[ 67.506204][ T27] audit: type=1800 audit(1564891226.288:27): pid=9995 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 67.528546][ T27] audit: type=1800 audit(1564891226.288:28): pid=9995 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 68.129819][ T27] audit: type=1800 audit(1564891226.968:29): pid=9995 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 68.150296][ T27] audit: type=1800 audit(1564891226.968:30): pid=9995 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.52' (ECDSA) to the list of known hosts. 2019/08/04 04:00:35 fuzzer started 2019/08/04 04:00:38 dialing manager at 10.128.0.26:45731 2019/08/04 04:00:38 syscalls: 2484 2019/08/04 04:00:38 code coverage: enabled 2019/08/04 04:00:38 comparison tracing: enabled 2019/08/04 04:00:38 extra coverage: extra coverage is not supported by the kernel 2019/08/04 04:00:38 setuid sandbox: enabled 2019/08/04 04:00:38 namespace sandbox: enabled 2019/08/04 04:00:38 Android sandbox: /sys/fs/selinux/policy does not exist 2019/08/04 04:00:38 fault injection: enabled 2019/08/04 04:00:38 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/08/04 04:00:38 net packet injection: enabled 2019/08/04 04:00:38 net device setup: enabled 04:02:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000004080)={'lo\x00\x00\x00\x02\x00M\xbf\x00\x00\x00\x00\b\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="3400000014000b0900000000000000000a400000", @ANYRES32=r2, @ANYBLOB="14000100ff0100000000000000000000000000010800080000350000"], 0x34}}, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) 04:02:28 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='cgroup\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0/file0\x00') rmdir(&(0x7f0000000480)='./file0\x00') mkdir(&(0x7f0000000140)='./file0\x00', 0x0) syzkaller login: [ 189.299413][T10160] IPVS: ftp: loaded support on port[0] = 21 [ 189.441218][T10160] chnl_net:caif_netlink_parms(): no params data found [ 189.482276][T10160] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.489823][T10160] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.498267][T10160] device bridge_slave_0 entered promiscuous mode [ 189.506051][T10160] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.513130][T10160] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.521629][T10160] device bridge_slave_1 entered promiscuous mode 04:02:28 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x80000004c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x2928, 0x0, 0x0, 0x800e00507) recvfrom$inet(r0, 0x0, 0x220, 0x40002, 0x0, 0x0) shutdown(r1, 0x0) [ 189.539626][T10163] IPVS: ftp: loaded support on port[0] = 21 [ 189.552102][T10160] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 189.578082][T10160] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 189.626375][T10160] team0: Port device team_slave_0 added [ 189.633290][T10160] team0: Port device team_slave_1 added 04:02:28 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='\t'], 0x1) recvmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)=""/22, 0x16}], 0x1}, 0x10142) [ 189.777952][T10160] device hsr_slave_0 entered promiscuous mode [ 189.845471][T10160] device hsr_slave_1 entered promiscuous mode 04:02:28 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$inet_udp(0x2, 0x2, 0x0) renameat(0xffffffffffffffff, 0x0, r0, 0x0) [ 189.921248][T10167] IPVS: ftp: loaded support on port[0] = 21 [ 189.948930][T10165] IPVS: ftp: loaded support on port[0] = 21 [ 189.997084][T10160] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.004182][T10160] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.011575][T10160] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.018654][T10160] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.072752][T10163] chnl_net:caif_netlink_parms(): no params data found 04:02:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000200)=""/89, 0x59}, {0x0}], 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/37, 0x25}], 0x1}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xbf9d, 0x0, 0x0, 0x800e0053e) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r5, &(0x7f0000000700)=[{&(0x7f00000000c0)=""/4, 0x4}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) shutdown(r4, 0x0) r6 = dup(r2) shutdown(r6, 0x0) [ 190.179981][T10170] IPVS: ftp: loaded support on port[0] = 21 [ 190.193743][T10160] 8021q: adding VLAN 0 to HW filter on device bond0 [ 190.262170][T10163] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.269493][T10163] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.277314][T10163] device bridge_slave_0 entered promiscuous mode [ 190.316364][ T3581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 190.327151][ T3581] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.334736][ T3581] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.342341][ T3581] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 190.352236][T10163] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.359325][T10163] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.367122][T10163] device bridge_slave_1 entered promiscuous mode [ 190.381920][T10160] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.410999][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.419683][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.426763][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.427285][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.443280][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.445298][T10172] IPVS: ftp: loaded support on port[0] = 21 [ 190.450358][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.468202][T10167] chnl_net:caif_netlink_parms(): no params data found [ 190.491166][T10163] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 190.504120][T10163] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 190.542609][T10163] team0: Port device team_slave_0 added [ 190.553200][T10163] team0: Port device team_slave_1 added [ 190.560684][T10173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 190.569393][T10165] chnl_net:caif_netlink_parms(): no params data found [ 