[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 52.329483][ T27] audit: type=1800 audit(1583625064.921:25): pid=8585 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 52.349266][ T27] audit: type=1800 audit(1583625064.921:26): pid=8585 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 52.409920][ T27] audit: type=1800 audit(1583625064.921:27): pid=8585 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.203' (ECDSA) to the list of known hosts. 2020/03/07 23:51:15 fuzzer started 2020/03/07 23:51:17 dialing manager at 10.128.0.26:33777 2020/03/07 23:51:17 syscalls: 2999 2020/03/07 23:51:17 code coverage: enabled 2020/03/07 23:51:17 comparison tracing: enabled 2020/03/07 23:51:17 extra coverage: enabled 2020/03/07 23:51:17 setuid sandbox: enabled 2020/03/07 23:51:17 namespace sandbox: enabled 2020/03/07 23:51:17 Android sandbox: /sys/fs/selinux/policy does not exist 2020/03/07 23:51:17 fault injection: enabled 2020/03/07 23:51:17 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/03/07 23:51:17 net packet injection: enabled 2020/03/07 23:51:17 net device setup: enabled 2020/03/07 23:51:17 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/03/07 23:51:17 devlink PCI setup: PCI device 0000:00:10.0 is not available 23:53:29 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x10, &(0x7f00000000c0), 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000000600)=[{0x0}, {0x0}, {&(0x7f0000000440)}, {0x0}], 0x4}, 0x0) 23:53:29 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00008feff0)={0x0, 0x193}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000100)={0x4, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f00000000c0), 0x4000676, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) syzkaller login: [ 197.211263][ T8753] IPVS: ftp: loaded support on port[0] = 21 [ 197.349112][ T8753] chnl_net:caif_netlink_parms(): no params data found [ 197.396565][ T8756] IPVS: ftp: loaded support on port[0] = 21 [ 197.460396][ T8753] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.467620][ T8753] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.476806][ T8753] device bridge_slave_0 entered promiscuous mode [ 197.488158][ T8753] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.496188][ T8753] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.504162][ T8753] device bridge_slave_1 entered promiscuous mode 23:53:30 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.sched_load_balance\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x100000700) [ 197.531605][ T8753] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 197.542749][ T8753] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 197.577475][ T8753] team0: Port device team_slave_0 added [ 197.597155][ T8753] team0: Port device team_slave_1 added [ 197.651217][ T8753] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 197.658195][ T8753] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 197.684986][ T8753] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 197.705632][ T8753] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 197.712974][ T8753] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 197.742139][ T8753] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 197.759510][ T8756] chnl_net:caif_netlink_parms(): no params data found [ 197.797665][ T8762] IPVS: ftp: loaded support on port[0] = 21 23:53:30 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0x0, 0x1000, 0x0, 0x100}}) [ 197.853465][ T8753] device hsr_slave_0 entered promiscuous mode [ 197.890578][ T8753] device hsr_slave_1 entered promiscuous mode [ 198.062176][ T8766] IPVS: ftp: loaded support on port[0] = 21 [ 198.085538][ T8756] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.093265][ T8756] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.112912][ T8756] device bridge_slave_0 entered promiscuous mode [ 198.140096][ T8756] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.147638][ T8756] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.157315][ T8756] device bridge_slave_1 entered promiscuous mode 23:53:30 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x70e, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000004c0)="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", 0x188}], 0x1, 0x0) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x1, 0x10, r0, 0x0) r1 = msgget$private(0x0, 0x480) msgsnd(r1, &(0x7f0000000180)={0x2, "5fe62fb1d423e7a6cd25d44ea98d51c24ffcd0e90f3f2e982db61d74f533240bced0e4e511e5e3afa4afa2820c38f6f42746b334e86d28a05af982e6349dc9a83948d8cd332058ded18559d9ea2dd9a98763f009fa98b1ac11d167bc1b702fcfd456f0d30a3b2f8656882c70a6"}, 0x75, 0x0) [ 198.225144][ T8756] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 198.255144][ T8756] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 198.322034][ T8756] team0: Port device team_slave_0 added [ 198.337552][ T8753] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 198.393153][ T8753] netdevsim netdevsim0 netdevsim1: renamed from eth1 23:53:31 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000ac0)=@sack_info={0x0, 0x0, 0x32}, 0xc) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) [ 198.443086][ T8756] team0: Port device team_slave_1 added [ 198.448784][ T8753] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 198.528466][ T8770] IPVS: ftp: loaded support on port[0] = 21 [ 198.554877][ T8762] chnl_net:caif_netlink_parms(): no params data found [ 198.565670][ T8753] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 198.665822][ T8766] chnl_net:caif_netlink_parms(): no params data found [ 198.685642][ T8756] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 198.692908][ T8756] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 198.720866][ T8756] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 198.734180][ T8756] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 198.741260][ T8756] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 198.767576][ T8756] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 198.796345][ T8772] IPVS: ftp: loaded support on port[0] = 21 [ 198.873975][ T8756] device hsr_slave_0 entered promiscuous mode [ 198.930642][ T8756] device hsr_slave_1 entered promiscuous mode [ 198.980461][ T8756] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 198.988290][ T8756] Cannot create hsr debugfs directory [ 199.066998][ T8766] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.074316][ T8766] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.082352][ T8766] device bridge_slave_0 entered promiscuous mode [ 199.091257][ T8766] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.098409][ T8766] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.106518][ T8766] device bridge_slave_1 entered promiscuous mode [ 199.122060][ T8762] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.129205][ T8762] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.137327][ T8762] device bridge_slave_0 entered promiscuous mode [ 199.147971][ T8762] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.155094][ T8762] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.163054][ T8762] device bridge_slave_1 entered promiscuous mode [ 199.219024][ T8762] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 199.231072][ T8766] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 199.254993][ T8762] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 199.271320][ T8766] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 199.322222][ T8762] team0: Port device team_slave_0 added [ 199.339898][ T8770] chnl_net:caif_netlink_parms(): no params data found [ 199.350482][ T8766] team0: Port device team_slave_0 added [ 199.359300][ T8766] team0: Port device team_slave_1 added [ 199.366077][ T8762] team0: Port device team_slave_1 added [ 199.386647][ T8762] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 199.394230][ T8762] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 199.420418][ T8762] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 199.445571][ T8772] chnl_net:caif_netlink_parms(): no params data found [ 199.458059][ T8766] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 199.465917][ T8766] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 199.492210][ T8766] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 199.505987][ T8762] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 199.513413][ T8762] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 199.539403][ T8762] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 199.566692][ T8766] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 199.573847][ T8766] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 199.600425][ T8766] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 199.663081][ T8762] device hsr_slave_0 entered promiscuous mode [ 199.700659][ T8762] device hsr_slave_1 entered promiscuous mode [ 199.750383][ T8762] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 