[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 59.081847][ T26] audit: type=1800 audit(1572128926.803:25): pid=8599 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 59.108763][ T26] audit: type=1800 audit(1572128926.803:26): pid=8599 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 59.153475][ T26] audit: type=1800 audit(1572128926.813:27): pid=8599 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.233' (ECDSA) to the list of known hosts. 2019/10/26 22:28:56 fuzzer started 2019/10/26 22:28:58 dialing manager at 10.128.0.26:34793 2019/10/26 22:28:58 syscalls: 2534 2019/10/26 22:28:58 code coverage: enabled 2019/10/26 22:28:58 comparison tracing: enabled 2019/10/26 22:28:58 extra coverage: extra coverage is not supported by the kernel 2019/10/26 22:28:58 setuid sandbox: enabled 2019/10/26 22:28:58 namespace sandbox: enabled 2019/10/26 22:28:58 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/26 22:28:58 fault injection: enabled 2019/10/26 22:28:58 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/26 22:28:58 net packet injection: enabled 2019/10/26 22:28:58 net device setup: enabled 2019/10/26 22:28:58 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 22:30:58 executing program 0: 22:30:58 executing program 1: syzkaller login: [ 190.687142][ T8767] IPVS: ftp: loaded support on port[0] = 21 [ 190.854142][ T8769] IPVS: ftp: loaded support on port[0] = 21 [ 190.881863][ T8767] chnl_net:caif_netlink_parms(): no params data found 22:30:58 executing program 2: [ 190.992438][ T8767] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.000789][ T8767] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.009271][ T8767] device bridge_slave_0 entered promiscuous mode [ 191.017938][ T8767] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.025360][ T8767] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.033895][ T8767] device bridge_slave_1 entered promiscuous mode [ 191.081368][ T8769] chnl_net:caif_netlink_parms(): no params data found [ 191.095721][ T8767] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 191.143470][ T8767] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 191.182350][ T8769] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.207698][ T8769] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.227988][ T8769] device bridge_slave_0 entered promiscuous mode [ 191.236967][ T8767] team0: Port device team_slave_0 added [ 191.245201][ T8767] team0: Port device team_slave_1 added 22:30:59 executing program 3: [ 191.253894][ T8769] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.267744][ T8769] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.275364][ T8769] device bridge_slave_1 entered promiscuous mode [ 191.314807][ T8773] IPVS: ftp: loaded support on port[0] = 21 [ 191.392885][ T8767] device hsr_slave_0 entered promiscuous mode 22:30:59 executing program 4: [ 191.458071][ T8767] device hsr_slave_1 entered promiscuous mode [ 191.515265][ T8769] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 191.544441][ T8775] IPVS: ftp: loaded support on port[0] = 21 [ 191.593150][ T8769] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 191.691805][ T8769] team0: Port device team_slave_0 added [ 191.739246][ T8769] team0: Port device team_slave_1 added [ 191.754635][ T8777] IPVS: ftp: loaded support on port[0] = 21 22:30:59 executing program 5: [ 191.790107][ T8767] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.797323][ T8767] bridge0: port 2(bridge_slave_1) entered forwarding state [ 191.805284][ T8767] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.812415][ T8767] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.870435][ T8769] device hsr_slave_0 entered promiscuous mode [ 191.908209][ T8769] device hsr_slave_1 entered promiscuous mode [ 191.957954][ T8769] debugfs: Directory 'hsr0' with parent '/' already present! [ 191.995977][ T3779] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.005736][ T3779] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.028994][ T8780] IPVS: ftp: loaded support on port[0] = 21 [ 192.085908][ T8775] chnl_net:caif_netlink_parms(): no params data found [ 192.114407][ T8773] chnl_net:caif_netlink_parms(): no params data found [ 192.179919][ T8775] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.188709][ T8775] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.196324][ T8775] device bridge_slave_0 entered promiscuous mode [ 192.209237][ T8775] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.216302][ T8775] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.224365][ T8775] device bridge_slave_1 entered promiscuous mode [ 192.268011][ T8775] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 192.278705][ T8775] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 192.288650][ T8773] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.295727][ T8773] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.303736][ T8773] device bridge_slave_0 entered promiscuous mode [ 192.314287][ T8773] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.321461][ T8773] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.329420][ T8773] device bridge_slave_1 entered promiscuous mode [ 192.348628][ T8773] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 192.377406][ T8773] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 192.394740][ T8767] 8021q: adding VLAN 0 to HW filter on device bond0 [ 192.404185][ T8775] team0: Port device team_slave_0 added [ 192.413987][ T8775] team0: Port device team_slave_1 added [ 192.429727][ T8773] team0: Port device team_slave_0 added [ 192.436924][ T8773] team0: Port device team_slave_1 added [ 192.530746][ T8775] device hsr_slave_0 entered promiscuous mode [ 192.578155][ T8775] device hsr_slave_1 entered promiscuous mode [ 192.627788][ T8775] debugfs: Directory 'hsr0' with parent '/' already present! [ 192.677241][ T8767] 8021q: adding VLAN 0 to HW filter on device team0 [ 192.740913][ T8773] device hsr_slave_0 entered promiscuous mode [ 192.778042][ T8773] device hsr_slave_1 entered promiscuous mode [ 192.817736][ T8773] debugfs: Directory 'hsr0' with parent '/' already present! [ 192.853112][ T3777] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 192.861900][ T3777] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 192.869742][ T3777] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 192.878260][ T3777] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 192.886627][ T3777] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.893734][ T3777] bridge0: port 1(bridge_slave_0) entered forwarding state [ 192.960689][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 192.973654][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 192.982408][ T47] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.989501][ T47] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.996996][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 193.006051][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 193.050045][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 193.059179][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 193.068926][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 193.077511][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 193.086190][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 193.096699][ T8777] chnl_net:caif_netlink_parms(): no params data found [ 193.136279][ T8784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 193.144765][ T8784] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 193.153355][ T8784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 193.161722][ T8784] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 193.170910][ T8780] chnl_net:caif_netlink_parms(): no params data found [ 193.194908][ T8767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 193.254217][ T8777] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.262484][ T8777] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.270570][ T8777] device bridge_slave_0 entered promiscuous mode [ 193.292653][ T8769] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.310143][ T8777] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.317207][ T8777] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.325026][ T8777] device bridge_slave_1 entered promiscuous mode [ 193.350409][ T8775] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.357266][ T8780] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.364629][ T8780] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.372934][ T8780] device bridge_slave_0 entered promiscuous mode [ 193.382948][ T8767] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 193.399213][ T8777] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 193.416718][ T8775] 8021q: adding VLAN 0 to HW filter on device team0 [ 193.425595][ T8780] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.433268][ T8780] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.442044][ T8780] device bridge_slave_1 entered promiscuous mode [ 193.454491][ T8777] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 193.471722][ T8784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.479753][ T8784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.492744][ T8769] 8021q: adding VLAN 0 to HW filter on device team0 [ 193.529850][ T8777] team0: Port device team_slave_0 added [ 193.536353][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.544865][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.575328][ T8777] team0: Port device team_slave_1 added [ 193.591800][ T8780] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 193.606525][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 193.616877][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 193.625698][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.632801][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.640653][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 193.649513][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 193.658020][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.665080][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.672885][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 193.682223][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 193.690997][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.698115][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.705650][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 