190.618043][T10167] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.626338][T10167] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.633784][T10167] device bridge_slave_0 entered promiscuous mode [ 190.643389][T10167] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.650666][T10167] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.658242][T10167] device bridge_slave_1 entered promiscuous mode [ 190.668119][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 190.727126][T10163] device hsr_slave_0 entered promiscuous mode [ 190.765080][T10163] device hsr_slave_1 entered promiscuous mode [ 190.804749][T10163] debugfs: Directory 'hsr0' with parent '/' already present! [ 190.839540][T10167] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 190.871492][T10167] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 190.886950][T10165] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.894008][T10165] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.902038][T10165] device bridge_slave_0 entered promiscuous mode [ 190.911925][T10165] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.919051][T10165] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.926681][T10165] device bridge_slave_1 entered promiscuous mode [ 190.949067][T10165] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 190.959325][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 190.968699][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.977229][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 190.993694][T10167] team0: Port device team_slave_0 added [ 191.001980][T10165] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 191.037218][T10167] team0: Port device team_slave_1 added [ 191.067359][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 191.076918][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 191.102100][T10165] team0: Port device team_slave_0 added [ 191.136696][T10165] team0: Port device team_slave_1 added [ 191.151210][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 191.159548][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 191.206206][T10167] device hsr_slave_0 entered promiscuous mode [ 191.264909][T10167] device hsr_slave_1 entered promiscuous mode [ 191.304729][T10167] debugfs: Directory 'hsr0' with parent '/' already present! [ 191.315191][T10172] chnl_net:caif_netlink_parms(): no params data found [ 191.324128][T10170] chnl_net:caif_netlink_parms(): no params data found [ 191.332177][T10160] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 191.343456][T10160] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 191.351690][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 191.360156][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 191.406149][T10165] device hsr_slave_0 entered promiscuous mode [ 191.445822][T10165] device hsr_slave_1 entered promiscuous mode [ 191.504847][T10165] debugfs: Directory 'hsr0' with parent '/' already present! [ 191.556676][T10170] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.563803][T10170] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.571789][T10170] device bridge_slave_0 entered promiscuous mode [ 191.579296][T10170] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.586416][T10170] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.594154][T10170] device bridge_slave_1 entered promiscuous mode [ 191.647988][T10170] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 191.659885][T10170] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 191.674395][T10172] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.682271][T10172] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.690167][T10172] device bridge_slave_0 entered promiscuous mode [ 191.698732][T10160] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 191.729583][T10163] 8021q: adding VLAN 0 to HW filter on device bond0 [ 191.737164][T10172] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.744227][T10172] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.752641][T10172] device bridge_slave_1 entered promiscuous mode [ 191.783426][T10163] 8021q: adding VLAN 0 to HW filter on device team0 [ 191.793350][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 191.805141][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 191.813904][T10170] team0: Port device team_slave_0 added [ 191.821389][T10170] team0: Port device team_slave_1 added [ 191.829724][T10172] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 191.844327][T10172] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 191.865882][T10172] team0: Port device team_slave_0 added [ 191.873029][T10172] team0: Port device team_slave_1 added [ 191.899711][T10173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 191.908183][T10173] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 191.917177][T10173] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.924199][T10173] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.932190][T10173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 191.942461][T10173] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 191.950698][T10173] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.957764][T10173] bridge0: port 2(bridge_slave_1) entered forwarding state [ 191.965305][T10173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 191.973630][T10173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 191.983485][T10173] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 192.097333][T10170] device hsr_slave_0 entered promiscuous mode [ 192.135038][T10170] device hsr_slave_1 entered promiscuous mode [ 192.174806][T10170] debugfs: Directory 'hsr0' with parent '/' already present! [ 192.182635][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 192.191154][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 192.199459][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 192.208235][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 192.216767][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 192.235623][T10167] 8021q: adding VLAN 0 to HW filter on device bond0 [ 192.276466][T10172] device hsr_slave_0 entered promiscuous mode [ 192.325166][T10172] device hsr_slave_1 entered promiscuous mode [ 192.364794][T10172] debugfs: Directory 'hsr0' with parent '/' already present! 