199.757948][ T8762] Cannot create hsr debugfs directory [ 199.903943][ T8766] device hsr_slave_0 entered promiscuous mode [ 199.950711][ T8766] device hsr_slave_1 entered promiscuous mode [ 200.020353][ T8766] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 200.027999][ T8766] Cannot create hsr debugfs directory [ 200.048712][ T8770] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.059102][ T8770] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.067205][ T8770] device bridge_slave_0 entered promiscuous mode [ 200.080098][ T8770] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.087526][ T8770] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.096006][ T8770] device bridge_slave_1 entered promiscuous mode [ 200.127329][ T8770] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 200.139214][ T8772] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.146885][ T8772] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.154691][ T8772] device bridge_slave_0 entered promiscuous mode [ 200.167118][ T8756] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 200.223988][ T8770] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 200.243238][ T8772] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.250418][ T8772] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.258144][ T8772] device bridge_slave_1 entered promiscuous mode [ 200.269122][ T8756] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 200.325835][ T8756] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 200.384336][ T8756] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 200.463058][ T8770] team0: Port device team_slave_0 added [ 200.473372][ T8770] team0: Port device team_slave_1 added [ 200.491387][ T8772] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 200.523827][ T8772] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 200.539443][ T8770] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 200.546636][ T8770] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 200.573669][ T8770] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 200.601889][ T8770] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 200.608947][ T8770] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 200.635707][ T8770] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 200.662867][ T8772] team0: Port device team_slave_0 added [ 200.685263][ T8772] team0: Port device team_slave_1 added [ 200.695687][ T8753] 8021q: adding VLAN 0 to HW filter on device bond0 [ 200.742109][ T8770] device hsr_slave_0 entered promiscuous mode [ 200.780825][ T8770] device hsr_slave_1 entered promiscuous mode [ 200.830377][ T8770] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 200.838138][ T8770] Cannot create hsr debugfs directory [ 200.867214][ T8772] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 200.874480][ T8772] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 200.901069][ T8772] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 200.914661][ T8772] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 200.921725][ T8772] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 200.948469][ T8772] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 201.025020][ T8762] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 201.095619][ T8762] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 201.156169][ T8762] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 201.216624][ T8762] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 201.313317][ T8772] device hsr_slave_0 entered promiscuous mode [ 201.351199][ T8772] device hsr_slave_1 entered promiscuous mode [ 201.400349][ T8772] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 201.407915][ T8772] Cannot create hsr debugfs directory [ 201.415503][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 201.424269][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 201.451081][ T8753] 8021q: adding VLAN 0 to HW filter on device team0 [ 201.504240][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 201.513321][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 201.522406][ T2961] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.529589][ T2961] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.537606][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 201.547077][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 201.555657][ T2961] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.562741][ T2961] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.570577][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 201.625681][ T8766] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 201.653668][ T8766] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 201.712997][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 201.721909][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 201.758587][ T8766] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 201.825659][ T8766] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 201.882593][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 201.892895][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 201.933084][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 201.942261][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 201.951153][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 201.959421][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 201.969340][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 201.985478][ T8753] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 202.001930][ T8770] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 202.032249][ T8770] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 202.072344][ T8770] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 202.126393][ T8770] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 202.174241][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 202.182637][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 202.206185][ T8756] 8021q: adding VLAN 0 to HW filter on device bond0 [ 202.222824][ T8762] 8021q: adding VLAN 0 to HW filter on device bond0 [ 202.256279][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 202.264345][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 202.275200][ T8772] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 202.332122][ T8772] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 202.392701][ T8772] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 202.433540][ T8772] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 202.505400][ T8753] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 202.513911][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 202.522396][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 202.533116][ T8756] 8021q: adding VLAN 0 to HW filter on device team0 [ 202.569271][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 202.577814][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 202.588964][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 202.597862][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 202.606463][ T2961] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.613584][ T2961] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.623248][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 202.631977][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 202.640408][ T2961] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.647451][ T2961] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.655749][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 202.671791][ T8762] 8021q: adding VLAN 0 to HW filter on device team0 [ 202.700556][ T2967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 202.709031][ T2967] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 202.718092][ T2967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 202.727818][ T2967] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 202.737177][ T2967] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 202.775126][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 202.786625][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 202.797861][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 202.807186][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 202.817719][ T2968] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.824804][ T2968] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.832881][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 202.841499][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 202.849967][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 202.858341][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 202.866777][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 202.875461][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 202.883922][ T2968] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.891010][ T2968] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.898469][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 202.908453][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 202.916358][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 202.924773][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 202.969332][ T8756] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 202.977927][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 202.987214][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 202.995869][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 203.004276][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 203.012842][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 203.021444][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 203.029444][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 203.037781][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 203.046078][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 203.054441][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 203.062379][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 203.070053][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 203.098025][ T8762] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 203.109743][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 203.129497][ T8753] device veth0_vlan entered promiscuous mode [ 203.141732][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 203.150033][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 203.168059][ T8770] 8021q: adding VLAN 0 to HW filter on device bond0 [ 203.180437][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 203.187983][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 203.205056][ T8753] device veth1_vlan entered promiscuous mode [ 203.243555][ T8756] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 203.256909][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 203.265544][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 203.279785][ T8766] 8021q: adding VLAN 0 to HW filter on device bond0 [ 203.297370][ T8762] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 203.317365][ T8753] device veth0_macvtap entered promiscuous mode [ 203.333483][ T8753] device veth1_macvtap entered promiscuous mode [ 203.346313][ T8770] 8021q: adding VLAN 0 to HW filter on device team0 [ 203.356698][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 203.365272][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 203.374210][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 203.382289][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 203.390027][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 203.411476][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 203.419489][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 203.428508][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 203.437079][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 203.446782][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 203.464441][ T8772] 8021q: adding VLAN 0 to HW filter on device bond0 [ 203.488090][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 203.497242][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 203.506577][ T3215] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.513802][ T3215] bridge0: port 1(bridge_slave_0) entered forwarding state [ 203.533721][ T8753] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 203.549391][ T2967] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 203.558318][ T2967] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 203.567377][ T2967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 203.576965][ T2967] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 203.586698][ T2967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 203.595400][ T2967] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 203.603630][ T2967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 203.612211][ T2967] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 203.621495][ T2967] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 203.629792][ T2967] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.637016][ T2967] bridge0: port 2(bridge_slave_1) entered forwarding state [ 203.647677][ T2967] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 203.655542][ T2967] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 203.664157][ T2967] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 203.672468][ T2967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 203.687279][ T8753] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 203.702862][ T8756] device veth0_vlan entered promiscuous mode [ 203.711763][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 203.719847][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 203.728010][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 203.736911][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 203.745601][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 203.754389][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 203.763296][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 203.772789][ T8762] device veth0_vlan entered promiscuous mode [ 203.782756][ T8766] 8021q: adding VLAN 0 to HW filter on device team0 [ 203.796704][ T8772] 8021q: adding VLAN 0 to HW filter on device team0 [ 203.866452][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 203.875022][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 203.883835][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 203.894617][ T2999] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.901771][ T2999] bridge0: port 1(bridge_slave_0) entered forwarding state [ 203.910102][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 203.919180][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 203.927673][ T2999] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.934772][ T2999] bridge0: port 2(bridge_slave_1) entered forwarding state [ 203.945479][ T8756] device veth1_vlan entered promiscuous mode [ 204.048609][ T8762] device veth1_vlan entered promiscuous mode [ 204.058806][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 204.068952][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 204.077551][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 204.086689][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 204.096021][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 204.105193][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 204.114620][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 204.125771][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 204.133634][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 204.143499][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 204.152382][ T2999] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.159431][ T2999] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.204278][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 204.215497][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 204.237631][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 23:53:36 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r3, 0x1, 0x1a, 0x0, &(0x7f0000000380)) [ 204.248741][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 204.258251][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 204.267569][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 204.276579][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 204.285665][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 204.294737][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 204.304084][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 204.313268][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 204.322108][ T2999] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.329179][ T2999] bridge0: port 2(bridge_slave_1) entered forwarding state [ 204.338880][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 204.356860][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 204.365617][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 204.394537][ T8770] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 23:53:37 executing program 0: [ 204.406204][ T8770] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 204.416578][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 204.429680][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 204.448801][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 23:53:37 executing program 0: [ 204.464379][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 204.479254][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 204.488590][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 204.497942][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 204.506739][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 23:53:37 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000780)={"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"}) [ 204.517853][ T8766] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 204.536354][ T8756] device veth0_macvtap entered promiscuous mode [ 204.571974][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 204.579961][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 204.607940][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 204.614156][ T8802] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 204.617090][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 204.640749][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 204.649402][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 204.658228][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 204.666768][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 204.675350][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 204.684327][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 204.692916][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 204.702296][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 204.721139][ T8756] device veth1_macvtap entered promiscuous mode [ 204.745781][ T8762] device veth0_macvtap entered promiscuous mode [ 204.756567][ T8762] device veth1_macvtap entered promiscuous mode [ 204.801061][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 204.812615][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 204.821992][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 204.829873][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 204.837898][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 23:53:37 executing program 0: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r0, &(0x7f00000004c0)='1', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) [ 204.845963][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 204.855075][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 204.870447][ T8772] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 204.893889][ T8756] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 204.905885][ T8756] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.917141][ T8756] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 204.927235][ T8756] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 204.938664][ T8756] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.950048][ T8756] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 204.962863][ T8770] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 204.977183][ T8762] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 204.988920][ T8762] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.999489][ T8762] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 205.010370][ T8762] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.022361][ T8762] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 205.033557][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 205.042346][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 205.051311][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 205.059898][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 205.069564][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 205.078490][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 205.135466][ T8762] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 205.149300][ T8762] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.159423][ T8762] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 205.170127][ T8762] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 23:53:37 executing program 0: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x39201, 0x0, 0x6}}, 0x50) [ 205.182828][ T8762] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 205.196138][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 205.205442][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 205.218273][ T8766] 8021q: adding VLAN 0 to HW filter on device batadv0 23:53:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000100)={[], 0x0, 0x71ac7}) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000700)={0x0, 0x0, @pic={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}}) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 205.419769][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 205.427835][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 205.444579][ T8772] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 205.542191][ T8770] device veth0_vlan entered promiscuous mode [ 205.577834][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 205.595240][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 205.605662][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 205.618782][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 205.629702][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 205.641194][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 205.653110][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 205.662930][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 205.685152][ T8770] device veth1_vlan entered promiscuous mode [ 205.751116][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 205.759393][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 205.778252][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 205.792651][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 23:53:38 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00008feff0)={0x0, 0x193}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000100)={0x4, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020d0000100000002f3144e800000000030006000720000002004000e0000001000000f5000000000800120002000100000000000000000030006c000203009f7eae02000000adb20200000000152c0000000000745ca1da020014bb00000000000000000000000003000500000000000200ed0000000000000000ba0000000083e30f510b958efd6eadf315615ce3a044152ea8bb574e2a78cb90d951c0af8345a652d3f8b063daeb15b119f58d3e220046820cd437fb9525e63abd1f39479d824920968cd59f74db363a6d8040362e26ea8764e7b175a7ba7184cef93a0fcc835820d96008f866fb4d28bc7ef9f8062f63006c8128159cdcfd0c171bcf6cf97cee3d7f8542cbd8c5d2e29b90dd2ca4c9b80600bd45d8b6f661130c526af032741a8eebb41e495669dd7f1237cc427d1d35826fc070967268073a437965d66df2f2d4bff069f7d039c721484d64363829137869865cce84240b9ec5cf2faf907a440931d08e9e65d7b8597e57292ac7c4f1c02db1c2e4f7104d1a982cf400c5d0f4431963df216018cd00721a39afcd92b7b456952928785a391ec5ad766ace6318c103bcd5f782adaeac178f69a3247fd3bf2908eb0cd1f0134fad0bd65b5008c249706ea978286437e0aa0900c36f88098cd95ab1cc5f2dfcb35d123f85d75f400d25928aab75c854502f01000100000000dfa130007a6845de7f93684d20e40fbcc782f4d4105f6512a39875e6e543defe12c0a79fb6b74d4b59802cd01276d5cc8c024a28c828f9d8b00b8609dd2ce899228509c49f9fe74fc9de22ea494834bcbfe5d389dba66e268afb67909061463015bdc8edc11bae372c83640c816ceee19225973a20c8653421af7bd8449325c8aa5603ea94974b6bc1f9a881f56908ef619948eac304a6dd5dae540f0e478f72c7ed60240fd9e5fd847771e4c978c2b039cefc2566be2f0655395d495c6eff1914832e513fe5b0a428195bd0e8186eba180000000000000000000000000000630100000000000000c950765d822259357b5aa5377b4c97984e241d9f1796d82dfded5af1fbadb5b5bdd52a7f84427796ee9bc70405453e93ae4ebed8405af1fbb6b237cbf2b950b63fb45d12bea8e8d2ee591ecf871ea5c15b294785cfbdf5d4adc9467535a8a06ed062b155dfe1c715447a0f6ee54a43281bd5f0850cfeec98458be0d38e59f1ac1f03d5ed2c3e20a900e852ce088319166f191e50c94d9863c5b1878e98bc90590c792d5850e1e0e3cef86808c10122fe287797ceefdc513234004f613d592cffaf66c2e92c7b1ad6bd29d16124a67502c343a72a3d06168a096aff16454ccd7848fa4807c6be3beb1982d25e1af301430823fe2e85fef29da4efd745641657e3db8512abd2981792cef69ba2f7415107f19c8fa42e7f53fd1a7c60c214d501cb0f4b1c0c0a956a8832f0af3aee417d3896f832374378b396fbe50cfa9e7e539159bca09cd839e00528576d11a70dd36d764b2406585728c83a34d57ecb571f24054f0ad327bb102b1b1bb03bf572cfef6d4e36d6615ed08accf4b1df3a1add0700117e04ebd57952cd4d69518b4f00000000000000000000000000d0078546ebdb83719f17ed0320f518ac4ef73fbaf52f3ddf6e123bd2065e7decd3c06d3a3f27de303dae9c51e8af687d3cf8c04d7a7090d038cbceb08c89508a3fb4b650ac251218f3808b28d51628584ee03c64bead67a9197bca833e4428ee998730f03fba4d22a0835ef5b69868fb145b8ccc0db0cea56aa69cd9a05b7ce3903f0b641c7dc715c24b670000480928f29b493f2ca8ff85a115121e67e7f9dba509887d8c3ba22c0665e5118391bd5ed51e9d2444d3a080e7f6d916be7db141f7a42536a661fa7e1487b1e6b0240635640cbf1f9a018c72862b78f9051fd386d5a5125348eb49cbfdc977a13b6510c2f8aa0000000000000000f53bdd8130db3629f30ae357b18d6334a44aa8ee0000906743861c3e8a5c2a7d92017946bd175e8580ab07218afaae29e5abfcab4d025ad300714d46d1a702874884d947477c6a39be938f7ed7fb6cf0e04863377e3ffcc264d1e887dfb23ee0f48acd4231c00fd351276e9b2c9b214be852bb6b959158e5e08d8cacc3b546a1e4871056858fcb785afcb9d85708083b4cc657aa985e41ff61bf84d97333dc52fbd9a22de1fd0e907048d8742bfb9e2ff0995c020c6af3ff4ca5780bbe9c514a8e71eddb6b1b46bbc80f131a48f7e5dad20df17ae568c0954e14d7efcc0075"], 0x80}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f00000000c0), 0x4000676, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 205.804744][ T8766] device veth0_vlan entered promiscuous mode [ 205.859242][ T8770] device veth0_macvtap entered