193.714338][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 193.723109][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 193.731787][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.738925][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.747154][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 193.755908][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 193.786252][ T8780] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 193.807559][ T8780] team0: Port device team_slave_0 added [ 193.815332][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 193.825222][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 22:31:01 executing program 0: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="0414cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="ea0000008000000000cbc624877c8252c28f5e87a64820546a1ebe1f6adb3b91e7f1ffd7e4ab569f8eb9808e0b61a0bf7a301ffe8dac0773d9e5411f2b25f3fbc7cf9482c1f0d81a590ed76f2c4af37bd3d331de23d61ca62ef8d48f42ffd913acf060c10300000082fc399eaab8787f0dd1510490b0f420326bcc4e2b65e7c68bacee7877a6274d908e5a5d512b87ed3eb24d00020160d1f3f3c0da4b0638b1d331edbedf8a03a722ffa87cc2dfec4758b087c23cc9c5e726fea942494855d4bd3388b68af3", @ANYPTR64, @ANYRESHEX=0x0, @ANYRESOCT, @ANYBLOB="e6c55c5d9eb82ee4510100010029a741efca44f937d0492482ba837296d961244e2e0c734057548c402cc43b3897cc275fd87f333c960d2bc40dd887fc8dc4872bf5b65c87e940b30e38cd99cb29956ef78ffcac83012ba705592fec", @ANYRESDEC], 0x0, 0x167}, 0x20) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 193.834898][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 193.852340][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 193.875755][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 22:31:01 executing program 0: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x68}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f00000002c0), 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000001000)={'filter\x00', 0x31, "d34f6096c32f5aa6f287d3df6df39f00fbe30f23370de96168d24b5276982858c2f43d2253146926f9aced3feb2d2a8b1c"}, &(0x7f0000000100)=0x55) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 193.894478][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 193.903612][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 193.907094][ T8794] ptrace attach of "/root/syz-executor.0"[8793] was attempted by "/root/syz-executor.0"[8794] [ 193.912814][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 193.931631][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 193.959320][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 193.980046][ T8780] team0: Port device team_slave_1 added [ 193.988987][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 193.997476][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 193.998480][ C0] hrtimer: interrupt took 54166 ns [ 194.016390][ T8769] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 194.030378][ T8769] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 22:31:01 executing program 0: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x68}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f00000002c0), 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000001000)={'filter\x00', 0x31, "d34f6096c32f5aa6f287d3df6df39f00fbe30f23370de96168d24b5276982858c2f43d2253146926f9aced3feb2d2a8b1c"}, &(0x7f0000000100)=0x55) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 194.147196][ T8777] device hsr_slave_0 entered promiscuous mode [ 194.198146][ T8777] device hsr_slave_1 entered promiscuous mode [ 194.238877][ T8777] debugfs: Directory 'hsr0' with parent '/' already present! [ 194.251751][ T8775] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 194.270783][ T8773] 8021q: adding VLAN 0 to HW filter on device bond0 22:31:02 executing program 0: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x68}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f00000002c0), 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000001000)={'filter\x00', 0x31, "d34f6096c32f5aa6f287d3df6df39f00fbe30f23370de96168d24b5276982858c2f43d2253146926f9aced3feb2d2a8b1c"}, &(0x7f0000000100)=0x55) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 194.340750][ T8780] device hsr_slave_0 entered promiscuous mode [ 194.378093][ T8780] device hsr_slave_1 entered promiscuous mode [ 194.418073][ T8780] debugfs: Directory 'hsr0' with parent '/' already present! [ 194.427236][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 194.442096][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 194.452957][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 22:31:02 executing program 0: add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000040)={0x2, 0x1bd, 0x68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f0000000340)={@local}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) r1 = socket$packet(0x11, 0x3, 0x300) sendmsg(r1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB]}, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) ioctl$HCIINQUIRY(0xffffffffffffffff, 0x800448f0, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, &(0x7f0000000200)={0x8000000, 0xfffffff8}) creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x84003ff) open(0x0, 0x0, 0x0) gettid() shmctl$IPC_RMID(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000280), 0xc, &(0x7f0000000680)={&(0x7f00000010c0)={0xd8, 0x0, 0x0, 0x0, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x20, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x23}]}, @TIPC_NLA_LINK_PROP={0x4}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x45b5}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffff7fff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8}]}, @TIPC_NLA_BEARER={0x4c, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x20, 0x2, @in6={0xa, 0x9, 0x0, @ipv4={[], [], @empty}, 0xffff5c00}}}}]}]}, 0xd8}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) [ 194.462651][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 194.471902][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 194.480345][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 194.488957][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 194.498017][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 194.518665][ T8769] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 194.564637][ T8773] 8021q: adding VLAN 0 to HW filter on device team0 [ 194.595291][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 194.605640][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 194.619911][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 194.627920][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 194.640660][ T8775] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 194.657913][ T3777] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 194.666606][ T3777] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 194.676825][ T3777] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.683964][ T3777] bridge0: port 1(bridge_slave_0) entered forwarding state [ 194.740335][ T3777] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 194.748827][ T3777] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 194.762195][ T3777] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 194.771060][ T3777] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.778183][ T3777] bridge0: port 2(bridge_slave_1) entered forwarding state [ 194.792176][ T3777] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 194.801445][ T3777] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 194.944652][ T8784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 194.953409][ T8784] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 194.962132][ T8784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 194.974776][ T8784] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 194.983252][ T8784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 194.991595][ T8784] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 195.009333][ T8773] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 195.024305][ T8773] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 195.036147][ T8784] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 195.044270][ T8784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 195.052693][ T8784] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 22:31:02 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000100)=""/246) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000d1df52)=""/174) 22:31:02 executing program 0: add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000040)={0x2, 0x1bd, 0x68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f0000000340)={@local}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) r1 = socket$packet(0x11, 0x3, 0x300) sendmsg(r1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB]}, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) ioctl$HCIINQUIRY(0xffffffffffffffff, 0x800448f0, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, &(0x7f0000000200)={0x8000000, 0xfffffff8}) creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x84003ff) open(0x0, 0x0, 0x0) gettid() shmctl$IPC_RMID(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000280), 0xc, &(0x7f0000000680)={&(0x7f00000010c0)={0xd8, 0x0, 0x0, 0x0, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x20, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x23}]}, @TIPC_NLA_LINK_PROP={0x4}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x45b5}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffff7fff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8}]}, @TIPC_NLA_BEARER={0x4c, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x20, 0x2, @in6={0xa, 0x9, 0x0, @ipv4={[], [], @empty}, 0xffff5c00}}}}]}]}, 0xd8}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) [ 195.131292][ T8773] 8021q: adding VLAN 0 to HW filter on device batadv0 22:31:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x82) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_SREGS(r4, 0x8090ae81, &(0x7f0000000140)) dup2(r5, r4) r6 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) [ 195.237086][ T8777] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.342383][ T8835] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 195.347683][ T8777] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.371114][ T3777] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 195.380804][ T3777] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.406457][ T8780] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.428446][ T8784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 195.448719][ T8784] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.463705][ T8784] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.470822][ T8784] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.478446][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 195.484359][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 195.498318][ T8784] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 195.595220][ T8780] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.634100][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 22:31:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup(r0) setsockopt$inet_int(r1, 0x0, 0x32, &(0x7f0000000040), 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 22:31:03 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000800)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x68}}) [ 195.666274][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 195.698097][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.705255][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.735686][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 195.745117][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 195.754507][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 195.764873][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.773168][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 195.784664][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 195.793749][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 195.803022][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 195.815937][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 195.856546][ T8777] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 195.873507][ T8777] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 195.905560][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 195.918267][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 195.943284][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 195.953158][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 195.979809][ T8777] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 196.025596][ T8784] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 196.051666][ T8784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 196.064998][ T8784] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 196.080159][ T8784] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.087416][ T8784] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.095615][ T8784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 196.104401][ T8784] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 196.112881][ T8784] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.120004][ T8784] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.128694][ T8784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 196.137480][ T8784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 196.146157][ T8784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 196.154686][ T8784] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 196.163671][ T8784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 196.172298][ T8784] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 196.187950][ T8780] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 196.199409][ T8780] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 196.218104][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 196.226155][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 196.234589][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 196.245749][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 196.254880][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 196.263495][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 196.282755][ T8780] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 196.291688][ T8784] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 22:31:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x4e21, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x4, @broadcast}, 0x5d4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) 22:31:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x1) r2 = accept(r0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x3a9, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[], 0x1}, 0x1, 0x0, 0x0, 0x88000}, 0x0) recvfrom$inet6(r1, &(0x7f00000003c0)=""/226, 0xfffffffffffffec8, 0x0, 0x0, 0x0) close(r1) 22:31:04 executing program 1: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000db0ff8)='./file0\x00', &(0x7f0000000800)='configfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) 22:31:04 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) close(0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000006800)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001c00070f000000000000000007000000", @ANYRES32=r3, @ANYBLOB="032300000a0002"], 0x3}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 22:31:04 executing program 2: r0 = semget$private(0x0, 0x20000000102, 0x0) semop(r0, &(0x7f00000000c0), 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x400, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, 0xffffffffffffffff) r4 = open(&(0x7f0000000140)='./bus\x00', 0x11d000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000040)=0x801c) r5 = creat(&(0x7f0000000080)='./bus\x00', 0x0) io_setup(0x8, &(0x7f0000000180)) io_submit(0x0, 0x0, &(0x7f0000000540)) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000000)={0x0, @broadcast, @multicast1}, &(0x7f00000000c0)=0xc) setsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000140)={@empty, @broadcast, r6}, 0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200)={@local, r6}, 0x14) clock_gettime(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r7, &(0x7f0000008880), 0x400000000000059, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r9, 0x407, 0x0) write(r9, &(0x7f0000000340), 0x41395527) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78e, 0x0, @perf_config_ext={0x10000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r10, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r10, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) getpid() semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000000)=""/105) fcntl$getownex(r9, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r11, 0x9, &(0x7f0000000200)) 22:31:04 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000800)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x68}}) 22:31:04 executing program 4: memfd_create(&(0x7f0000000040)='/dev.auc\xce\xd2m1\xf7p\xf8]%v\xad\xdaM\x89\xd21\x11L\xdb\f7\xc0A\x8d\xa4wJXo\x11\r\x91\x87\x16\xae\xfc\xc0D\xda\xccbVI\x01\x00\x00\x00\x00\x00\x00\x00\xe9\x94\xbc\x02\x00\x00\x00\x00\x00\x00\x103\xd6e\xferu\x9a\xa9\x84\xea\xe7#r\x93}\xac\xe3MU\xcd2G\x82\xadx', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='\x00\x00t/netstap\x00') clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="2cb8436828c7e6f1cd80"], 0xa}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x4) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)={0x0, 0x0, 0x0, r0}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 196.565213][ T8877] ptrace attach of "/root/syz-executor.4"[8876] was attempted by "/root/syz-executor.4"[8877] [ 196.577720][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 196.583526][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 196.600885][ T8882] devpts: called with bogus options 22:31:04 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000006800)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001c00070f000000000000000007000000", @ANYRES32=r5, @ANYBLOB="032300000a0002"], 0x3}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 22:31:04 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) read(r1, 0x0, 0x0) [ 196.646919][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:31:04 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="0414cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="ea0000008000000000cbc624877c8252c28f5e87a64820546a1ebe1f6adb3b91e7f1ffd7e4ab569f8eb9808e0b61a0bf7a301ffe8dac0773d9e5411f2b25f3fbc7cf9482c1f0d81a590ed76f2c4af37bd3d331de23d61ca62ef8d48f42ffd913acf060c10300000082fc399eaab8787f0dd1510490b0f420326bcc4e2b65e7c68bacee7877a6274d908e5a5d512b87ed3eb24d00020160d1f3f3c0da4b0638b1d331edbedf8a03a722ffa87cc2dfec4758b087c23cc9c5e726fea942494855d4bd3388b68af3", @ANYPTR64, @ANYRESHEX=0x0, @ANYRESOCT, @ANYBLOB="e6c55c5d9eb82ee4510100010029a741efca44f937d0492482ba837296d961244e2e0c734057548c402cc43b3897cc275fd87f333c960d2bc40dd887fc8dc4872bf5b65c87e940b30e38cd99cb29956ef78ffcac83012ba705592fec"], 0x0, 0x153}, 0x20) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 196.697790][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 196.703618][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 196.723446][ T8894] ptrace attach of "/root/syz-executor.3"[8893] was attempted by "/root/syz-executor.3"[8894] 22:31:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) perf_event_open(&(0x7f0000000640)={0x5, 0x70, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x9, 0x7ff}, 0x18404, 0x9, 0x0, 0x7, 0x0, 0x6d7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) umount2(&(0x7f0000000540)='./file0\x00', 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) 22:31:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000003c0)='ramfs\x00\nj 4\xfc\xcb?\xdf\xd5\x8e^O\xc5\x9a\x17\xb4\x99}VJ\t`\xa3\x9f\xc5\x7f\x1d@z7\xef\x02\x13\xae~p\xb7\xde\xf6\xefP\xb0\x1di\x925\x10V\x1a\x97s \xf0I\xbf\x9ah\x85\xe4i\"5@\xe9\xc6\xa9\xc7\xabRk\x96\xeaM\xbd\xa3\xdb\xbbl\x94\x17\xb2\xd4\f\xbc\">\xf2c\xea\x10\x84\x02\x1e\xb3\xef\xdf\x15\xd1d\x14\x83?