04:02:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000004080)={'lo\x00\x00\x00\x02\x00M\xbf\x00\x00\x00\x00\b\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="3400000014000b0900000000000000000a400000", @ANYRES32=r2, @ANYBLOB="14000100ff0100000000000000000000000000010800080000350000"], 0x34}}, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) [ 192.383670][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 192.392485][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 192.404429][T10165] 8021q: adding VLAN 0 to HW filter on device bond0 [ 192.421197][T10163] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 192.434637][ C0] hrtimer: interrupt took 26531 ns [ 192.440918][T10163] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 192.465991][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 192.474268][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 04:02:31 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/udp\x00') preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000100)=""/176, 0xb0}, {&(0x7f0000000340)=""/165, 0xa5}], 0x2, 0x0) [ 192.492125][T10165] 8021q: adding VLAN 0 to HW filter on device team0 [ 192.510913][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 192.529426][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 192.563358][T10167] 8021q: adding VLAN 0 to HW filter on device team0 [ 192.576424][T10163] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 192.592033][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 192.600710][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 192.610168][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.617300][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 192.626137][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 192.634567][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 192.642966][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.650033][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.658184][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 192.666556][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 192.674081][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 192.708573][ T3581] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 192.717308][ T3581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 192.726280][ T3581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 192.737280][ T3581] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 192.746097][ T3581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 192.754601][ T3581] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 192.763420][ T3581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 192.771740][ T3581] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 192.780287][ T3581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 192.788511][ T3581] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 192.796893][ T3581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 192.805511][ T3581] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 192.813696][ T3581] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.820773][ T3581] bridge0: port 1(bridge_slave_0) entered forwarding state [ 192.828400][ T3581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 192.837221][ T3581] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 192.845699][ T3581] bridge0: port 2(bridge_slave_1) entered blocking state 04:02:31 executing program 0: [ 192.852729][ T3581] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.860710][ T3581] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 192.868647][ T3581] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 192.878750][T10165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 192.898006][T10172] 8021q: adding VLAN 0 to HW filter on device bond0 04:02:31 executing program 0: [ 192.926741][T10170] 8021q: adding VLAN 0 to HW filter on device bond0 [ 192.961766][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 04:02:31 executing program 0: r0 = syz_open_dev$vivid(&(0x7f0000000080)='/dev/video#\x00', 0x2, 0x2) ppoll(&(0x7f00000000c0)=[{r0, 0x29}], 0x1, 0x0, 0x0, 0x0) [ 192.977891][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 192.991079][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 193.009435][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 04:02:31 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'rmd160\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = dup2(r0, r1) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000280)={0x1, [0x9]}, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x41, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292", 0xc) recvmmsg(r2, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000003540)=[{&(0x7f0000002340)=""/4096, 0x1000}], 0x1, 0x0, 0x4}}], 0x500, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') [ 193.021687][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 193.031683][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 193.040312][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 193.048943][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 193.068909][T10170] 8021q: adding VLAN 0 to HW filter on device team0 [ 193.087888][T10172] 8021q: adding VLAN 0 to HW filter on device team0 [ 193.138108][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 193.147948][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.157021][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.165272][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.173316][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.181976][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 193.190731][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 04:02:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) pipe2(&(0x7f0000000300), 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000004c0)=ANY=[@ANYBLOB="fdaea2"], 0x1}}, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 193.232680][T10165] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 193.245304][T10167] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 