[ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Load/Save RF Kill Switch Status. [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.223' (ECDSA) to the list of known hosts. 2020/05/24 14:49:16 fuzzer started 2020/05/24 14:49:16 dialing manager at 10.128.0.26:41143 2020/05/24 14:49:16 syscalls: 3055 2020/05/24 14:49:16 code coverage: enabled 2020/05/24 14:49:16 comparison tracing: enabled 2020/05/24 14:49:16 extra coverage: enabled 2020/05/24 14:49:16 setuid sandbox: enabled 2020/05/24 14:49:16 namespace sandbox: enabled 2020/05/24 14:49:16 Android sandbox: /sys/fs/selinux/policy does not exist 2020/05/24 14:49:16 fault injection: enabled 2020/05/24 14:49:16 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/05/24 14:49:16 net packet injection: enabled 2020/05/24 14:49:16 net device setup: enabled 2020/05/24 14:49:16 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/05/24 14:49:16 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/05/24 14:49:16 USB emulation: enabled 14:50:58 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) close(r2) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[], 0xffe8) socket$inet(0x2, 0x3, 0x2f) connect$inet(r2, &(0x7f0000000080), 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) syzkaller login: [ 160.889644][ T6830] IPVS: ftp: loaded support on port[0] = 21 14:50:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x8f, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) [ 161.037126][ T6830] chnl_net:caif_netlink_parms(): no params data found [ 161.178813][ T6830] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.195586][ T6830] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.214953][ T6830] device bridge_slave_0 entered promiscuous mode [ 161.227074][ T6830] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.244351][ T6830] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.252123][ T6830] device bridge_slave_1 entered promiscuous mode [ 161.286356][ T6830] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 161.286451][ T6960] IPVS: ftp: loaded support on port[0] = 21 [ 161.301594][ T6830] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 161.341070][ T6830] team0: Port device team_slave_0 added [ 161.351534][ T6830] team0: Port device team_slave_1 added 14:50:59 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) [ 161.393601][ T6830] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 161.402108][ T6830] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 161.445841][ T6830] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 161.474862][ T6830] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 161.481864][ T6830] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 161.544770][ T6830] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 14:50:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000001a00)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) preadv(r0, &(0x7f0000000340)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000080)={0x50, 0x0, 0x1, {0x7, 0x1f, 0x0, 0xb0c00, 0x0, 0x0, 0x0, 0x5}}, 0x50) [ 161.670232][ T6830] device hsr_slave_0 entered promiscuous mode [ 161.706447][ T6830] device hsr_slave_1 entered promiscuous mode [ 161.808538][ T7010] IPVS: ftp: loaded support on port[0] = 21 [ 161.960566][ T7037] IPVS: ftp: loaded support on port[0] = 21 [ 161.970526][ T6960] chnl_net:caif_netlink_parms(): no params data found 14:51:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000000040)=[{{&(0x7f0000000000)={0x2, 0x4e24, @dev}, 0x10, 0x0}}, {{&(0x7f0000000200)={0x2, 0x4e24, @multicast2}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=ANY=[], 0xc}}], 0x2, 0x0) [ 162.185202][ T6830] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 162.278365][ T6830] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 162.386943][ T6830] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 162.460418][ T6960] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.473279][ T6960] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.483469][ T6960] device bridge_slave_0 entered promiscuous mode 14:51:00 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x7c, &(0x7f00000021c0)=""/4101, &(0x7f0000001140)=0x1005) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 162.523575][ T6830] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 162.537510][ T7216] IPVS: ftp: loaded support on port[0] = 21 [ 162.598487][ T6960] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.611024][ T6960] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.620524][ T6960] device bridge_slave_1 entered promiscuous mode [ 162.632321][ T7010] chnl_net:caif_netlink_parms(): no params data found [ 162.688470][ T6960] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 162.701309][ T6960] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 162.735120][ T6960] team0: Port device team_slave_0 added [ 162.743321][ T6960] team0: Port device team_slave_1 added [ 162.821805][ T6960] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 162.829289][ T6960] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 162.856557][ T6960] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 162.870012][ T6960] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 162.877429][ T6960] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 162.903453][ T6960] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 162.927475][ T7298] IPVS: ftp: loaded support on port[0] = 21 [ 162.964297][ T7037] chnl_net:caif_netlink_parms(): no params data found [ 163.050109][ T7010] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.058056][ T7010] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.066840][ T7010] device bridge_slave_0 entered promiscuous mode [ 163.119724][ T6960] device hsr_slave_0 entered promiscuous mode [ 163.175011][ T6960] device hsr_slave_1 entered promiscuous mode [ 163.217070][ T6960] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 163.225191][ T6960] Cannot create hsr debugfs directory [ 163.241664][ T7010] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.250839][ T7010] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.260087][ T7010] device bridge_slave_1 entered promiscuous mode [ 163.290119][ T7010] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 163.302902][ T7010] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 163.337910][ T7010] team0: Port device team_slave_0 added [ 163.369225][ T7010] team0: Port device team_slave_1 added [ 163.423801][ T7010] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 163.432044][ T7010] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 163.458691][ T7010] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 163.487852][ T7037] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.495564][ T7037] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.503462][ T7037] device bridge_slave_0 entered promiscuous mode [ 163.526057][ T7010] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 163.533239][ T7010] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 163.559397][ T7010] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 163.577614][ T7037] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.585256][ T7037] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.593057][ T7037] device bridge_slave_1 entered promiscuous mode [ 163.788552][ T7010] device hsr_slave_0 entered promiscuous mode [ 163.835038][ T7010] device hsr_slave_1 entered promiscuous mode [ 163.874704][ T7010] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 163.882693][ T7010] Cannot create hsr debugfs directory [ 163.891048][ T7037] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 163.901833][ T7216] chnl_net:caif_netlink_parms(): no params data found [ 163.954737][ T7037] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 163.979769][ T7298] chnl_net:caif_netlink_parms(): no params data found [ 164.071378][ T7037] team0: Port device team_slave_0 added [ 164.080899][ T7037] team0: Port device team_slave_1 added [ 164.143067][ T7037] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 164.153126][ T7037] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 164.183657][ T7037] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 164.223948][ T7037] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 164.231430][ T7037] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 164.257861][ T7037] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 164.321124][ T7298] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.334967][ T7298] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.342954][ T7298] device bridge_slave_0 entered promiscuous mode [ 164.378646][ T7298] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.386074][ T7298] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.394317][ T7298] device bridge_slave_1 entered promiscuous mode [ 164.415167][ T6830] 8021q: adding VLAN 0 to HW filter on device bond0 [ 164.431772][ T7216] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.439062][ T7216] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.450024][ T7216] device bridge_slave_0 entered promiscuous mode [ 164.487784][ T7037] device hsr_slave_0 entered promiscuous mode [ 164.535602][ T7037] device hsr_slave_1 entered promiscuous mode [ 164.574820][ T7037] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 164.582532][ T7037] Cannot create hsr debugfs directory [ 164.599096][ T7216] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.606565][ T7216] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.614501][ T7216] device bridge_slave_1 entered promiscuous mode [ 164.634268][ T7298] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 164.674013][ T7298] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 164.684257][ T6960] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 164.744745][ T6960] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 164.841851][ T6960] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 164.891411][ T6830] 8021q: adding VLAN 0 to HW filter on device team0 [ 164.899250][ T2518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 164.909690][ T2518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 164.929621][ T7216] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 164.951465][ T7216] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 164.960995][ T6960] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 164.996738][ T2517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 165.010670][ T2517] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 165.020082][ T2517] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.027312][ T2517] bridge0: port 1(bridge_slave_0) entered forwarding state [ 165.036134][ T2517] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 165.050320][ T7298] team0: Port device team_slave_0 added [ 165.092409][ T7010] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 165.139181][ T7298] team0: Port device team_slave_1 added [ 165.175071][ T7216] team0: Port device team_slave_0 added [ 165.186409][ T7216] team0: Port device team_slave_1 added [ 165.202846][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 165.212523][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 165.221807][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.229123][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 165.237571][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 165.247097][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 165.256220][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 165.265948][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 165.274375][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 165.283875][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 165.293410][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 165.302026][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 165.311028][ T7010] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 165.406064][ T7298] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 165.413046][ T7298] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 165.439745][ T7298] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 165.453246][ T7298] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 165.460941][ T7298] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 165.487699][ T7298] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 165.512691][ T2518] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 165.521038][ T7010] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 165.639022][ T7298] device hsr_slave_0 entered promiscuous mode [ 165.695491][ T7298] device hsr_slave_1 entered promiscuous mode [ 165.745286][ T7298] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 165.752851][ T7298] Cannot create hsr debugfs directory [ 165.762058][ T7010] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 165.832271][ T7216] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 165.839741][ T7216] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 165.866846][ T7216] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 165.884207][ T7216] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 165.891873][ T7216] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 165.921749][ T7216] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 165.949992][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 165.962530][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 165.979516][ T6830] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 166.078095][ T7216] device hsr_slave_0 entered promiscuous mode [ 166.115394][ T7216] device hsr_slave_1 entered promiscuous mode [ 166.185168][ T7216] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 166.192765][ T7216] Cannot create hsr debugfs directory [ 166.305857][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 166.313346][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 166.333035][ T7037] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 166.393104][ T6830] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 166.401870][ T7037] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 166.468253][ T7037] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 166.512317][ T7037] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 166.662975][ T6960] 8021q: adding VLAN 0 to HW filter on device bond0 [ 166.671353][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 166.681581][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 166.719417][ T2518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 166.728384][ T2518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 166.738020][ T2518] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 166.746512][ T2518] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 166.785635][ T6960] 8021q: adding VLAN 0 to HW filter on device team0 [ 166.799904][ T7298] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 166.849516][ T6830] device veth0_vlan entered promiscuous mode [ 166.857483][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 166.869324][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 166.897543][ T7298] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 166.937629][ T7298] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 166.988411][ T7298] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 167.033223][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 167.042341][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.051926][ T2513] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.059195][ T2513] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.068448][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 167.078358][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.087455][ T2513] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.094540][ T2513] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.103201][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 167.131810][ T6830] device veth1_vlan entered promiscuous mode [ 167.169690][ T2519] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 167.178176][ T2519] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 167.187211][ T2519] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 167.201368][ T2519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 167.216493][ T7010] 8021q: adding VLAN 0 to HW filter on device bond0 [ 167.243162][ T6830] device veth0_macvtap entered promiscuous mode [ 167.256349][ T6830] device veth1_macvtap entered promiscuous mode [ 167.264671][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 167.274250][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 167.284623][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 167.293640][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 167.302663][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 167.310974][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 167.319906][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 167.337697][ T7216] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 167.396217][ T7216] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 167.454211][ T6830] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 167.464093][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 167.475934][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 167.483765][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 167.493476][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 167.502547][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 167.511540][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 167.520644][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 167.529532][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 167.550854][ T7216] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 167.608602][ T6830] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 167.622662][ T7216] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 167.667421][ T7010] 8021q: adding VLAN 0 to HW filter on device team0 [ 167.676651][ T2518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 167.688813][ T2518] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 167.697446][ T2518] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 167.710638][ T2518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 167.727351][ T6960] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 167.767068][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 167.779948][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.789486][ T2520] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.796646][ T2520] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.843905][ T2519] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 167.852328][ T2519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 167.861501][ T2519] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.870700][ T2519] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.877886][ T2519] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.886708][ T2519] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 167.894891][ T2519] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 167.902585][ T2519] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 167.911763][ T2519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 167.952962][ T7037] 8021q: adding VLAN 0 to HW filter on device bond0 [ 168.018048][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 168.027376][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 168.036668][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 168.049941][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 168.060945][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 168.083766][ T7298] 8021q: adding VLAN 0 to HW filter on device bond0 [ 168.137390][ T7037] 8021q: adding VLAN 0 to HW filter on device team0 [ 168.148131][ T6960] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 168.223179][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 168.242522][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 168.268786][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 168.295692][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 168.323657][ T7010] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 168.336989][ T7010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 168.365682][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 168.374557][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 168.402759][ T2520] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.409998][ T2520] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.422139][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 168.431271][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 168.441150][ T2520] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.448369][ T2520] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.456834][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 168.465902][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 168.475598][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 14:51:06 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) close(r2) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[], 0xffe8) socket$inet(0x2, 0x3, 0x2f) connect$inet(r2, &(0x7f0000000080), 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 168.522791][ T7298] 8021q: adding VLAN 0 to HW filter on device team0 [ 168.533414][ T2517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 168.566467][ T2517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 168.577812][ T2517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 168.605180][ T2518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 168.614113][ T2518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 168.629709][ T7216] 8021q: adding VLAN 0 to HW filter on device bond0 14:51:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x27c7, 0x0, 0x0, 0x800e0050e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000380)=""/242, 0xf2}], 0x1}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(0xffffffffffffff9c, &(0x7f0000000a00)={0x0, 0x0, 0x0}, 0x0) recvfrom$inet(r2, 0x0, 0xfec5, 0x0, 0x0, 0x800e00505) shutdown(r2, 0x0) [ 168.676786][ T7010] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 168.697100][ T2518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 168.709430][ T2518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 168.719734][ T2518] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.726920][ T2518] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.734742][ T2518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 168.756518][ T2518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 168.771106][ T2518] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 168.779970][ T2518] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 