\x8d\xe9\x87\xbb\n\xb5f\xec*\x00\x8c\xb6\xd0\x8c\xe4\xe1e\xb9\xa6\xe8\xbd\xae\xcf\xd9;eG\xa8\x15\xe5V5\xce\xac\xd5F\x8e\x12\x1f\x17\x87A\xe9\xd4\xc0}o\x1e\xab\xab\x1b\xfc\xa5\x057\xa3\x1b\x06\xb9\x8c\xdb\b\x83O\xf2\x02[\xeb\x8a\x1a\xcah\xce\xf5\xba\xea\xc4-$@\r', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') umount2(&(0x7f0000000280)='./file0\x00', 0x2) [ 196.768188][ C0] protocol 88fb is buggy, dev hsr_slave_0 22:31:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000740)=ANY=[@ANYBLOB="02000000000000ef785f8bbf0000000000000080009601c40b8e570a6a06751c8e7ff1060000101771abcf53c21a6f04ba10b0140ce0127d229d6ffe0ad3400eec07485331c262abe0cf428610f88acba05a22a5072c16bf9d81026cb745fe693a47"]) shmat(0x0, &(0x7f0000fed000/0x1000)=nil, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x8}, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffe, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x200000, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) perf_event_open(&(0x7f0000000640)={0x5, 0x70, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x9, 0x7ff}, 0x18404, 0x9, 0x0, 0x7, 0x0, 0x6d7, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) umount2(&(0x7f0000000540)='./file0\x00', 0x4) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f00000001c0)={{0x0, 0x3}, {0x1}, 0x7fff, 0xdca61c598119782f, 0x38}) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 22:31:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x82) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_SREGS(r4, 0x81a0ae8c, &(0x7f0000000140)) dup2(r5, r4) r6 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 22:31:04 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x30a4d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 22:31:04 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000800)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1f, 0xb, 0x68}}) [ 197.427378][ T8910] devpts: called with bogus options 22:31:05 executing program 2: r0 = semget$private(0x0, 0x20000000102, 0x0) semop(r0, &(0x7f00000000c0), 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x400, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, 0xffffffffffffffff) r4 = open(&(0x7f0000000140)='./bus\x00', 0x11d000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000040)=0x801c) r5 = creat(&(0x7f0000000080)='./bus\x00', 0x0) io_setup(0x8, &(0x7f0000000180)) io_submit(0x0, 0x0, &(0x7f0000000540)) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000000)={0x0, @broadcast, @multicast1}, &(0x7f00000000c0)=0xc) setsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000140)={@empty, @broadcast, r6}, 0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200)={@local, r6}, 0x14) clock_gettime(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r7, &(0x7f0000008880), 0x400000000000059, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r9, 0x407, 0x0) write(r9, &(0x7f0000000340), 0x41395527) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78e, 0x0, @perf_config_ext={0x10000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r10, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r10, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) getpid() semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000000)=""/105) fcntl$getownex(r9, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r11, 0x9, &(0x7f0000000200)) 22:31:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_opts(r1, 0x0, 0xd, &(0x7f0000000040)=""/57, &(0x7f00000010c0)=0x39) 22:31:05 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r2, r0, 0x0) 22:31:05 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x68}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000001000)={'filter\x00', 0x26, "d34f6096c32f5aa6f287d3df6df39f00fbe30f23370de96168d24b5276982858c2f43d225314"}, &(0x7f0000000100)=0x4a) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfc61) 22:31:05 executing program 1: 22:31:05 executing program 5: 22:31:05 executing program 5: 22:31:05 executing program 3: 22:31:05 executing program 4: 22:31:05 executing program 1: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x68}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfc61) [ 197.742476][ T8965] devpts: called with bogus options 22:31:05 executing program 3: 22:31:05 executing program 4: 22:31:06 executing program 2: 22:31:06 executing program 5: 22:31:06 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x68}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000001000)={'filter\x00', 0x26, "d34f6096c32f5aa6f287d3df6df39f00fbe30f23370de96168d24b5276982858c2f43d225314"}, &(0x7f0000000100)=0x4a) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfc61) 22:31:06 executing program 1: 22:31:06 executing program 3: 22:31:06 executing program 4: 22:31:06 executing program 1: 22:31:06 executing program 5: 22:31:06 executing program 3: 22:31:06 executing program 4: 22:31:06 executing program 2: 22:31:06 executing program 5: 22:31:06 executing program 2: 22:31:06 executing program 3: 22:31:06 executing program 4: 22:31:06 executing program 0: 22:31:06 executing program 1: 22:31:06 executing program 2: 22:31:06 executing program 5: 22:31:06 executing program 3: 22:31:06 executing program 1: 22:31:06 executing program 4: 22:31:06 executing program 0: 22:31:06 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000000, 0x44050, r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(r1, &(0x7f0000000440)=""/207, 0xcf, 0x2020, &(0x7f0000000300)=@isdn={0x22, 0x7, 0x7, 0xfffffffffffffff8, 0x5}, 0x80) r3 = socket(0x1b, 0x5, 0x6) recvmsg$kcm(r3, &(0x7f0000001d40)={&(0x7f0000000900)=@nl=@proc, 0x80, &(0x7f0000001c00)=[{0x0}, {&(0x7f0000001a80)=""/89, 0x59}, {&(0x7f0000001b00)=""/253, 0xfd}], 0x3}, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0b") r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r4, 0x11, 0x1, &(0x7f0000000380)=0x4, 0x4) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140), 0x4) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000180)={0x0, r5, 0x6, 0x7f, 0x80000000, 0x8}) setsockopt$inet6_udp_int(r4, 0x11, 0x67, &(0x7f0000000100)=0x7, 0x2) socket$inet6(0xa, 0x6, 0x4) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/\x00\x00\xb6\x97<[0@\xac\xa4R\xce{f\xe9\xbb\x8fyI\x90q\xe5?\xa8\xbc\xc1\n\x15\xc7cC\xce-\xb7\xbb>:\xf7\x92\x83x\xb5o/\xa9Q\xbdi\x15c\xebxd\x19\xb4\xe2^\xb5\xe4b\xcc\xa9\xee\xeb4\xe7\xf5\xfc\xa6\xce(67G\x18E\xe2\xa1\xbaP]\xf6\xae\x98a\x06\xd1o!\xd8\xe7hU\x9a\x8d\xd3\xeaQ\xc1y+2!\x89\xc8\xfc\rWP\xd1\x9d\x8b\xbf\xb1\xe6I\xb9\x19\xfb\x02\xbb\xe2\x04\xee\x8b\xe4\xe8\xb7&GV\xfdd\x11\x9cO\xe2\xafykv\x06L:X\xfd\xefn\xd0Se\x89\xa2J-\xdb\xb8C\xb2\x8a\x9a\xae\xfcO\xf4\x85\x99\xb7gT\x9a\xbf\x05$!k\xd4\xb2\x1f^\xa5eB\xbd\x98\x99p\x14\xb1\xb7!{\x1de\xd8eP[\xc56\x95\x0eu\v,1?\xe3\x99\xe6g\xc9\x1d\a', 0x0, 0x0) readv(r6, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/87, 0x57}], 0x1) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r6, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e20, 0x6, @empty, 0x1}}, 0x6a, 0x800, 0x9, 0x800, 0x2}, &(0x7f0000000600)=0x98) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(r7, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0xffffffff, @mcast2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bcsf0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'vxcan1\x00', r8}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000740)={r8, 0x1, 0x6, @local}, 0x10) setsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780)=0x8000, 0x1) setsockopt$inet6_udp_int(r4, 0x11, 0x1, &(0x7f0000000080), 0x4) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r9 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r9, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$sock_linger(r9, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r9, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r9, &(0x7f0000000100), 0x5bd, 0x2400ffe0) r10 = socket$inet6_sctp(0xa, 0x1, 0x84) close(r10) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r10, 0x84, 0x6e, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x2, @empty, 0x5}, @in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e20, @rand_addr=0x7}, @in6={0xa, 0x4e22, 0x9, @mcast1, 0x9}], 0x68) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r10, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r9, 0x84, 0x5, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e23, 0x24, @remote, 0x5}}}, 0x84) socket$nl_xfrm(0x10, 0x3, 0x6) r11 = accept(r0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r11, 0x1, 0x19, &(0x7f0000000400)='erspan0\x00', 0x700e) sendmmsg(r1, &(0x7f000000a080)=[{{0x0, 0x0, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) 22:31:06 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000000, 0x44050, r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(r1, &(0x7f0000000440)=""/207, 0xcf, 0x2020, &(0x7f0000000300)=@isdn={0x22, 0x7, 0x7, 0xfffffffffffffff8, 0x5}, 0x80) r3 = socket(0x1b, 0x5, 0x6) recvmsg$kcm(r3, &(0x7f0000001d40)={&(0x7f0000000900)=@nl=@proc, 0x80, &(0x7f0000001c00)=[{0x0}, {&(0x7f0000001a80)=""/89, 0x59}, {&(0x7f0000001b00)=""/253, 0xfd}], 0x3}, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0b") r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r4, 0x11, 0x1, &(0x7f0000000380)=0x4, 0x4) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140), 0x4) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000180)={0x0, r5, 0x6, 0x7f, 0x80000000, 0x8}) setsockopt$inet6_udp_int(r4, 0x11, 0x67, &(0x7f0000000100)=0x7, 0x2) socket$inet6(0xa, 0x6, 0x4) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/\x00\x00\xb6\x97<[0@\xac\xa4R\xce{f\xe9\xbb\x8fyI\x90q\xe5?\xa8\xbc\xc1\n\x15\xc7cC\xce-\xb7\xbb>:\xf7\x92\x83x\xb5o/\xa9Q\xbdi\x15c\xebxd\x19\xb4\xe2^\xb5\xe4b\xcc\xa9\xee\xeb4\xe7\xf5\xfc\xa6\xce(67G\x18E\xe2\xa1\xbaP]\xf6\xae\x98a\x06\xd1o!\xd8\xe7hU\x9a\x8d\xd3\xeaQ\xc1y+2!\x89\xc8\xfc\rWP\xd1\x9d\x8b\xbf\xb1\xe6I\xb9\x19\xfb\x02\xbb\xe2\x04\xee\x8b\xe4\xe8\xb7&GV\xfdd\x11\x9cO\xe2\xafykv\x06L:X\xfd\xefn\xd0Se\x89\xa2J-\xdb\xb8C\xb2\x8a\x9a\xae\xfcO\xf4\x85\x99\xb7gT\x9a\xbf\x05$!k\xd4\xb2\x1f^\xa5eB\xbd\x98\x99p\x14\xb1\xb7!{\x1de\xd8eP[\xc56\x95\x0eu\v,1?