193.253214][ T3581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 193.281122][ T3581] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 193.311017][ T3581] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.318128][ T3581] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.339955][ T3581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 193.348705][ T3581] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 193.357609][ T3581] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.364745][ T3581] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.373825][T10221] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 193.390947][ T3581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 193.400245][ T3581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 193.408985][ T3581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 193.417693][ T3581] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 193.426498][ T3581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 193.435406][ T3581] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 193.446071][ T3581] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.453198][ T3581] bridge0: port 1(bridge_slave_0) entered forwarding state 04:02:32 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000200)=0x1ff, 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) [ 193.489034][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 193.497399][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 193.514268][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 193.523048][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 193.551571][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 193.566096][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 193.577400][T10228] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 193.595924][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 193.604288][ T3578] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.611385][ T3578] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.619712][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 193.628117][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 193.636394][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 193.644692][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 193.660127][T10167] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 193.683246][T10173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 193.700754][T10173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 193.745879][T10170] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 193.754123][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 193.772198][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 193.789720][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 193.798863][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 193.815228][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 193.846864][ T3581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 193.862542][ T3581] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 193.877761][T10172] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 193.890491][T10172] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 193.901100][T10173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 193.909468][T10173] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 193.952764][T10172] 8021q: adding VLAN 0 to HW filter on device batadv0 04:02:33 executing program 2: 04:02:33 executing program 0: 04:02:33 executing program 1: 04:02:33 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = eventfd(0x0) fsetxattr$trusted_overlay_origin(r0, 0x0, 0x0, 0x0, 0x0) 04:02:33 executing program 3: 04:02:33 executing program 4: 04:02:33 executing program 0: 04:02:33 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5452, &(0x7f00005ebff8)=0x3f) recvmsg(r0, &(0x7f000095cfc8)={0x0, 0xffffffffffffffce, 0x0}, 0x0) dup2(r0, r1) 04:02:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000480)=[{&(0x7f0000000300)=""/127, 0x7f}, {0x0}], 0x2) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfffffdbe, 0x0, 0x0, 0x800e00516) shutdown(r1, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xff1d, 0x0, 0x0, 0x800e0051f) shutdown(r2, 0x0) 04:02:33 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$VT_ACTIVATE(r0, 0x5606, 0x0) 04:02:33 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x80000004c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x2928, 0x0, 0x0, 0x800e00507) nanosleep(&(0x7f0000000080)={0x1}, &(0x7f00000000c0)) shutdown(r1, 0x0) 04:02:33 executing program 0: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) poll(&(0x7f0000000000)=[{r0}, {}, {}], 0x3, 0x80000004b) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x23e7ab5d991e0ff9, 0x0, 0x0, 0x800e00507) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000001880)=[{&(0x7f0000000540)=""/10, 0xa}], 0x1) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) shutdown(r3, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) readv(r5, &(0x7f0000000700)=[{&(0x7f0000000180)=""/57, 0x39}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) shutdown(r4, 0x0) shutdown(r1, 0x0) 04:02:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb01001800000000800000180000001800000003000000000000000000d776d1c451b48edc000bfa16e4e00e31ef9d60058d74f3d51e57d3f53d38671903d2ad5de5c97db752efc0937fda8b59939ab1626f50a9976dbefb5bf3dc4191195bf0e33df1570eaa57f94ab0c1d6f3cbb1de"], 0x0, 0x71}, 0x20) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="86408e1bcc07ca6716204ac075d9a4b94a6d5c9848ca6b3a3206e07310b5945b15672c27a823b3483f540f35158a5879ffb1"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xffffffffffffff77, 0x0, 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000040)=0x1) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000140)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'icmp\x00'}, &(0x7f0000000100)=0x1e) 04:02:34 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'hwsim0\x00'}) 04:02:34 executing program 5: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000140)={0x15, 0x65, 0xffff, 0x8001, 0x8, '9P2000.L'}, 