promiscuous mode 23:53:38 executing program 2: [ 205.919981][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 205.925026][ C0] hrtimer: interrupt took 65426 ns [ 205.930910][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 205.964575][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 205.994273][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 206.023974][ T8766] device veth1_vlan entered promiscuous mode [ 206.036327][ T8770] device veth1_macvtap entered promiscuous mode [ 206.080478][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 206.091304][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 206.106409][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 206.115233][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 206.124143][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 206.157780][ T8770] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 206.169913][ T8770] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.180321][ T8770] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 206.191032][ T8770] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.200905][ T8770] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 206.211407][ T8770] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.224034][ T8770] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 206.232518][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 206.241678][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 206.249781][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 206.258901][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 206.267659][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 206.277263][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 206.287618][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 206.299551][ T8772] device veth0_vlan entered promiscuous mode [ 206.309430][ T8770] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 206.320711][ T8770] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.330723][ T8770] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 206.341471][ T8770] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.351354][ T8770] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 206.361923][ T8770] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.373175][ T8770] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 206.392183][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 206.401582][ T2969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 206.420857][ T8772] device veth1_vlan entered promiscuous mode [ 206.434353][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 206.443346][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 206.485965][ T8766] device veth0_macvtap entered promiscuous mode [ 206.561570][ T8766] device veth1_macvtap entered promiscuous mode [ 206.596619][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 206.604994][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 206.613462][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 206.623248][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 206.636893][ T8772] device veth0_macvtap entered promiscuous mode [ 206.657543][ T8766] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 206.669490][ T8766] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.688389][ T8766] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 206.699724][ T8766] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.716924][ T8766] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 206.728086][ T8766] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.745376][ T8766] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 206.757506][ T8766] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.771443][ T8766] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 206.783385][ T8772] device veth1_macvtap entered promiscuous mode [ 206.791456][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 206.799467][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 206.807925][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 206.816471][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 206.827017][ T8766] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 206.837529][ T8766] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.847737][ T8766] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 206.858472][ T8766] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.870446][ T8766] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 206.880919][ T8766] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.891079][ T8766] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 206.901663][ T8766] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.913233][ T8766] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 206.931530][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 206.940025][ T2968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 207.045429][ T8772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 207.056002][ T8772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 207.067610][ T8772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 207.078217][ T8772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 207.088365][ T8772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 207.099462][ T8772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 207.110841][ T8772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 207.121561][ T8772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 207.131486][ T8772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 207.142090][ T8772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 207.153331][ T8772] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 207.210628][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 207.219472][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 207.236314][ T8772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 207.253758][ T8772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 207.265216][ T8772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 207.275909][ T8772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 207.286383][ T8772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 207.296877][ T8772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 207.306866][ T8772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 207.317347][ T8772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 207.327187][ T8772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 207.337666][ T8772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 207.351214][ T8772] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 207.358671][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 207.368090][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 23:53:40 executing program 3: 23:53:40 executing program 0: 23:53:40 executing program 1: 23:53:40 executing program 2: 23:53:40 executing program 4: 23:53:40 executing program 0: 23:53:40 executing program 5: 23:53:40 executing program 3: [ 207.686970][ T27] kauditd_printk_skb: 3 callbacks suppressed [ 207.686975][ T27] audit: type=1800 audit(1583625220.281:31): pid=8870 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=16536 res=0 23:53:40 executing program 4: 23:53:40 executing program 0: 23:53:40 executing program 2: 23:53:40 executing program 5: 23:53:40 executing program 3: 23:53:40 executing program 1: 23:53:40 executing program 0: 23:53:40 executing program 4: 23:53:40 executing program 2: 23:53:40 executing program 3: 23:53:40 executing program 1: 23:53:40 executing program 5: 23:53:40 executing program 0: 23:53:40 executing program 4: 23:53:40 executing program 2: 23:53:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000740)=""/4086, 0xff6}], 0x1}, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00531) shutdown(r0, 0x0) shutdown(r1, 0x0) 23:53:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000600)=[{&(0x7f0000000500)=""/231, 0xe7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0xa) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000640)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) r4 = dup(r3) r5 = dup(r4) r6 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r6, 0x0, 0x1014a, 0x0, 0x0, 0x800e00515) shutdown(r5, 0x0) r7 = socket$inet6_tcp(0x1c, 0x1, 0x0) listen(r7, 0x0) accept4$inet6(r7, 0x0, 0x0, 0x0) shutdown(r6, 0x0) shutdown(r2, 0x0) 23:53:40 executing program 5: 23:53:40 executing program 0: 23:53:40 executing program 2: 23:53:40 executing program 4: 23:53:41 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x2d4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d00800002400ffffff7f0b000000fdffa6fffff7", @ANYRES32, @ANYBLOB="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"], 0x3}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r3, 0x0) 23:53:41 executing program 1: r0 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) sendmmsg(r0, &(0x7f0000000740)=[{{&(0x7f0000000080)=@nfc_llcp={0x27, 