\xe3\x99\xe6g\xc9\x1d\a', 0x0, 0x0) readv(r6, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/87, 0x57}], 0x1) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r6, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e20, 0x6, @empty, 0x1}}, 0x6a, 0x800, 0x9, 0x800, 0x2}, &(0x7f0000000600)=0x98) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(r7, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0xffffffff, @mcast2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bcsf0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'vxcan1\x00', r8}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000740)={r8, 0x1, 0x6, @local}, 0x10) setsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780)=0x8000, 0x1) setsockopt$inet6_udp_int(r4, 0x11, 0x1, &(0x7f0000000080), 0x4) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r9 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r9, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$sock_linger(r9, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r9, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r9, &(0x7f0000000100), 0x5bd, 0x2400ffe0) r10 = socket$inet6_sctp(0xa, 0x1, 0x84) close(r10) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r10, 0x84, 0x6e, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x2, @empty, 0x5}, @in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e20, @rand_addr=0x7}, @in6={0xa, 0x4e22, 0x9, @mcast1, 0x9}], 0x68) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r10, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r9, 0x84, 0x5, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e23, 0x24, @remote, 0x5}}}, 0x84) socket$nl_xfrm(0x10, 0x3, 0x6) r11 = accept(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r11, 0x1, 0x19, &(0x7f0000000400)='erspan0\x00', 0x700e) sendmmsg(r1, &(0x7f000000a080)=[{{0x0, 0x0, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) 22:31:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x11) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000800)) socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0x11, 0x3, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @local}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory', 0x6}]}, 0xfdef) 22:31:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x11) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000800)) socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0x11, 0x3, 0x300) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @local}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory', 0x6}]}, 0xfdef) 22:31:06 executing program 3: 22:31:06 executing program 0: 22:31:07 executing program 3: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab", 0x3a, 0xc, 0x0, 0x0) 22:31:07 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000640)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "338000", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [0x2]}, @local, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, 0x0) [ 199.508193][ T9067] dccp_check_seqno: Step 6 failed for RESET packet, (LSWL(117676422848622) <= P.seqno(0) <= S.SWH(117676422848696)) and (P.ackno exists or LAWL(188777339281853) <= P.ackno(188777339281854) <= S.AWH(188777339281854), sending SYNC... 22:31:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x11) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000800)) socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0x11, 0x3, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @local}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory', 0x6}]}, 0xfdef) [ 199.608342][ T9036] dccp_close: ABORT with 1061 bytes unread 22:31:07 executing program 3: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab", 0x3a, 0xc, 0x0, 0x0) 22:31:07 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000000, 0x44050, r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(r1, &(0x7f0000000440)=""/207, 0xcf, 0x2020, &(0x7f0000000300)=@isdn={0x22, 0x7, 0x7, 0xfffffffffffffff8, 0x5}, 0x80) r3 = socket(0x1b, 0x5, 0x6) recvmsg$kcm(r3, &(0x7f0000001d40)={&(0x7f0000000900)=@nl=@proc, 0x80, &(0x7f0000001c00)=[{0x0}, {&(0x7f0000001a80)=""/89, 0x59}, {&(0x7f0000001b00)=""/253, 0xfd}], 0x3}, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0b") r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r4, 0x11, 0x1, &(0x7f0000000380)=0x4, 0x4) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140), 0x4) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000180)={0x0, r5, 0x6, 0x7f, 0x80000000, 0x8}) setsockopt$inet6_udp_int(r4, 0x11, 0x67, &(0x7f0000000100)=0x7, 0x2) socket$inet6(0xa, 0x6, 0x4) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/\x00\x00\xb6\x97<[0@\xac\xa4R\xce{f\xe9\xbb\x8fyI\x90q\xe5?\xa8\xbc\xc1\n\x15\xc7cC\xce-\xb7\xbb>:\xf7\x92\x83x\xb5o/\xa9Q\xbdi\x15c\xebxd\x19\xb4\xe2^\xb5\xe4b\xcc\xa9\xee\xeb4\xe7\xf5\xfc\xa6\xce(67G\x18E\xe2\xa1\xbaP]\xf6\xae\x98a\x06\xd1o!\xd8\xe7hU\x9a\x8d\xd3\xeaQ\xc1y+2!\x89\xc8\xfc\rWP\xd1\x9d\x8b\xbf\xb1\xe6I\xb9\x19\xfb\x02\xbb\xe2\x04\xee\x8b\xe4\xe8\xb7&GV\xfdd\x11\x9cO\xe2\xafykv\x06L:X\xfd\xefn\xd0Se\x89\xa2J-\xdb\xb8C\xb2\x8a\x9a\xae\xfcO\xf4\x85\x99\xb7gT\x9a\xbf\x05$!k\xd4\xb2\x1f^\xa5eB\xbd\x98\x99p\x14\xb1\xb7!{\x1de\xd8eP[\xc56\x95\x0eu\v,1?\xe3\x99\xe6g\xc9\x1d\a', 0x0, 0x0) readv(r6, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/87, 0x57}], 0x1) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r6, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e20, 0x6, @empty, 0x1}}, 0x6a, 0x800, 0x9, 0x800, 0x2}, &(0x7f0000000600)=0x98) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(r7, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0xffffffff, @mcast2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bcsf0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'vxcan1\x00', r8}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000740)={r8, 0x1, 0x6, @local}, 0x10) setsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780)=0x8000, 0x1) setsockopt$inet6_udp_int(r4, 0x11, 0x1, &(0x7f0000000080), 0x4) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r9 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r9, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$sock_linger(r9, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r9, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r9, &(0x7f0000000100), 0x5bd, 0x2400ffe0) r10 = socket$inet6_sctp(0xa, 0x1, 0x84) close(r10) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r10, 0x84, 0x6e, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x2, @empty, 0x5}, @in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e20, @rand_addr=0x7}, @in6={0xa, 0x4e22, 0x9, @mcast1, 0x9}], 0x68) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r10, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r9, 0x84, 0x5, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e23, 0x24, @remote, 0x5}}}, 0x84) socket$nl_xfrm(0x10, 0x3, 0x6) r11 = accept(r0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r11, 0x1, 0x19, &(0x7f0000000400)='erspan0\x00', 0x700e) sendmmsg(r1, &(0x7f000000a080)=[{{0x0, 0x0, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) 22:31:07 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000000, 0x44050, r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(r1, &(0x7f0000000440)=""/207, 0xcf, 0x2020, &(0x7f0000000300)=@isdn={0x22, 0x7, 0x7, 0xfffffffffffffff8, 0x5}, 0x80) r3 = socket(0x1b, 0x5, 0x6) recvmsg$kcm(r3, &(0x7f0000001d40)={&(0x7f0000000900)=@nl=@proc, 0x80, &(0x7f0000001c00)=[{0x0}, {&(0x7f0000001a80)=""/89, 0x59}, {&(0x7f0000001b00)=""/253, 0xfd}], 0x3}, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0b") r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r4, 0x11, 0x1, &(0x7f0000000380)=0x4, 0x4) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140), 0x4) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000180)={0x0, r5, 0x6, 0x7f, 0x80000000, 0x8}) setsockopt$inet6_udp_int(r4, 0x11, 0x67, &(0x7f0000000100)=0x7, 0x2) socket$inet6(0xa, 0x6, 0x4) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/\x00\x00\xb6\x97<[0@\xac\xa4R\xce{f\xe9\xbb\x8fyI\x90q\xe5?\xa8\xbc\xc1\n\x15\xc7cC\xce-\xb7\xbb>:\xf7\x92\x83x\xb5o/\xa9Q\xbdi\x15c\xebxd\x19\xb4\xe2^\xb5\xe4b\xcc\xa9\xee\xeb4\xe7\xf5\xfc\xa6\xce(67G\x18E\xe2\xa1\xbaP]\xf6\xae\x98a\x06\xd1o!\xd8\xe7hU\x9a\x8d\xd3\xeaQ\xc1y+2!\x89\xc8\xfc\rWP\xd1\x9d\x8b\xbf\xb1\xe6I\xb9\x19\xfb\x02\xbb\xe2\x04\xee\x8b\xe4\xe8\xb7&GV\xfdd\x11\x9cO\xe2\xafykv\x06L:X\xfd\xefn\xd0Se\x89\xa2J-\xdb\xb8C\xb2\x8a\x9a\xae\xfcO\xf4\x85\x99\xb7gT\x9a\xbf\x05$!k\xd4\xb2\x1f^\xa5eB\xbd\x98\x99p\x14\xb1\xb7!{\x1de\xd8eP[\xc56\x95\x0eu\v,1?\xe3\x99\xe6g\xc9\x1d\a', 0x0, 0x0) readv(r6, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/87, 0x57}], 0x1) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r6, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e20, 0x6, @empty, 0x1}}, 0x6a, 0x800, 0x9, 0x800, 0x2}, &(0x7f0000000600)=0x98) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(r7, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0xffffffff, @mcast2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bcsf0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'vxcan1\x00', r8}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000740)={r8, 0x1, 0x6, @local}, 0x10) setsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780)=0x8000, 0x1) setsockopt$inet6_udp_int(r4, 0x11, 0x1, &(0x7f0000000080), 0x4) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r9 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r9, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$sock_linger(r9, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r9, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r9, &(0x7f0000000100), 0x5bd, 0x2400ffe0) r10 = socket$inet6_sctp(0xa, 0x1, 0x84) close(r10) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r10, 0x84, 0x6e, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x2, @empty, 0x5}, @in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e20, @rand_addr=0x7}, @in6={0xa, 0x4e22, 0x9, @mcast1, 0x9}], 0x68) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r10, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r9, 0x84, 0x5, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e23, 0x24, @remote, 0x5}}}, 0x84) socket$nl_xfrm(0x10, 0x3, 0x6) r11 = accept(r0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r11, 0x1, 0x19, &(0x7f0000000400)='erspan0\x00', 0x700e) sendmmsg(r1, &(0x7f000000a080)=[{{0x0, 0x0, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) 22:31:07 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000640)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "338000", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [0x2]}, @local, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, 0x0) 22:31:07 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000000, 0x44050, r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(r1, &(0x7f0000000440)=""/207, 0xcf, 0x2020, &(0x7f0000000300)=@isdn={0x22, 0x7, 0x7, 0xfffffffffffffff8, 0x5}, 0x80) r3 = socket(0x1b, 0x5, 0x6) recvmsg$kcm(r3, &(0x7f0000001d40)={&(0x7f0000000900)=@nl=@proc, 0x80, &(0x7f0000001c00)=[{0x0}, {&(0x7f0000001a80)=""/89, 0x59}, {&(0x7f0000001b00)=""/253, 0xfd}], 0x3}, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0b") r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r4, 0x11, 0x1, &(0x7f0000000380)=0x4, 0x4) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140), 0x4) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000180)={0x0, r5, 0x6, 0x7f, 0x80000000, 0x8}) setsockopt$inet6_udp_int(r4, 0x11, 0x67, &(0x7f0000000100)=0x7, 0x2) socket$inet6(0xa, 0x6, 0x4) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/\x00\x00\xb6\x97<[0@\xac\xa4R\xce{f\xe9\xbb\x8fyI\x90q\xe5?