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x26f) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') lseek(r3, 0x20400000, 0x0) 04:02:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000003680)=[{&(0x7f0000000000)=""/253, 0xfd}], 0x1}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/37, 0x25}], 0x100000000000013b}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xbf9d, 0x0, 0x0, 0x800e0053e) shutdown(r3, 0x0) recvfrom$inet(r2, &(0x7f0000000300)=""/123, 0x7b, 0x0, 0x0, 0x0) shutdown(r4, 0x0) r5 = dup(r2) shutdown(r5, 0x0) 04:02:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = eventfd(0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, 0x0) 04:02:34 executing program 5: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000140)={0x15, 0x65, 0xffff, 0x8001, 0x8, '9P2000.L'}, 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x26f) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') lseek(r3, 0x20400000, 0x0) 04:02:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0xed77) write$binfmt_elf64(r1, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r1, 0x3, 0x0, 0x1000007) 04:02:34 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00001ed000/0x4000)=nil, 0x4000, 0x0, 0x4012, r1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x20000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000003200)="b1", 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000140)="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", 0x1000, 0x0, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000001280)=ANY=[@ANYBLOB="7f"], 0x1) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000000)={&(0x7f00001ee000/0x2000)=nil, 0x2000}, &(0x7f0000001240)=0x10) 04:02:34 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x3, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) [ 195.690455][T10347] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 04:02:34 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) r0 = getpid() memfd_create(&(0x7f0000000080)='[,trusted\x00', 0x1) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x1, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)) socket$inet_udplite(0x2, 0x2, 0x88) semget$private(0x0, 0x3, 0x100) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x313}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0xff7ffffffffffffc, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x12040, 0x0) readahead(r2, 0x9, 0x39f6) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x8, 0x0, 0x1, 0x3f, 0x0, 0x3, 0x184, 0x4, 0x6, 0x5, 0x2, 0x77, 0x7, 0x62, 0x3de933df, 0x2, 0x5, 0x5, 0x0, 0x7fff, 0x1, 0xff, 0x7fff, 0x0, 0xfffffffffffff6bf, 0x1000, 0x2, 0x0, 0x8, 0xa8c, 0x0, 0x5, 0x557c, 0x9, 0x6, 0x2, 0x0, 0x1000, 0x2, @perf_config_ext={0x1f}, 0x100, 0x20, 0x4, 0xf, 0x0, 0xf5, 0xcb0}, r0, 0x0, 0xffffffffffffffff, 0x8) write$UHID_INPUT2(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xcd) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, 0x0) getsockname$packet(r2, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) creat(&(0x7f00000002c0)='./bus\x00', 0x5) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) 04:02:34 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x51, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e0039d) 04:02:34 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) close(r1) fchdir(r0) 04:02:34 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) socketpair(0x8, 0x6, 0x0, &(0x7f0000000000)) 04:02:34 executing program 5: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000140)={0x15, 0x65, 0xffff, 0x8001, 0x8, '9P2000.L'}, 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x26f) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') lseek(r3, 0x20400000, 0x0) 04:02:34 executing program 0: getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000040)=0x40) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80000000080003, 0x20000000003c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x240, &(0x7f00000011c0)}}], 0x249, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) 04:02:35 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1005, 0x2) ioctl$int_in(r0, 0x80006080044dff, &(0x7f0000000080)) 04:02:35 executing program 5: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000140)={0x15, 0x65, 0xffff, 0x8001, 0x8, '9P2000.L'}, 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x26f) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') lseek(r3, 0x20400000, 0x0) 04:02:35 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f00000004c0)={0x3, 0x0, 0x0, 0x81, 0xffffffffffffffff}) 04:02:35 executing program 1: dup(0xffffffffffffffff) shutdown(0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001840)=[{&(0x7f00000000c0)=""/252, 0xfc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001f00)=[{&(0x7f00000018c0)=""/152, 0x98}, {0x0}, {0x0}], 0x3}, 0x800000042) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r3, 0x0) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r5, &(0x7f0000000640)=[{&(0x7f00000001c0)=""/35, 0x23}], 0x1) shutdown(r4, 0x0) shutdown(r1, 0x0) 04:02:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/252, 0xfc}, {0x0}, {0x0}], 0x1) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xbf9d, 0x0, 0x0, 0x800e0053e) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) recvmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000000)=""/8, 0x8}], 0x1}, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r4, 0x0) r6 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r6, &(0x7f0000002d00)=[{&(0x7f0000001940)=""/237, 0xed}], 0x1) shutdown(r5, 0x0) shutdown(r2, 0x0) 04:02:35 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000002c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000a00)="585ccbc4ed83b836c1a6474914dc5500b66147f9cb451c91690000000042e3d75228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000380)="2df8015143df52cc5a39d13c8e399bb56dd0b9de67a3fdf534a214b0a5608d45310b9bf42613795115238327da0ccb46c3d005c3d342c2f68d507fcf3290b477ec162ddad829b12f1117aead01ecd3ed1d0b63e9c635862fc9219c441d5c482d7e86bd79f9b07943e45d0731fc737254f2ddb7534936635e314cdcd8aa666187d3cdddfb21b7f456181d62ae48ad2be5cb8919f3e6", 