0x3, 0x0, 0x0, 0x0, 0x0, "4ebfc7080e45f22bc9acb30caa8821eac8c337eec75563a516bd29cdabeec3119fe24d6e5e2362003ea872e0dbdd55eff617d3651a65c599fb158aa62ef4e4"}, 0x80, &(0x7f0000001900)=[{&(0x7f0000000440)="8158298a183c98c4730e318ec481", 0xe}], 0x1}}], 0x1, 0x0) 23:53:41 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr="ff4e34443227c5d388144f479d005aff"}, 0x3c) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') sendfile(r1, r2, 0x0, 0xa808) 23:53:41 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x20000000080003, 0xc) write(r0, &(0x7f00000000c0)="1f0000000202fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 23:53:41 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, 0xfffffffffffffffd) 23:53:41 executing program 4: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000340)="519bff3dedc3"}, 0x20) r0 = socket$packet(0x11, 0x40800000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x100, 0xb5481f3e129391aa) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @random="208ad9019612"}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="1004000073d1600000000000fbf55b42b90516db4d916502c555cf09570300a44b29d9fde6ea94211af8e74b", 0x311, 0x5db0ef4e77e948cf, 0x0, 0x320) [ 208.537126][ T8946] x_tables: duplicate underflow at hook 2 23:53:41 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1800007, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x1ff, &(0x7f00000004c0)=0x0) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ftruncate(r4, 0x8200) sendmmsg(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000008b80)=ANY=[@ANYBLOB="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"], 0x481}}], 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000100)={0x0, 0x2, 0x0, 0xe0b7}) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) [ 208.579862][ T8946] x_tables: duplicate underflow at hook 2 23:53:41 executing program 3: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000002580)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 23:53:41 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000400)=""/245, 0xf5) lseek(r0, 0xfffffffffffffffc, 0x1) 23:53:41 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x12) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3}) 23:53:41 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') creat(&(0x7f0000000180)='./file0\x00', 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x2c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_ADDRESS={0xc, 0x1, @local}]}, 0x2c}}, 0x0) [ 208.746780][ T8968] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 208.780093][ T8968] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 23:53:41 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000100)=[{0x0, 0x5}, {}], 0x2) [ 208.832427][ T8968] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 208.842567][ T8975] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 23:53:41 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) unlink(0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000100)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x300cce, &(0x7f0000000080)={@local, @empty, @val, {@ipv6}}, 0x0) 23:53:41 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 23:53:41 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x1000000000000, &(0x7f00000000c0)="d2"}) timer_settime(0x0, 0x0, 0x0, 0x0) 23:53:41 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_route(0x10, 0x3, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) write$cgroup_pid(r0, &(0x7f0000000180), 0x12) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xc000}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 23:53:41 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x100000400000003a) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=@fragment, 0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, 0x0) 23:53:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x6a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv4={0x800, @gre={{0x6, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp={0x7, 0x4}]}}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {}, {0x689}}}}}}, 0x0) 23:53:42 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) write(r1, &(0x7f0000000000)="b6", 0xfffffe7e) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x443, 0x0) r5 = syz_open_dev$evdev(&(0x7f000004a000)='/dev/input/event#\x00', 0x0, 0x0) dup3(r4, r5, 0x80000) 23:53:42 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4003fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpgid(0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, r0, 0x0) 23:53:42 executing program 1: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000200), 0x87) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 23:53:42 executing program 0: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000300)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x4002) io_setup(0xb, &(0x7f0000000040)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x200a00}]) fallocate(r0, 0x4000000000000010, 0x2, 0x200a00) 23:53:42 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) lstat(0x0, 0x0) [ 209.743777][ T27] audit: type=1326 audit(1583625222.341:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=9028 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f2ea code=0xffff0000 23:53:42 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='maps\x00') r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r2, r1, 0x0, 0x800000080004103) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x11000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0x0, 0x0, 0x2}, 0x0, 0xd, r1, 0x3) fcntl$setstatus(r0, 0x4, 0x42000) socket$inet6(0xa, 0x0, 0x6) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)={'#! ', './file0', [{0x20, 'GPL'}], 0xa, "ef"}, 0x10) 23:53:42 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) unlink(0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000100)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x300cce, &(0x7f0000000080)={@local, @empty, @val, {@ipv6}}, 0x0) 23:53:42 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xa536b678) utimes(&(0x7f00000000c0)='./file0\x00', 0x0) 23:53:42 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@dev, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x6], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r3}) 23:53:43 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@dev, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x6], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r3}) 23:53:43 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) sysfs$1(0x1, 0x0) 23:53:43 executing program 5: getpid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000340)='[\'eth1-#\x00', 0xffffffffffffffff) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000680)="62f23e748cdfecc0d3bcb88248f9f8f8e8ba030000000000001dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a30142ee9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffd92, 0xb6}], 0x80000, 0x0) [ 210.831364][ T27] audit: type=1326 audit(1583625223.431:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=9055 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f2ea code=0xffff0000 [ 211.614906][ T27] audit: type=1326 audit(1583625224.211:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=9055 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f2ea code=0xffff0000 23:53:44 executing program 2: 23:53:44 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) lseek(0xffffffffffffffff, 0x0, 0x0) 23:53:44 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x10012, r0, 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) 23:53:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) 23:53:44 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETAF(r0, 0x545d, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "5e770398381cc834"}) [ 212.143908][ T27] audit: type=1326 audit(1583625224.741:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=9081 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f2ea code=0xffff0000 23:53:45 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='maps\x00') r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r2, r1, 0x0, 0x800000080004103) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x11000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0x0, 0x0, 0x2}, 0x0, 0xd, r1, 0x3) fcntl$setstatus(r0, 0x4, 0x42000) socket$inet6(0xa, 0x0, 0x6) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)={'#! ', './file0', [{0x20, 'GPL'}], 0xa, "ef"}, 0x10) 23:53:45 executing program 0: 23:53:45 executing program 4: 23:53:45 executing program 5: 23:53:45 executing program 2: 23:53:45 executing program 4: 23:53:45 executing program 5: 23:53:45 executing program 2: 23:53:45 executing program 1: 23:53:45 executing program 0: 23:53:45 executing program 4: 23:53:45 executing program 2: [ 212.928509][ T27] audit: type=1326 