\xa8\xbc\xc1\n\x15\xc7cC\xce-\xb7\xbb>:\xf7\x92\x83x\xb5o/\xa9Q\xbdi\x15c\xebxd\x19\xb4\xe2^\xb5\xe4b\xcc\xa9\xee\xeb4\xe7\xf5\xfc\xa6\xce(67G\x18E\xe2\xa1\xbaP]\xf6\xae\x98a\x06\xd1o!\xd8\xe7hU\x9a\x8d\xd3\xeaQ\xc1y+2!\x89\xc8\xfc\rWP\xd1\x9d\x8b\xbf\xb1\xe6I\xb9\x19\xfb\x02\xbb\xe2\x04\xee\x8b\xe4\xe8\xb7&GV\xfdd\x11\x9cO\xe2\xafykv\x06L:X\xfd\xefn\xd0Se\x89\xa2J-\xdb\xb8C\xb2\x8a\x9a\xae\xfcO\xf4\x85\x99\xb7gT\x9a\xbf\x05$!k\xd4\xb2\x1f^\xa5eB\xbd\x98\x99p\x14\xb1\xb7!{\x1de\xd8eP[\xc56\x95\x0eu\v,1?\xe3\x99\xe6g\xc9\x1d\a', 0x0, 0x0) readv(r6, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/87, 0x57}], 0x1) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r6, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e20, 0x6, @empty, 0x1}}, 0x6a, 0x800, 0x9, 0x800, 0x2}, &(0x7f0000000600)=0x98) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(r7, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0xffffffff, @mcast2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bcsf0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'vxcan1\x00', r8}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000740)={r8, 0x1, 0x6, @local}, 0x10) setsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780)=0x8000, 0x1) setsockopt$inet6_udp_int(r4, 0x11, 0x1, &(0x7f0000000080), 0x4) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r9 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r9, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$sock_linger(r9, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r9, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r9, &(0x7f0000000100), 0x5bd, 0x2400ffe0) r10 = socket$inet6_sctp(0xa, 0x1, 0x84) close(r10) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r10, 0x84, 0x6e, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x2, @empty, 0x5}, @in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e20, @rand_addr=0x7}, @in6={0xa, 0x4e22, 0x9, @mcast1, 0x9}], 0x68) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r10, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r9, 0x84, 0x5, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e23, 0x24, @remote, 0x5}}}, 0x84) socket$nl_xfrm(0x10, 0x3, 0x6) r11 = accept(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r11, 0x1, 0x19, &(0x7f0000000400)='erspan0\x00', 0x700e) sendmmsg(r1, &(0x7f000000a080)=[{{0x0, 0x0, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) 22:31:07 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000640)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "338000", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [0x2]}, @local, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, 0x0) 22:31:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = socket$unix(0x1, 0x3, 0x0) bind$unix(r1, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x3, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r2, &(0x7f0000002dc0), 0x49a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup2(r0, r1) 22:31:07 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x20000000002, &(0x7f0000000240)=0x0) io_submit(r2, 0x1, &(0x7f00000001c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000080)="8c67dddc30286a98fd03", 0xa}]) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 22:31:08 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000000, 0x44050, r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(r1, &(0x7f0000000440)=""/207, 0xcf, 0x2020, &(0x7f0000000300)=@isdn={0x22, 0x7, 0x7, 0xfffffffffffffff8, 0x5}, 0x80) r3 = socket(0x1b, 0x5, 0x6) recvmsg$kcm(r3, &(0x7f0000001d40)={&(0x7f0000000900)=@nl=@proc, 0x80, &(0x7f0000001c00)=[{0x0}, {&(0x7f0000001a80)=""/89, 0x59}, {&(0x7f0000001b00)=""/253, 0xfd}], 0x3}, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0b") r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r4, 0x11, 0x1, &(0x7f0000000380)=0x4, 0x4) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140), 0x4) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000180)={0x0, r5, 0x6, 0x7f, 0x80000000, 0x8}) setsockopt$inet6_udp_int(r4, 0x11, 0x67, &(0x7f0000000100)=0x7, 0x2) socket$inet6(0xa, 0x6, 0x4) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/\x00\x00\xb6\x97<[0@\xac\xa4R\xce{f\xe9\xbb\x8fyI\x90q\xe5?\xa8\xbc\xc1\n\x15\xc7cC\xce-\xb7\xbb>:\xf7\x92\x83x\xb5o/\xa9Q\xbdi\x15c\xebxd\x19\xb4\xe2^\xb5\xe4b\xcc\xa9\xee\xeb4\xe7\xf5\xfc\xa6\xce(67G\x18E\xe2\xa1\xbaP]\xf6\xae\x98a\x06\xd1o!\xd8\xe7hU\x9a\x8d\xd3\xeaQ\xc1y+2!\x89\xc8\xfc\rWP\xd1\x9d\x8b\xbf\xb1\xe6I\xb9\x19\xfb\x02\xbb\xe2\x04\xee\x8b\xe4\xe8\xb7&GV\xfdd\x11\x9cO\xe2\xafykv\x06L:X\xfd\xefn\xd0Se\x89\xa2J-\xdb\xb8C\xb2\x8a\x9a\xae\xfcO\xf4\x85\x99\xb7gT\x9a\xbf\x05$!k\xd4\xb2\x1f^\xa5eB\xbd\x98\x99p\x14\xb1\xb7!{\x1de\xd8eP[\xc56\x95\x0eu\v,1?\xe3\x99\xe6g\xc9\x1d\a', 0x0, 0x0) readv(r6, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/87, 0x57}], 0x1) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r6, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e20, 0x6, @empty, 0x1}}, 0x6a, 0x800, 0x9, 0x800, 0x2}, &(0x7f0000000600)=0x98) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(r7, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0xffffffff, @mcast2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bcsf0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'vxcan1\x00', r8}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000740)={r8, 0x1, 0x6, @local}, 0x10) setsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780)=0x8000, 0x1) setsockopt$inet6_udp_int(r4, 0x11, 0x1, &(0x7f0000000080), 0x4) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r9 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r9, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$sock_linger(r9, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r9, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r9, &(0x7f0000000100), 0x5bd, 0x2400ffe0) r10 = socket$inet6_sctp(0xa, 0x1, 0x84) close(r10) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r10, 0x84, 0x6e, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x2, @empty, 0x5}, @in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e20, @rand_addr=0x7}, @in6={0xa, 0x4e22, 0x9, @mcast1, 0x9}], 0x68) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r10, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r9, 0x84, 0x5, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e23, 0x24, @remote, 0x5}}}, 0x84) socket$nl_xfrm(0x10, 0x3, 0x6) r11 = accept(r0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r11, 0x1, 0x19, &(0x7f0000000400)='erspan0\x00', 0x700e) sendmmsg(r1, &(0x7f000000a080)=[{{0x0, 0x0, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) 22:31:08 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000000, 0x44050, r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(r1, &(0x7f0000000440)=""/207, 0xcf, 0x2020, &(0x7f0000000300)=@isdn={0x22, 0x7, 0x7, 0xfffffffffffffff8, 0x5}, 0x80) r3 = socket(0x1b, 0x5, 0x6) recvmsg$kcm(r3, &(0x7f0000001d40)={&(0x7f0000000900)=@nl=@proc, 0x80, &(0x7f0000001c00)=[{0x0}, {&(0x7f0000001a80)=""/89, 0x59}, {&(0x7f0000001b00)=""/253, 0xfd}], 0x3}, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0b") r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r4, 0x11, 0x1, &(0x7f0000000380)=0x4, 0x4) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140), 0x4) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000180)={0x0, r5, 0x6, 0x7f, 0x80000000, 0x8}) setsockopt$inet6_udp_int(r4, 0x11, 0x67, &(0x7f0000000100)=0x7, 0x2) socket$inet6(0xa, 0x6, 0x4) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/\x00\x00\xb6\x97<[0@\xac\xa4R\xce{f\xe9\xbb\x8fyI\x90q\xe5?\xa8\xbc\xc1\n\x15\xc7cC\xce-\xb7\xbb>:\xf7\x92\x83x\xb5o/\xa9Q\xbdi\x15c\xebxd\x19\xb4\xe2^\xb5\xe4b\xcc\xa9\xee\xeb4\xe7\xf5\xfc\xa6\xce(67G\x18E\xe2\xa1\xbaP]\xf6\xae\x98a\x06\xd1o!\xd8\xe7hU\x9a\x8d\xd3\xeaQ\xc1y+2!\x89\xc8\xfc\rWP\xd1\x9d\x8b\xbf\xb1\xe6I\xb9\x19\xfb\x02\xbb\xe2\x04\xee\x8b\xe4\xe8\xb7&GV\xfdd\x11\x9cO\xe2\xafykv\x06L:X\xfd\xefn\xd0Se\x89\xa2J-\xdb\xb8C\xb2\x8a\x9a\xae\xfcO\xf4\x85\x99\xb7gT\x9a\xbf\x05$!k\xd4\xb2\x1f^\xa5eB\xbd\x98\x99p\x14\xb1\xb7!{\x1de\xd8eP[\xc56\x95\x0eu\v,1?\xe3\x99\xe6g\xc9\x1d\a', 0x0, 0x0) readv(r6, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/87, 0x57}], 0x1) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r6, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e20, 0x6, @empty, 0x1}}, 0x6a, 0x800, 0x9, 0x800, 0x2}, &(0x7f0000000600)=0x98) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(r7, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0xffffffff, @mcast2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bcsf0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'vxcan1\x00', r8}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000740)={r8, 0x1, 0x6, @local}, 0x10) setsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780)=0x8000, 0x1) setsockopt$inet6_udp_int(r4, 0x11, 0x1, &(0x7f0000000080), 0x4) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r9 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r9, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$sock_linger(r9, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r9, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r9, &(0x7f0000000100), 0x5bd, 0x2400ffe0) r10 = socket$inet6_sctp(0xa, 0x1, 0x84) close(r10) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r10, 0x84, 0x6e, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x2, @empty, 0x5}, @in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e20, @rand_addr=0x7}, @in6={0xa, 0x4e22, 0x9, @mcast1, 0x9}], 0x68) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r10, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r9, 0x84, 0x5, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e23, 0x24, @remote, 0x5}}}, 0x84) socket$nl_xfrm(0x10, 0x3, 0x6) r11 = accept(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r11, 0x1, 0x19, &(0x7f0000000400)='erspan0\x00', 0x700e) sendmmsg(r1, &(0x7f000000a080)=[{{0x0, 0x0, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) 22:31:08 