861640][ T8636] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 105.867806][ T8636] ? __sys_sendmmsg+0x269/0x480 [ 105.872879][ T8636] __sys_sendmmsg+0x195/0x480 [ 105.877565][ T8636] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 105.882598][ T8636] ? sched_clock_cpu+0x18/0x1b0 [ 105.887580][ T8636] ? sched_clock_cpu+0x18/0x1b0 [ 105.892442][ T8636] ? clockevents_program_event+0x12b/0x350 [ 105.898263][ T8636] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 105.904554][ T8636] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 105.910718][ T8636] ? trace_hardirqs_on+0x5f/0x220 [ 105.915927][ T8636] ? lockdep_hardirqs_on+0x6a/0xe0 [ 105.921194][ T8636] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 105.927365][ T8636] __x64_sys_sendmmsg+0x99/0x100 [ 105.932316][ T8636] do_syscall_64+0x60/0xe0 [ 105.936745][ T8636] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 105.942642][ T8636] RIP: 0033:0x45cba9 [ 105.946768][ T8636] Code: Bad RIP value. [ 105.950843][ T8636] RSP: 002b:00007fb71463fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 105.959268][ T8636] RAX: ffffffffffffffda RBX: 00000000004fe340 RCX: 000000000045cba9 [ 105.967244][ T8636] RDX: 0000000000000393 RSI: 0000000020000180 RDI: 0000000000000004 [ 105.975234][ T8636] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 105.983538][ T8636] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 105.991793][ T8636] R13: 0000000000000919 R14: 00000000004cbed9 R15: 00007fb7146406d4 [ 105.999860][ T8636] Modules linked in: [ 106.004043][ T8636] ---[ end trace 2433ff552852442a ]--- [ 106.009604][ T8636] RIP: 0010:__xfrm6_tunnel_spi_lookup+0x22b/0x3b0 [ 106.016314][ T8636] Code: 89 e0 48 c1 e8 03 80 3c 28 00 0f 85 5b 01 00 00 4d 8b 24 24 4d 85 e4 74 53 e8 31 fa 7b fa 49 8d 7c 24 20 48 89 f8 48 c1 e8 03 <80> 3c 28 00 0f 85 2d 01 00 00 4d 8b 7c 24 20 49 8d 7c 24 28 48 89 [ 106.029545][ T8635] ptrace attach of "/root/syz-executor.4"[8630] was attempted by "/root/syz-executor.4"[8635] [ 106.036557][ T8636] RSP: 0018:ffffc9001725f580 EFLAGS: 00010202 [ 106.036613][ T8636] RAX: 0000000000000104 RBX: ffffffffffffffff RCX: ffffc90013ac3000 [ 106.061428][ T8636] RDX: 0000000000040000 RSI: ffffffff86f8373f RDI: 0000000000000820 [ 106.069670][ T8636] RBP: dffffc0000000000 R08: 0000000000000001 R09: ffff8880a0e48e50 [ 106.077815][ T8636] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000800 [ 106.085911][ T8636] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 106.094100][ T8636] FS: 00007fb714640700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 [ 106.103102][ T8636] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 106.109768][ T8636] CR2: 00007ffc2ac6bb20 CR3: 000000008cb95000 CR4: 00000000001506e0 [ 106.117855][ T8636] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 106.125974][ T8636] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 106.134072][ T8636] Kernel panic - not syncing: Fatal exception in interrupt [ 106.142255][ T8636] Kernel Offset: disabled [ 106.146619][ T8636] Rebooting in 86400 seconds..