audit(1583625225.521:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=9081 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f2ea code=0xffff0000 23:53:46 executing program 3: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000002f00)=[{{&(0x7f0000000300)={0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@pktinfo={{0x24, 0x29, 0x32, {@dev}}}], 0x28}}], 0x1, 0x0) 23:53:46 executing program 5: 23:53:46 executing program 4: 23:53:46 executing program 2: 23:53:46 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f00000000c0)=0x2, 0x4) write$binfmt_misc(r0, 0x0, 0x0) 23:53:46 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet(0xa, 0x801, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe2(0x0, 0x0) getdents64(r0, &(0x7f0000000380)=""/87, 0x1f7) getdents64(r0, &(0x7f0000000080)=""/167, 0xa7) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57, 0x39}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x3c) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) 23:53:46 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000001380)=ANY=[@ANYRESHEX=0x0], 0x12) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) name_to_handle_at(r0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x8}, 0x0, 0x1000) 23:53:46 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet(0xa, 0x801, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) socket$inet_udp(0x2, 0x2, 0x0) getdents64(r1, &(0x7f0000000380)=""/87, 0x1f7) getdents64(r1, &(0x7f0000000080)=""/167, 0xa7) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57, 0x39}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x3c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 23:53:46 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000d06000)=0x1, 0x4) [ 213.901875][ T9137] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 23:53:46 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) msgrcv(0x0, 0x0, 0x0, 0x3, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x13) 23:53:46 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r0, 0x0) rt_sigsuspend(&(0x7f0000001280), 0x8) 23:53:46 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) [ 214.059327][ T9160] ptrace attach of "/root/syz-executor.5"[9158] was attempted by "/root/syz-executor.5"[9160] 23:53:46 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f00000005c0)=@nat={'nat\x00', 0x1b, 0x5, 0x318, 0x1e8, 0x1e8, 0xa8, 0x140, 0x1e8, 0x280, 0x280, 0x280, 0x280, 0x280, 0x5, 0x0, {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @dev, @dev, @icmp_id}}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00'}}, {{@ip={@loopback, @loopback, 0x0, 0x0, 'ip6_vti0\x00', 'hsr0\x00'}, 0x0, 0x70, 0xa8}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local, @icmp_id, @gre_key}}}}, {{@ip={@multicast1, @dev, 0x0, 0x0, 'ip6gre0\x00', 'veth1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378) 23:53:46 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/bus/input/devices\x00', 0x0, 0x0) poll(&(0x7f0000000000)=[{r0}, {r0}], 0x2, 0x0) 23:53:46 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000280)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f00000002c0)) 23:53:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f0000000000)) 23:53:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f0000000000)) [ 214.272181][ T9180] x_tables: duplicate underflow at hook 1 [ 214.310658][ T9185] x_tables: duplicate underflow at hook 1 23:53:49 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet(0xa, 0x801, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe2(0x0, 0x0) getdents64(r0, &(0x7f0000000380)=""/87, 0x1f7) getdents64(r0, &(0x7f0000000080)=""/167, 0xa7) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57, 0x39}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x3c) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) 23:53:49 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000040)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@gid={'gid', 0x3d, 0xee00}, 0x7}]}) 23:53:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f0000000000)) 23:53:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/shm\x00', 0x0, 0x0) preadv(r2, &(0x7f0000001400)=[{&(0x7f0000000040)=""/236, 0xec}], 0x1, 0x1) 23:53:49 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000)="0c2687927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7519bf746bec66f9", 0xfe6a, 0x48800, 0x0, 0xffffffffffffff00) 23:53:49 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) [ 217.034436][ T9203] [ 217.036834][ T9203] ====================================================== [ 217.043848][ T9203] WARNING: possible circular locking dependency detected [ 217.050871][ T9203] 5.6.0-rc4-syzkaller #0 Not tainted [ 217.056145][ T9203] ------------------------------------------------------ [ 217.063171][ T9203] syz-executor.4/9203 is trying to acquire lock: [ 217.069505][ T9203] ffff888090de82a0 (&tty->termios_rwsem){++++}, at: n_tty_receive_buf_common+0x88/0x3100 [ 217.079304][ T9203] [ 217.079304][ T9203] but task is already holding lock: [ 217.086660][ T9203] ffffffff89263070 (sel_lock){+.+.}, at: paste_selection+0x115/0x450 [ 217.094711][ T9203] [ 217.094711][ T9203] which lock already depends on the new lock. [ 217.094711][ T9203] [ 217.105620][ T9203] [ 217.105620][ T9203] the existing dependency chain (in reverse order) is: [ 217.114631][ T9203] [ 217.114631][ T9203] -> #2 (sel_lock){+.+.}: [ 217.121113][ T9203] lock_acquire+0x154/0x250 [ 217.126120][ T9203] __mutex_lock_common+0x189/0x2fc0 [ 217.131810][ T9203] mutex_lock_nested+0x1a/0x20 [ 217.137070][ T9203] set_selection_kernel+0x3a3/0x17e0 [ 217.142851][ T9203] set_selection_user+0x5e/0x80 [ 217.148333][ T9203] tioclinux+0xff/0x520 [ 217.153018][ T9203] vt_ioctl+0x3f1/0x3a30 [ 217.157758][ T9203] tty_ioctl+0xee6/0x15c0 [ 217.162587][ T9203] __se_sys_ioctl+0xf9/0x160 [ 217.167703][ T9203] do_syscall_64+0xf3/0x1b0 [ 217.172746][ T9203] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 217.179485][ T9203] [ 217.179485][ T9203] -> #1 (console_lock){+.+.}: [ 217.186318][ T9203] lock_acquire+0x154/0x250 [ 217.191403][ T9203] console_lock+0x42/0x70 [ 217.196237][ T9203] con_flush_chars+0x57/0x650 [ 217.201429][ T9203] n_tty_write+0xe45/0x1170 [ 217.206436][ T9203] tty_write+0x593/0x940 [ 217.211172][ T9203] __vfs_write+0xa7/0x710 [ 217.215995][ T9203] vfs_write+0x271/0x570 [ 217.220740][ T9203] ksys_write+0x115/0x220 [ 217.225574][ T9203] do_syscall_64+0xf3/0x1b0 [ 217.230572][ T9203] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 217.236953][ T9203] [ 217.236953][ T9203] -> #0 (&tty->termios_rwsem){++++}: [ 217.244383][ T9203] validate_chain+0x1507/0x7be0 [ 217.249726][ T9203] __lock_acquire+0xc5a/0x1bc0 [ 217.254981][ T9203] lock_acquire+0x154/0x250 [ 217.260000][ T9203] down_read+0x36/0x50 [ 217.264580][ T9203] n_tty_receive_buf_common+0x88/0x3100 [ 217.270626][ T9203] paste_selection+0x32c/0x450 [ 217.275890][ T9203] vt_ioctl+0x3f1/0x3a30 [ 217.280629][ T9203] tty_ioctl+0xee6/0x15c0 [ 217.285457][ T9203] __se_sys_ioctl+0xf9/0x160 [ 217.290555][ T9203] do_syscall_64+0xf3/0x1b0 [ 217.295552][ T9203] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 217.301935][ T9203] [ 217.301935][ T9203] other info that might help us debug this: [ 217.301935][ T9203] [ 217.312161][ T9203] Chain exists of: [ 217.312161][ T9203] &tty->termios_rwsem --> console_lock --> sel_lock [ 217.312161][ T9203] [ 217.324815][ T9203] Possible unsafe locking scenario: [ 217.324815][ T9203] [ 217.332238][ T9203] CPU0 CPU1 [ 217.337588][ T9203] ---- ---- [ 217.342938][ T9203] lock(sel_lock); [ 217.346717][ T9203] lock(console_lock); [ 217.353372][ T9203] lock(sel_lock); [ 217.359812][ T9203] lock(&tty->termios_rwsem); [ 217.364824][ T9203] [ 217.364824][ T9203] *** DEADLOCK *** [ 217.364824][ T9203] [ 217.372963][ T9203] 3 locks held by syz-executor.4/9203: [ 217.378402][ T9203] #0: ffff888090de8090 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x21/0x70 [ 217.387595][ T9203] #1: ffff8880aa5be0a8 (&buf->lock){+.+.}, at: paste_selection+0xee/0x450 [ 217.396199][ T9203] #2: ffffffff89263070 (sel_lock){+.+.