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000640)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "338000", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [0x2]}, @local, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, 0x0) 22:31:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x0) memfd_create(0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RVERSION(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 22:31:08 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000640)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "338000", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [0x2]}, @local, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, 0x0) 22:31:08 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000000, 0x44050, r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(r1, &(0x7f0000000440)=""/207, 0xcf, 0x2020, &(0x7f0000000300)=@isdn={0x22, 0x7, 0x7, 0xfffffffffffffff8, 0x5}, 0x80) r3 = socket(0x1b, 0x5, 0x6) recvmsg$kcm(r3, &(0x7f0000001d40)={&(0x7f0000000900)=@nl=@proc, 0x80, &(0x7f0000001c00)=[{0x0}, {&(0x7f0000001a80)=""/89, 0x59}, {&(0x7f0000001b00)=""/253, 0xfd}], 0x3}, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0b") r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r4, 0x11, 0x1, &(0x7f0000000380)=0x4, 0x4) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140), 0x4) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000180)={0x0, r5, 0x6, 0x7f, 0x80000000, 0x8}) setsockopt$inet6_udp_int(r4, 0x11, 0x67, &(0x7f0000000100)=0x7, 0x2) socket$inet6(0xa, 0x6, 0x4) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/\x00\x00\xb6\x97<[0@\xac\xa4R\xce{f\xe9\xbb\x8fyI\x90q\xe5?\xa8\xbc\xc1\n\x15\xc7cC\xce-\xb7\xbb>:\xf7\x92\x83x\xb5o/\xa9Q\xbdi\x15c\xebxd\x19\xb4\xe2^\xb5\xe4b\xcc\xa9\xee\xeb4\xe7\xf5\xfc\xa6\xce(67G\x18E\xe2\xa1\xbaP]\xf6\xae\x98a\x06\xd1o!\xd8\xe7hU\x9a\x8d\xd3\xeaQ\xc1y+2!\x89\xc8\xfc\rWP\xd1\x9d\x8b\xbf\xb1\xe6I\xb9\x19\xfb\x02\xbb\xe2\x04\xee\x8b\xe4\xe8\xb7&GV\xfdd\x11\x9cO\xe2\xafykv\x06L:X\xfd\xefn\xd0Se\x89\xa2J-\xdb\xb8C\xb2\x8a\x9a\xae\xfcO\xf4\x85\x99\xb7gT\x9a\xbf\x05$!k\xd4\xb2\x1f^\xa5eB\xbd\x98\x99p\x14\xb1\xb7!{\x1de\xd8eP[\xc56\x95\x0eu\v,1?\xe3\x99\xe6g\xc9\x1d\a', 0x0, 0x0) readv(r6, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/87, 0x57}], 0x1) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r6, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e20, 0x6, @empty, 0x1}}, 0x6a, 0x800, 0x9, 0x800, 0x2}, &(0x7f0000000600)=0x98) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(r7, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0xffffffff, @mcast2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bcsf0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'vxcan1\x00', r8}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000740)={r8, 0x1, 0x6, @local}, 0x10) setsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780)=0x8000, 0x1) setsockopt$inet6_udp_int(r4, 0x11, 0x1, &(0x7f0000000080), 0x4) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r9 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r9, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$sock_linger(r9, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r9, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r9, &(0x7f0000000100), 0x5bd, 0x2400ffe0) r10 = socket$inet6_sctp(0xa, 0x1, 0x84) close(r10) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r10, 0x84, 0x6e, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x2, @empty, 0x5}, @in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e20, @rand_addr=0x7}, @in6={0xa, 0x4e22, 0x9, @mcast1, 0x9}], 0x68) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r10, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r9, 0x84, 0x5, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e23, 0x24, @remote, 0x5}}}, 0x84) socket$nl_xfrm(0x10, 0x3, 0x6) r11 = accept(r0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r11, 0x1, 0x19, &(0x7f0000000400)='erspan0\x00', 0x700e) sendmmsg(r1, &(0x7f000000a080)=[{{0x0, 0x0, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) 22:31:08 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000640)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "338000", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [0x2]}, @local, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, 0x0) [ 200.702679][ T9145] net_ratelimit: 4 callbacks suppressed [ 200.702701][ T9145] dccp_check_seqno: Step 6 failed for RESET packet, (LSWL(119178255014386) <= P.seqno(0) <= S.SWH(119178255014460)) and (P.ackno exists or LAWL(61108830204334) <= P.ackno(61108830204335) <= S.AWH(61108830204335), sending SYNC... 22:31:08 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000640)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "338000", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [0x2]}, @local, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, 0x0) 22:31:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x0) memfd_create(0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RVERSION(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 22:31:08 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000640)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "338000", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [0x2]}, @local, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, 0x0) [ 201.076164][ T9193] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 201.095936][ T9193] ================================================================== [ 201.104217][ T9193] BUG: KASAN: use-after-free in nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 201.112551][ T9193] Read of size 1 at addr ffff88809cd4d704 by task syz-executor.0/9193 [ 201.120686][ T9193] [ 201.120714][ T9193] CPU: 1 PID: 9193 Comm: syz-executor.0 Not tainted 5.4.0-rc4-next-20191025 #0 [ 201.120731][ T9193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.120737][ T9193] Call Trace: [ 201.132059][ T9193] dump_stack+0x172/0x1f0 [ 201.132077][ T9193] ? nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 201.132099][ T9193] print_address_description.constprop.0.cold+0xd4/0x30b [ 201.132112][ T9193] ? nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 201.132126][ T9193] ? nf_ct_deliver_cached_events+0x5c3/0x6d0 22:31:08 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xfffffee5}}, 0x0) socket$can_raw(0x1d, 0x3, 0x1) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000002fc0)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") sendmmsg(r0, &(0x7f0000000180), 0x4000144, 0x0) [ 201.132140][ T9193] __kasan_report.cold+0x1b/0x41 [ 201.132155][ T9193] ? nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 201.132170][ T9193] kasan_report+0x12/0x20 [ 201.132186][ T9193] __asan_report_load1_noabort+0x14/0x20 [ 201.132200][ T9193] nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 201.132215][ T9193] ? nf_ct_expect_unregister_notifier+0x140/0x140 [ 201.132237][ T9193] ? ipv6_find_tlv+0x280/0x280 [ 201.145550][ T9193] ? nf_nat_inet_fn+0x211/0x8b0 [ 201.145571][ T9193] nf_confirm+0x3d8/0x4d0 [ 201.145591][ T9193] ipv6_confirm+0x1e4/0x3a0 [ 201.145608][ T9193] ? ipv4_confirm+0x240/0x240 [ 201.145625][ T9193] ? ip6table_mangle_hook+0xbf/0x6c0 [ 201.145647][ T9193] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 201.145673][ T9193] nf_hook_slow+0xbc/0x1e0 [ 201.217669][ T9141] dccp_close: ABORT with 1061 bytes unread [ 201.221819][ T9193] ip6_input+0x209/0x3f0 [ 201.221836][ T9193] ? ip6_input_finish+0x170/0x170 [ 201.256823][ T9193] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 201.256842][ T9193] ? ip6_protocol_deliver_rcu+0x1670/0x1670 [ 201.268082][ T9193] ? rcu_read_lock_held_common+0x130/0x130 [ 201.268107][ T9193] ip6_sublist_rcv_finish+0x9b/0x2d0 [ 201.268125][ T9193] ip6_sublist_rcv+0x513/0x930 [ 201.268145][ T9193] ? ip6_rcv_finish+0x310/0x310 [ 201.268166][ T9193] ? ip6_rcv_finish_core.isra.0+0x590/0x590 [ 201.268193][ T9193] ipv6_list_rcv+0x373/0x4b0 [ 201.305175][ T9193] ? ipv6_rcv+0x420/0x420 [ 201.309508][ T9193] ? ipv6_rcv+0x420/0x420 [ 201.313891][ T9193] __netif_receive_skb_list_core+0x5fc/0x9d0 [ 201.319877][ T9193] ? ktime_get_with_offset+0x135/0x360 [ 201.325320][ T9193] ? ktime_get_with_offset+0x135/0x360 [ 201.330768][ T9193] ? process_backlog+0x750/0x750 [ 201.335689][ T9193] ? lock_acquire+0x190/0x410 [ 201.340348][ T9193] ? __kasan_check_read+0x11/0x20 [ 201.345370][ T9193] netif_receive_skb_list_internal+0x7eb/0xe50 [ 201.351519][ T9193] ? __netif_receive_skb_list_core+0x9d0/0x9d0 [ 201.357658][ T9193] ? ipv6_gro_receive+0x96f/0x14f0 [ 201.362776][ T9193] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 201.369060][ T9193] ? eth_type_trans+0x3a5/0x760 [ 201.373898][ T9193] gro_normal_list.part.0+0x1e/0xb0 [ 201.379086][ T9193] gro_normal_one+0x184/0x1d0 [ 201.383744][ T9193] napi_gro_frags+0x915/0xd00 [ 201.388407][ T9193] tun_get_user+0x2e8e/0x3f80 [ 201.393078][ T9193] ? __kasan_check_read+0x11/0x20 [ 201.398098][ T9193] ? tun_build_skb.isra.0+0x1380/0x1380 [ 201.403632][ T9193] ? rcu_read_lock_held+0x9c/0xb0 [ 201.408637][ T9193] ? __kasan_check_read+0x11/0x20 [ 201.413794][ T9193] tun_chr_write_iter+0xbd/0x156 [ 201.418729][ T9193] do_iter_readv_writev+0x5f8/0x8f0 [ 201.423909][ T9193] ? no_seek_end_llseek_size+0x70/0x70 [ 201.429354][ T9193] ? apparmor_file_permission+0x25/0x30 [ 201.434939][ T9193] ? rw_verify_area+0x126/0x360 [ 201.439779][ T9193] do_iter_write+0x184/0x610 [ 201.444363][ T9193] ? dup_iter+0x260/0x260 [ 201.448685][ T9193] vfs_writev+0x1b3/0x2f0 [ 201.453009][ T9193] ? vfs_iter_write+0xb0/0xb0 [ 201.457682][ T9193] ? __kasan_check_read+0x11/0x20 [ 201.462698][ T9193] ? ksys_dup3+0x3e0/0x3e0 [ 201.467099][ T9193] ? __kasan_check_read+0x11/0x20 [ 201.472128][ T9193] ? __fget_light+0x1a9/0x230 [ 201.476795][ T9193] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 201.483193][ T9193] do_writev+0x15b/0x330 [ 201.487429][ T9193] ? vfs_writev+0x2f0/0x2f0 [ 201.491921][ T9193] ? do_syscall_64+0x26/0x760 [ 201.496589][ T9193] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 201.502655][ T9193] ? do_syscall_64+0x26/0x760 [ 201.507330][ T9193] __x64_sys_writev+0x75/0xb0 [ 201.512008][ T9193] do_syscall_64+0xfa/0x760 [ 201.516521][ T9193] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 201.522423][ T9193] RIP: 0033:0x459df1 [ 201.526308][ T9193] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 b7 fb ff c3 48 83 ec 08 e8 