0x95, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) 04:02:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in=@remote}}, {{}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) getegid() futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() socket$inet_dccp(0x2, 0x6, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = syz_open_dev$mouse(0x0, 0x8, 0x2000) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000200)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x34, r2, 0x600, 0x70bd27, 0x25dfdbfe, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x4}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x4, 0x2, 0x9, 0x5, 0x80000001]}]}, 0x34}, 0x1, 0x0, 0x0, 0x4800}, 0x4010) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 04:02:35 executing program 4: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)="2e00000036008182e45ae087185082cf0324b0eba06ef9075b3f00169148790700d90080e2300000000020000000", 0x2e}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) 04:02:35 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xd) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x1d7) read(r0, 0x0, 0x223) 04:02:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000240)=[@text16={0x10, &(0x7f00000001c0)="bad004ecb828018ee00f20c06635100000000f22c066b9800000c00f326635010000000f3026262e2e0f381d9cac000f797e3826660f3a0d882ba7fc660f2206f0fe8d0800f20f01f9", 0x49}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000004cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:35 executing program 5: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000140)={0x15, 0x65, 0xffff, 0x8001, 0x8, '9P2000.L'}, 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x26f) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) lseek(0xffffffffffffffff, 0x20400000, 0x0) 04:02:35 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) [ 196.964743][T10430] binder: 10429:10430 ioctl c018620c 20000180 returned -22 04:02:35 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xd) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x1d7) read(r0, 0x0, 0x223) 04:02:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x24, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TUNSETVNETLE(r1, 0x400448c9, 0x0) [ 197.024412][T10437] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. 04:02:35 executing program 5: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000140)={0x15, 0x65, 0xffff, 0x8001, 0x8, '9P2000.L'}, 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x26f) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) lseek(0xffffffffffffffff, 0x20400000, 0x0) 04:02:36 executing program 4: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)="2e00000036008182e45ae087185082cf0324b0eba06ef9075b3f00169148790700d90080e2300000000020000000", 0x2e}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) 04:02:36 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xd) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x1d7) read(r0, 0x0, 0x223) [ 197.271965][T10450] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. 04:02:36 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xd) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x1d7) read(r0, 0x0, 0x0) 04:02:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = inotify_init() flock(r0, 0x0) 04:02:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x24, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TUNSETVNETLE(r1, 0x400448c9, 0x0) 04:02:36 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='\x00\x00T\x00') unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 04:02:36 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xd) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x1d7) read(r0, 0x0, 0x223) 04:02:36 executing program 5: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000140)={0x15, 0x65, 0xffff, 0x8001, 0x8, '9P2000.L'}, 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x26f) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) lseek(0xffffffffffffffff, 0x20400000, 0x0) 04:02:36 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xd) read(r0, 0x0, 0x223) 04:02:36 executing program 2: fremovexattr(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB]) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80000000080003, 0x20000000003c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x240, &(0x7f00000011c0)}}], 0x249, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) 04:02:36 executing program 4: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) pwritev(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f00000003c0)="39c04d6bc02691fc6bfcdf4a4f25b27dc8c646b4f7bd41e16bb244c09cc4999cd52f4cce2348556967b492770f5271cfa689caa30238a833b9237d351a88bc971501fe49b838b2dfef1ac4b38980a95a13682f6db95c185729d705ea1b0adf77493d6e6e2dda0ac75fed9997cb65927e9c1f89c5557a0f602cd9000d71a1c3c687679c2e225e00e4b5593cb116f83f7d", 0x90}], 0x1, 0x0) syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x0, 0x0) write$vhci(0xffffffffffffffff, &(0x7f0000000100), 0x1) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r1, r1}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) 04:02:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000200)=""/89, 0x59}, {0x0}], 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/37, 0x25}], 0x1}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xbf9d, 0x0, 0x0, 0x800e0053e) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r5, &(0x7f0000000700)=[{&(0x7f00000000c0)=""/4, 0x4}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) shutdown(r4, 0x0) r6 = dup(r2) shutdown(r6, 0x0) 04:02:36 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) r0 = getpid() memfd_create(&(0x7f0000000080)='[,trusted\x00', 0x1) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x1, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)) socket$inet_udplite(0x2, 0x2, 0x88) semget$private(0x0, 0x3, 0x100) pipe(&(0x7f00000001c0)) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0xff7ffffffffffffc, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x12040, 0x0) readahead(r2, 0x9, 0x39f6) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x8, 