}, at: paste_selection+0x115/0x450 [ 217.404849][ T9203] [ 217.404849][ T9203] stack backtrace: [ 217.410733][ T9203] CPU: 0 PID: 9203 Comm: syz-executor.4 Not tainted 5.6.0-rc4-syzkaller #0 [ 217.419298][ T9203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 217.429373][ T9203] Call Trace: [ 217.432659][ T9203] dump_stack+0x1e9/0x30e [ 217.436973][ T9203] print_circular_bug+0xc3f/0xe70 [ 217.442090][ T9203] ? stack_trace_save+0xad/0x150 [ 217.447050][ T9203] ? save_trace+0x49/0x9e0 [ 217.451449][ T9203] check_noncircular+0x1fb/0x3a0 [ 217.456382][ T9203] validate_chain+0x1507/0x7be0 [ 217.461299][ T9203] ? mark_lock+0x107/0x1650 [ 217.465783][ T9203] ? mark_lock+0x107/0x1650 [ 217.470285][ T9203] __lock_acquire+0xc5a/0x1bc0 [ 217.475055][ T9203] lock_acquire+0x154/0x250 [ 217.479559][ T9203] ? n_tty_receive_buf_common+0x88/0x3100 [ 217.486666][ T9203] down_read+0x36/0x50 [ 217.490725][ T9203] ? n_tty_receive_buf_common+0x88/0x3100 [ 217.496441][ T9203] n_tty_receive_buf_common+0x88/0x3100 [ 217.501982][ T9203] ? __mutex_lock_common+0x582/0x2fc0 [ 217.507353][ T9203] ? paste_selection+0x115/0x450 [ 217.512281][ T9203] ? lockdep_hardirqs_on+0x4f4/0x840 [ 217.517666][ T9203] ? _raw_spin_unlock_irqrestore+0x6f/0xd0 [ 217.523474][ T9203] ? tty_ldisc_receive_buf+0x97/0x170 [ 217.528835][ T9203] paste_selection+0x32c/0x450 [ 217.533596][ T9203] ? do_task_dead+0xb0/0xb0 [ 217.538195][ T9203] vt_ioctl+0x3f1/0x3a30 [ 217.542450][ T9203] ? rcu_lock_release+0x5/0x20 [ 217.547205][ T9203] ? tomoyo_path_number_perm+0x58f/0x690 [ 217.552838][ T9203] ? tty_jobctrl_ioctl+0x1e8/0xc10 [ 217.558046][ T9203] tty_ioctl+0xee6/0x15c0 [ 217.562370][ T9203] ? tty_do_resize+0x180/0x180 [ 217.567134][ T9203] __se_sys_ioctl+0xf9/0x160 [ 217.571751][ T9203] do_syscall_64+0xf3/0x1b0 [ 217.576345][ T9203] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 217.582221][ T9203] RIP: 0033:0x45c4a9 [ 217.586104][ T9203] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 217.605809][ T9203] RSP: 002b:00007f56fe9a5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 217.614202][ T9203] RAX: ffffffffffffffda RBX: 00007f56fe9a66d4 RCX: 000000000045c4a9 [ 217.622152][ T9203] RDX: 0000000020000000 RSI: 000000000000541c RDI: 0000000000000003 23:53:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000040)=0x81) 23:53:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f0000000000)) [ 217.633324][ T9203] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 217.641448][ T9203] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 217.649400][ T9203] R13: 0000000000000571 R14: 00000000004c7c95 R15: 000000000076bf2c [ 217.660424][ T9205] tmpfs: Bad value for 'gid' 23:53:50 executing program 3: 23:53:50 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000040)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@gid={'gid', 0x3d, 0xee00}, 0x7}]}) 23:53:50 executing program 2: [ 217.730049][ T9205] tmpfs: Bad value for 'gid' [ 217.733232][ T9213] EXT4-fs warning (device sda1): ext4_group_extend:1782: can't shrink FS - resize aborted 23:53:50 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) [ 217.875975][ T9229] tmpfs: Bad value for 'gid' 23:53:50 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet(0xa, 0x801, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe2(0x0, 0x0) getdents64(r0, &(0x7f0000000380)=""/87, 0x1f7) getdents64(r0, &(0x7f0000000080)=""/167, 0xa7) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57, 0x39}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x3c) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) 23:53:50 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000)="0c2687927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7519bf746bec66f9", 0xfe6a, 0x48800, 0x0, 0xffffffffffffff00) 23:53:50 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000)="0c2687927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7519bf746bec66f9", 0xfe6a, 0x48800, 0x0, 0xffffffffffffff00) 23:53:50 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000)="0c2687927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7519bf746bec66f9", 0xfe6a, 0x48800, 0x0, 0xffffffffffffff00) 23:53:50 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000040)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@gid={'gid', 0x3d, 0xee00}, 0x7}]}) 23:53:50 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 23:53:50 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000040)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@gid={'gid', 0x3d, 0xee00}, 0x7}]}) [ 218.090695][ T9248] tmpfs: Bad value for 'gid' 23:53:50 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) [ 218.257990][ T9256] tmpfs: Bad value for 'gid' 23:53:50 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@gid={'gid', 0x3d, 0xee00}, 0x7}]}) 23:53:51 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 23:53:51 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@gid={'gid', 0x3d, 0xee00}, 0x7}]}) 23:53:51 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 23:53:53 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet(0xa, 0x801, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe2(0x0, 0x0) getdents64(r0, &(0x7f0000000380)=""/87, 0x1f7) getdents64(r0, &(0x7f0000000080)=""/167, 0xa7) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57, 0x39}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x3c) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) 23:53:53 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@gid={'gid', 0x3d, 0xee00}, 0x7}]}) 23:53:53 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 23:53:53 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000)="0c2687927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7519bf746bec66f9", 0xfe6a, 0x48800, 0x0, 0xffffffffffffff00) 23:53:53 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000)="0c2687927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7519bf746bec66f9", 0xfe6a, 0x48800, 0x0, 0xffffffffffffff00) 23:53:53 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000)="0c2687927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7519bf746bec66f9", 0xfe6a, 0x48800, 0x0, 0xffffffffffffff00) 23:53:53 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 23:53:53 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 23:53:54 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 23:53:54 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 23:53:54 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000040)='tmpfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@gid={'gid', 0x3d, 0xee00}, 0x7}]}) 23:53:54 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 23:53:54 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet(0xa, 0x801, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe2(0x0, 0x0) getdents64(r0, &(0x7f0000000380)=""/87, 0x1f7) getdents64(r0, &(0x7f0000000080)=""/167, 0xa7) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57, 0x39}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x7, r3, 0x0, 0x0) 23:53:54 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000040)='tmpfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@gid={'gid', 0x3d, 0xee00}, 0x7}]}) 23:53:54 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 23:53:54 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000)="0c2687927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7519bf746bec66f9", 0xfe6a, 0x48800, 0x0, 0xffffffffffffff00) 23:53:54 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000)="0c2687927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7519bf746bec66f9", 0xfe6a, 0x48800, 0x0, 0xffffffffffffff00) 23:53:54 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000040)='tmpfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@gid={'gid', 0x3d, 0xee00}, 0x7}]}) 23:53:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) 23:53:54 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000)="0c2687927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7519bf746bec66f9", 0xfe6a, 0x48800, 0x0, 0xffffffffffffff00) 23:53:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) 23:53:54 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000040)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:53:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) 23:53:54 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 23:53:57 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet(0xa, 0x801, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe2(0x0, 0x0) getdents64(r0, &(0x7f0000000380)=""/87, 0x1f7) getdents64(r0, &(0x7f0000000080)=""/167, 0xa7) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57, 0x39}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x7, r3, 0x0, 0x0) 23:53:57 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000040)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:53:57 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 23:53:57 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000000)="0c2687927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7519bf746bec66f9", 0xfe6a, 0x48800, 0x0, 0xffffffffffffff00) 23:53:57 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, 0x0, 0x0) 23:53:57 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, 0x0, 0x0) 23:53:57 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) writev(r0, 0x0, 0x0) 23:53:57 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 23:53:57 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) 23:53:57 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000040)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:53:57 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) writev(r0, 0x0, 0x0) 23:53:57 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)