fa 2c 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 43 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 201.545893][ T9193] RSP: 002b:00007f30c81d7ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 201.554295][ T9193] RAX: ffffffffffffffda RBX: 000000000000003e RCX: 0000000000459df1 [ 201.562263][ T9193] RDX: 0000000000000001 RSI: 00007f30c81d7c00 RDI: 00000000000000f0 [ 201.570225][ T9193] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 201.578182][ T9193] R10: 0000000000000000 R11: 0000000000000293 R12: 00007f30c81d86d4 [ 201.586150][ T9193] R13: 00000000004c9352 R14: 00000000004e0a60 R15: 00000000ffffffff [ 201.594125][ T9193] [ 201.596450][ T9193] Allocated by task 9193: [ 201.600770][ T9193] save_stack+0x23/0x90 [ 201.604917][ T9193] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 201.610532][ T9193] kasan_krealloc+0x84/0xc0 [ 201.615029][ T9193] krealloc+0xa6/0xd0 [ 201.619014][ T9193] nf_ct_ext_add+0x2c7/0x630 [ 201.623608][ T9193] init_conntrack.isra.0+0x5ed/0x11a0 [ 201.628984][ T9193] nf_conntrack_in+0xd94/0x1460 [ 201.633926][ T9193] ipv6_conntrack_in+0x1e/0x30 [ 201.638773][ T9193] nf_hook_slow+0xbc/0x1e0 [ 201.643170][ T9193] nf_hook_slow_list+0x1d9/0x480 [ 201.648101][ T9193] ip6_sublist_rcv+0x677/0x930 [ 201.652926][ T9193] ipv6_list_rcv+0x373/0x4b0 [ 201.657498][ T9193] __netif_receive_skb_list_core+0x5fc/0x9d0 [ 201.663505][ T9193] netif_receive_skb_list_internal+0x7eb/0xe50 [ 201.669639][ T9193] gro_normal_list.part.0+0x1e/0xb0 [ 201.674875][ T9193] gro_normal_one+0x184/0x1d0 [ 201.679548][ T9193] napi_gro_frags+0x915/0xd00 [ 201.684212][ T9193] tun_get_user+0x2e8e/0x3f80 [ 201.688869][ T9193] tun_chr_write_iter+0xbd/0x156 [ 201.693952][ T9193] do_iter_readv_writev+0x5f8/0x8f0 [ 201.699152][ T9193] do_iter_write+0x184/0x610 [ 201.703725][ T9193] vfs_writev+0x1b3/0x2f0 [ 201.708037][ T9193] do_writev+0x15b/0x330 [ 201.712263][ T9193] __x64_sys_writev+0x75/0xb0 [ 201.716938][ T9193] do_syscall_64+0xfa/0x760 [ 201.721431][ T9193] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 201.727300][ T9193] [ 201.729612][ T9193] Freed by task 9193: [ 201.733590][ T9193] save_stack+0x23/0x90 [ 201.737755][ T9193] __kasan_slab_free+0x102/0x150 [ 201.746787][ T9193] kasan_slab_free+0xe/0x10 [ 201.751270][ T9193] kfree+0x10a/0x2c0 [ 201.755145][ T9193] nf_ct_ext_destroy+0x2ab/0x2e0 [ 201.760068][ T9193] nf_conntrack_free+0x8f/0xe0 [ 201.764828][ T9193] destroy_conntrack+0x1a2/0x270 [ 201.769759][ T9193] nf_conntrack_destroy+0xed/0x230 [ 201.774849][ T9193] __nf_conntrack_confirm+0x21ca/0x2830 [ 201.780379][ T9193] nf_confirm+0x3e7/0x4d0 [ 201.784692][ T9193] ipv6_confirm+0x1e4/0x3a0 [ 201.789202][ T9193] nf_hook_slow+0xbc/0x1e0 [ 201.793617][ T9193] ip6_input+0x209/0x3f0 [ 201.797863][ T9193] ip6_sublist_rcv_finish+0x9b/0x2d0 [ 201.803127][ T9193] ip6_sublist_rcv+0x513/0x930 [ 201.807881][ T9193] ipv6_list_rcv+0x373/0x4b0 [ 201.812450][ T9193] __netif_receive_skb_list_core+0x5fc/0x9d0 [ 201.818413][ T9193] netif_receive_skb_list_internal+0x7eb/0xe50 [ 201.824546][ T9193] gro_normal_list.part.0+0x1e/0xb0 [ 201.829736][ T9193] gro_normal_one+0x184/0x1d0 [ 201.834415][ T9193] napi_gro_frags+0x915/0xd00 [ 201.839073][ T9193] tun_get_user+0x2e8e/0x3f80 [ 201.843733][ T9193] tun_chr_write_iter+0xbd/0x156 [ 201.848663][ T9193] do_iter_readv_writev+0x5f8/0x8f0 [ 201.853850][ T9193] do_iter_write+0x184/0x610 [ 201.858429][ T9193] vfs_writev+0x1b3/0x2f0 [ 201.862758][ T9193] do_writev+0x15b/0x330 [ 201.866981][ T9193] __x64_sys_writev+0x75/0xb0 [ 201.871639][ T9193] do_syscall_64+0xfa/0x760 [ 201.876127][ T9193] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 201.882014][ T9193] [ 201.884325][ T9193] The buggy address belongs to the object at ffff88809cd4d700 [ 201.884325][ T9193] which belongs to the cache kmalloc-128 of size 128 [ 201.898363][ T9193] The buggy address is located 4 bytes inside of [ 201.898363][ T9193] 128-byte region [ffff88809cd4d700, ffff88809cd4d780) [ 201.911449][ T9193] The buggy address belongs to the page: [ 201.917063][ T9193] page:ffffea0002735340 refcount:1 mapcount:0 mapping:ffff8880aa400700 index:0x0 [ 201.926323][ T9193] flags: 0x1fffc0000000200(slab) [ 201.931260][ T9193] raw: 01fffc0000000200 ffffea000244c048 ffffea0002681a48 ffff8880aa400700 [ 201.939846][ T9193] raw: 0000000000000000 ffff88809cd4d000 0000000100000010 0000000000000000 [ 201.948475][ T9193] page dumped because: kasan: bad access detected [ 201.954867][ T9193] [ 201.957177][ T9193] Memory state around the buggy address: [ 201.962790][ T9193] ffff88809cd4d600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 201.970836][ T9193] ffff88809cd4d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 201.978879][ T9193] >ffff88809cd4d700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 201.986990][ T9193] ^ [ 201.991041][ T9193] ffff88809cd4d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 201.999107][ T9193] ffff88809cd4d800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 202.007171][ T9193] ================================================================== [ 202.015210][ T9193] Disabling lock debugging due to kernel taint [ 202.021405][ T9193] Kernel panic - not syncing: panic_on_warn set ... [ 202.028009][ T9193] CPU: 1 PID: 9193 Comm: syz-executor.0 Tainted: G B 5.4.0-rc4-next-20191025 #0 [ 202.038319][ T9193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.048370][ T9193] Call Trace: [ 202.051664][ T9193] dump_stack+0x172/0x1f0 [ 202.055983][ T9193] panic+0x2e3/0x75c [ 202.059858][ T9193] ? add_taint.cold+0x16/0x16 [ 202.064526][ T9193] ? trace_hardirqs_on+0x5e/0x240 [ 202.069530][ T9193] ? trace_hardirqs_on+0x5e/0x240 [ 202.074557][ T9193] ? nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 202.080520][ T9193] end_report+0x47/0x4f [ 202.084654][ T9193] ? nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 202.090615][ T9193] __kasan_report.cold+0xe/0x41 [ 202.095445][ T9193] ? nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 202.101408][ T9193] kasan_report+0x12/0x20 [ 202.105721][ T9193] __asan_report_load1_noabort+0x14/0x20 [ 202.111333][ T9193] nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 202.117123][ T9193] ? nf_ct_expect_unregister_notifier+0x140/0x140 [ 202.123518][ T9193] ? ipv6_find_tlv+0x280/0x280 [ 202.128261][ T9193] ? nf_nat_inet_fn+0x211/0x8b0 [ 202.133094][ T9193] nf_confirm+0x3d8/0x4d0 [ 202.137413][ T9193] ipv6_confirm+0x1e4/0x3a0 [ 202.141900][ T9193] ? ipv4_confirm+0x240/0x240 [ 202.146558][ T9193] ? ip6table_mangle_hook+0xbf/0x6c0 [ 202.151834][ T9193] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 202.157972][ T9193] nf_hook_slow+0xbc/0x1e0 [ 202.162373][ T9193] ip6_input+0x209/0x3f0 [ 202.166613][ T9193] ? ip6_input_finish+0x170/0x170 [ 202.171622][ T9193] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 202.177769][ T9193] ? ip6_protocol_deliver_rcu+0x1670/0x1670 [ 202.183648][ T9193] ? rcu_read_lock_held_common+0x130/0x130 [ 202.189436][ T9193] ip6_sublist_rcv_finish+0x9b/0x2d0 [ 202.194706][ T9193] ip6_sublist_rcv+0x513/0x930 [ 202.199452][ T9193] ? ip6_rcv_finish+0x310/0x310 [ 202.204294][ T9193] ? ip6_rcv_finish_core.isra.0+0x590/0x590 [ 202.210168][ T9193] ipv6_list_rcv+0x373/0x4b0 [ 202.214740][ T9193] ? ipv6_rcv+0x420/0x420 [ 202.219051][ T9193] ? ipv6_rcv+0x420/0x420 [ 202.223365][ T9193] __netif_receive_skb_list_core+0x5fc/0x9d0 [ 202.229330][ T9193] ? ktime_get_with_offset+0x135/0x360 [ 202.234784][ T9193] ? ktime_get_with_offset+0x135/0x360 [ 202.240221][ T9193] ? process_backlog+0x750/0x750 [ 202.245138][ T9193] ? lock_acquire+0x190/0x410 [ 202.249808][ T9193] ? __kasan_check_read+0x11/0x20 [ 202.254812][ T9193] netif_receive_skb_list_internal+0x7eb/0xe50 [ 202.260951][ T9193] ? __netif_receive_skb_list_core+0x9d0/0x9d0 [ 202.267087][ T9193] ? ipv6_gro_receive+0x96f/0x14f0 [ 202.272184][ T9193] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 202.278404][ T9193] ? eth_type_trans+0x3a5/0x760 [ 202.283236][ T9193] gro_normal_list.part.0+0x1e/0xb0 [ 202.288415][ T9193] gro_normal_one+0x184/0x1d0 [ 202.293083][ T9193] napi_gro_frags+0x915/0xd00 [ 202.297744][ T9193] tun_get_user+0x2e8e/0x3f80 [ 202.302402][ T9193] ? __kasan_check_read+0x11/0x20 [ 202.307414][ T9193] ? tun_build_skb.isra.0+0x1380/0x1380 [ 202.312947][ T9193] ? rcu_read_lock_held+0x9c/0xb0 [ 202.317953][ T9193] ? __kasan_check_read+0x11/0x20 [ 202.322961][ T9193] tun_chr_write_iter+0xbd/0x156 [ 202.327892][ T9193] do_iter_readv_writev+0x5f8/0x8f0 [ 202.333073][ T9193] ? no_seek_end_llseek_size+0x70/0x70 [ 202.338514][ T9193] ? apparmor_file_permission+0x25/0x30 [ 202.344040][ T9193] ? rw_verify_area+0x126/0x360 [ 202.348871][ T9193] do_iter_write+0x184/0x610 [ 202.353442][ T9193] ? dup_iter+0x260/0x260 [ 202.357755][ T9193] vfs_writev+0x1b3/0x2f0 [ 202.362068][ T9193] ? vfs_iter_write+0xb0/0xb0 [ 202.366734][ T9193] ? __kasan_check_read+0x11/0x20 [ 202.371756][ T9193] ? ksys_dup3+0x3e0/0x3e0 [ 202.376165][ T9193] ? __kasan_check_read+0x11/0x20 [ 202.381171][ T9193] ? __fget_light+0x1a9/0x230 [ 202.385829][ T9193] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 202.392053][ T9193] do_writev+0x15b/0x330 [ 202.396293][ T9193] ? vfs_writev+0x2f0/0x2f0 [ 202.400777][ T9193] ? do_syscall_64+0x26/0x760 [ 202.405435][ T9193] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 202.411482][ T9193] ? do_syscall_64+0x26/0x760 [ 202.416142][ T9193] __x64_sys_writev+0x75/0xb0 [ 202.420797][ T9193] do_syscall_64+0xfa/0x760 [ 202.425468][ T9193] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 202.431341][ T9193] RIP: 0033:0x459df1 [ 202.435220][ T9193] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 b7 fb ff c3 48 83 ec 08 e8 fa 2c 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 43 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 202.454811][ T9193] RSP: 002b:00007f30c81d7ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 202.463208][ T9193] RAX: ffffffffffffffda RBX: 000000000000003e RCX: 0000000000459df1 [ 202.471159][ T9193] RDX: 0000000000000001 RSI: 00007f30c81d7c00 RDI: 00000000000000f0 [ 202.479117][ T9193] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 202.487069][ T9193] R10: 0000000000000000 R11: 0000000000000293 R12: 00007f30c81d86d4 [ 202.495020][ T9193] R13: 00000000004c9352 R14: 00000000004e0a60 R15: 00000000ffffffff [ 202.504347][ T9193] Kernel Offset: disabled [ 202.508672][ T9193] Rebooting in 86400 seconds..