0x0, 0x1, 0x3f, 0x0, 0x3, 0x184, 0x4, 0x6, 0x5, 0x2, 0x77, 0x7, 0x62, 0x3de933df, 0x2, 0x5, 0x0, 0x1, 0x7fff, 0x1, 0xff, 0x7fff, 0x0, 0xfffffffffffff6bf, 0x1000, 0x2, 0x0, 0x8, 0xa8c, 0x0, 0x5, 0x557c, 0x9, 0x6, 0x2, 0x0, 0x1000, 0x2, @perf_config_ext={0x1f}, 0x100, 0x20, 0x4, 0xf, 0x0, 0xf5, 0xcb0}, r0, 0x0, 0xffffffffffffffff, 0x8) write$UHID_INPUT2(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xcd) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, 0x0) getsockname$packet(r2, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) creat(&(0x7f00000002c0)='./bus\x00', 0x5) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r3, &(0x7f0000000240)='memory.swap.current\x00', 0x0, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) 04:02:36 executing program 5: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r0, &(0x7f0000000140)={0x15, 0x65, 0xffff, 0x8001, 0x8, '9P2000.L'}, 0x15) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x26f) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') lseek(r2, 0x20400000, 0x0) 04:02:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000002c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000a00)="585ccbc4ed83b836c1a6474914dc5500b66147f9cb451c91690000000042e3d75228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000380)="2df8015143df52cc5a39d13c8e399bb56dd0b9de67a3fdf534a214b0a5608d45310b9bf42613795115238327da0ccb46c3d005c3d342c2f68d507fcf3290b477ec162ddad829b12f1117aead01ecd3ed1d0b63e9c635862fc9219c441d5c482d7e86bd79f9b07943e45d0731fc737254f2ddb7534936635e314cdcd8aa666187d3cdddfb21b7f456181d62ae48ad2be5cb8919f3e6a3fd01ecc60a4515", 0x9d, 0xfffffffffffffffd) r3 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_NEW_DEST(r3, 0x0, 0x4000800) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) [ 197.844735][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 197.850581][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:02:36 executing program 4: socketpair$unix(0x1, 0x40000000001, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rxrpc(0x21, 0x2, 0x400000000000a) accept(r1, &(0x7f0000000240)=@un=@abs, 0x0) 04:02:36 executing program 0: r0 = socket$inet6(0xa, 0x80000000080003, 0x20000000003c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) write$binfmt_misc(r0, &(0x7f0000000840)={'syz1'}, 0x4) 04:02:36 executing program 5: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r0, &(0x7f0000000140)={0x15, 0x65, 0xffff, 0x8001, 0x8, '9P2000.L'}, 0x15) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x26f) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') lseek(r2, 0x20400000, 0x0) 04:02:37 executing program 2: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x80000004b) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x23e7ab5d991e0ff9, 0x0, 0x0, 0x800e00507) r2 = socket$inet_udp(0x2, 0x2, 0x0) readv(r2, &(0x7f0000000700)=[{&(0x7f0000000180)=""/57, 0x39}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) shutdown(r1, 0x0) 04:02:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000180)) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 198.299293][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:02:37 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xd) read(r0, 0x0, 0x223) 04:02:37 executing program 5: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r0, &(0x7f0000000140)={0x15, 0x65, 0xffff, 0x8001, 0x8, '9P2000.L'}, 0x15) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x26f) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') lseek(r2, 0x20400000, 0x0) 04:02:37 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) r0 = getpid() memfd_create(&(0x7f0000000080)='[,trusted\x00', 0x1) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x1, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)) socket$inet_udplite(0x2, 0x2, 0x88) semget$private(0x0, 0x3, 0x100) pipe(&(0x7f00000001c0)) memfd_create(0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x313}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0xff7ffffffffffffc, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x12040, 0x0) readahead(r1, 0x9, 0x39f6) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x8, 0x0, 0x1, 0x0, 0x0, 0x3, 0x184, 0x4, 0x6, 0x5, 0x2, 0x77, 0x7, 0x62, 0x3de933df, 0x2, 0x5, 0x5, 0x1, 0x7fff, 0x1, 0xff, 0x7fff, 0x0, 0xfffffffffffff6bf, 0x1000, 0x2, 0x0, 0x8, 0xa8c, 0x0, 0x5, 0x557c, 0x9, 0x6, 0x2, 0x0, 0x1000, 0x2, @perf_config_ext={0x1f}, 0x100, 0x20, 0x4, 0xf, 0x0, 0xf5, 0xcb0}, r0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_INPUT2(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xcd) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) getsockname$packet(r1, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) creat(&(0x7f00000002c0)='./bus\x00', 0x5) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r2, &(0x7f0000000240)='memory.swap.current\x00', 0x0, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000740)="5d5f43a474c40329b5fbcff1d0675020e456e97c329ef11fad7ec67f4b3619c519011f62595720bffbf698dfddae62eedbfa8a21b36b8315cd93d85e1b2a84a3178fb56f85583d67874b55c9c6d979064684265e748fdc4266429f0abe7996bdc73dd77f3c6d45210a2d39a7dd6be3d15702c83ad90db590a2dc7b9b52c9fa8b3dd39941b478ca2a199bf9335d1221bd83c891fc0046e39bddfada9c2edeed9706306d595ad965eef444778115f028c1804690", 0xb3) socket$packet(0x11, 0x3, 0x300) 04:02:37 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 04:02:37 executing program 5: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000140)={0x15, 0x65, 0xffff, 0x8001, 0x8, '9P2000.L'}, 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') lseek(r3, 0x20400000, 0x0) 04:02:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000034c0)=[{&(0x7f0000000040)=""/163, 0xa3}, {0x0}, {0x0}, {0x0}], 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x26ba, 0x0, 0x0, 0x800e00517) shutdown(r0, 0x0) poll(0x0, 0x0, 0x101) recvfrom$inet(0xffffffffffffffff, 0x0, 0x22b41b9a8748acb4, 0x0, 0x0, 0x800e0050e) shutdown(r1, 0x0) 04:02:37 executing program 5: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000140)={0x15, 0x65, 0xffff, 0x8001, 0x8, '9P2000.L'}, 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') lseek(r3, 0x20400000, 0x0) 04:02:37 executing program 5: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000140)={0x15, 0x65, 0xffff, 0x8001, 0x8, '9P2000.L'}, 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') lseek(r3, 0x20400000, 0x0) 04:02:37 executing program 3: poll(0x0, 0x0, 0x8000000000047) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r1, &(0x7f0000000180)=[{&(0x7f0000000880)=""/4096, 0x1000}], 0x1) r2 = dup(r1) execve(0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x862, 0x0, 0x0, 0x800e0050f) shutdown(r2, 0x0) r4 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r4, &(0x7f0000000800)=[{&(0x7f0000000240)=""/223, 0xdf}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) shutdown(r3, 0x0) shutdown(r0, 0x0) 04:02:37 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x80000004c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x2928, 0x0, 0x0, 0x800e00507) readv(r0, &(0x7f00000013c0)=[{&(0x7f0000000100)=""/195, 0xc3}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) shutdown(r1, 0x0) [ 199.048893][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:02:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = eventfd(0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) [ 199.118041][T10529] kasan: CONFIG_KASAN_INLINE enabled [ 199.148703][T10529] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 199.175198][T10529] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 199.182157][T10529] CPU: 0 PID: 10529 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190802 #58 [ 199.191250][T10529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.201317][T10529] RIP: 0010:tls_trim_both_msgs+0x54/0x130 [ 199.207033][T10529] Code: 48 c1 ea 03 80 3c 02 00 0f 85 e3 00 00 00 4d 8b b5 b0 06 00 00 48 b8 00 00 00 00 00 fc ff df 49 8d 7e 28 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 b3 00 00 00 48 b8 00 00 00 00 00 fc ff df 49 8b [ 199.226631][T10529] RSP: 0018:ffff88805979fac0 EFLAGS: 00010206 [ 199.232686][T10529] RAX: dffffc0000000000 RBX: ffff888093803240 RCX: ffffc9000e7a1000 [ 199.240645][T10529] RDX: 0000000000000005 RSI: ffffffff862e29d6 RDI: 0000000000000028 [ 199.248603][T10529] RBP: ffff88805979fae0 R08: ffff888059796200 R09: ffffed101262bab9 [ 199.256566][T10529] R10: ffffed101262bab8 R11: ffff88809315d5c3 R12: 0000000000000000 [ 199.264552][T10529] R13: ffff8880a026ac40 R14: 0000000000000000 R15: 00000000ffffffe0 [ 199.272518][T10529] FS: 00007f15ebd45700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 199.281431][T10529] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 199.288002][T10529] CR2: 0000000020000040 CR3: 00000000924a2000 CR4: 00000000001406f0 [ 199.295960][T10529] Call Trace: [ 199.299246][T10529] tls_sw_sendmsg+0xe38/0x17b0 [ 199.304032][T10529] ? tx_work_handler+0x180/0x180 [ 199.308977][T10529] ? assoc_array_gc+0x1427/0x1440 [ 199.313987][T10529] ? retint_kernel+0x2b/0x2b [ 199.318579][T10529] ? inet6_ioctl+0x1c0/0x1c0 [ 199.323186][T10529] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 199.329414][T10529] inet6_sendmsg+0x9e/0xe0 [ 199.333818][T10529] ? inet6_ioctl+0x1c0/0x1c0 [ 199.338404][T10529] sock_sendmsg+0xd7/0x130 [ 199.342816][T10529] __sys_sendto+0x262/0x380 [ 199.347314][T10529] ? __ia32_sys_getpeername+0xb0/0xb0 [ 199.352686][T10529] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 199.358915][T10529] ? put_timespec64+0xda/0x140 [ 199.363683][T10529] ? nsecs_to_jiffies+0x30/0x30 [ 199.368528][T10529] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 199.375365][T10529] ? __x64_sys_clock_gettime+0x16d/0x240 [ 199.380992][T10529] __x64_sys_sendto+0xe1/0x1a0 [ 199.385768][T10529] do_syscall_64+0xfa/0x760 [ 199.390266][T10529] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 199.396146][T10529] RIP: 0033:0x459829 [ 199.400033][T10529] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 199.419625][T10529] RSP: 002b:00007f15ebd44c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 199.428023][T10529] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000459829 [ 199.435985][T10529] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000004 [ 199.443946][T10529] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 199.451931][T10529] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f15ebd456d4 [ 199.459891][T10529] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 00000000ffffffff [ 199.467855][T10529] Modules linked in: [ 199.543777][ T3879] kobject: 'loop5' (000000005ec6bf1c): kobject_uevent_env [ 199.551107][ T3879] kobject: 'loop5' (000000005ec6bf1c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 199.578428][ T3879] kobject: 'loop1' (00000000ef4bb450): kobject_uevent_env [ 199.597526][ T3879] kobject: 'loop1' (00000000ef4bb450): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 199.624719][T10529] ---[ end trace 43981681c280f805 ]--- [ 199.643693][T10529] RIP: 0010:tls_trim_both_msgs+0x54/0x130 [ 199.658760][T10529] Code: 48 c1 ea 03 80 3c 02 00 0f 85 e3 00 00 00 4d 8b b5 b0 06 00 00 48 b8 00 00 00 00 00 fc ff df 49 8d 7e 28 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 b3 00 00 00 48 b8 00 00 00 00 00 fc ff df 49 8b [ 199.683559][T10529] RSP: 0018:ffff88805979fac0 EFLAGS: 00010206 [ 199.690552][T10529] RAX: dffffc0000000000 RBX: ffff888093803240 RCX: ffffc9000e7a1000 [ 199.711757][T10529] RDX: 0000000000000005 RSI: ffffffff862e29d6 RDI: 0000000000000028 [ 199.720120][T10529] RBP: ffff88805979fae0 R08: ffff888059796200 R09: ffffed101262bab9 [ 199.731622][T10529] R10: ffffed101262bab8 R11: ffff88809315d5c3 R12: 0000000000000000 [ 199.744952][T10529] R13: ffff8880a026ac40 R14: 0000000000000000 R15: 00000000ffffffe0 [ 199.753029][T10529] FS: 00007f15ebd45700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 199.762169][T10529] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 199.769473][T10529] CR2: 00007fff33fb1fac CR3: 00000000924a2000 CR4: 00000000001406e0 [ 199.777759][T10529] Kernel panic - not syncing: Fatal exception [ 199.783484][ T3879] kobject: 'loop3' (00000000ed37e3fb): kobject_uevent_env [ 199.791813][T10529] Kernel Offset: disabled [ 199.796129][T10529] Rebooting in 86400 seconds..