168.788559][ T2518] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 168.805848][ T2518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 168.814925][ T2518] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 168.825835][ T2518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 168.838633][ T2518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 168.848106][ T2518] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.855293][ T2518] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.863416][ T2518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 168.920139][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 168.934056][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 168.943295][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 168.956562][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 168.966396][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 168.975600][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 168.984547][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 168.995241][ T2517] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 169.003054][ T2517] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 169.011288][ T2517] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 169.022156][ T6960] device veth0_vlan entered promiscuous mode [ 169.045288][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 169.053687][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 169.065475][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 169.073258][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 169.086506][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 169.096234][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 169.112592][ T7037] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 169.126540][ T7037] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 169.141241][ T7216] 8021q: adding VLAN 0 to HW filter on device team0 [ 169.166288][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 169.175012][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 169.199161][ T6960] device veth1_vlan entered promiscuous mode [ 169.217356][ T2517] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 169.226098][ T2517] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 169.234226][ T2517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 169.249118][ T2517] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 169.261638][ T2517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 169.271452][ T2517] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 169.280497][ T2517] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.287745][ T2517] bridge0: port 1(bridge_slave_0) entered forwarding state [ 169.296969][ T2517] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 169.338762][ T7010] device veth0_vlan entered promiscuous mode [ 169.369533][ T2517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 169.379360][ T2517] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 169.388916][ T2517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 169.399492][ T2517] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 169.409433][ T2517] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.416691][ T2517] bridge0: port 2(bridge_slave_1) entered forwarding state [ 169.425581][ T2517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 169.435034][ T2517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 169.445539][ T2517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 169.454965][ T2517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 169.465013][ T2517] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 169.473473][ T2517] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 169.482912][ T2517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 169.493205][ T2517] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 169.504300][ T2517] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 169.513159][ T2517] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 169.529074][ T7298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 169.545775][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 169.554297][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 169.574128][ T7010] device veth1_vlan entered promiscuous mode 14:51:07 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000640)=ANY=[@ANYBLOB="0207080002"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000008c0)=ANY=[@ANYBLOB="020300021b"], 0xd8}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) [ 169.596187][ T7037] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 169.603516][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 169.612901][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 169.631941][ T6960] device veth0_macvtap entered promiscuous mode [ 169.663613][ T6960] device veth1_macvtap entered promiscuous mode [ 169.684428][ T7216] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 169.707045][ T7216] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 169.724230][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 169.734835][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 169.744995][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 169.753903][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 169.764045][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 169.779889][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 169.801120][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 169.817864][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 169.829831][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 169.854656][ T7010] device veth0_macvtap entered promiscuous mode [ 169.888207][ T6960] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 169.909835][ T6960] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 169.923169][ T6960] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 169.940107][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 169.949158][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 169.967226][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 169.976781][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 169.993307][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 170.003483][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 170.020322][ T7010] device veth1_macvtap entered promiscuous mode [ 170.040963][ T6960] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 170.060553][ T6960] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 170.073176][ T6960] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 170.111275][ T2517] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 170.124688][ T2517] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 170.136096][ T2517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 170.145077][ T2517] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 170.153959][ T2517] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 170.211254][ T7298] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 170.256718][ T7010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 170.275049][ T7010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 170.291704][ T7010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 170.303962][ T7010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 170.317372][ T7010] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 170.335394][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 170.344376][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 170.362689][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 170.379698][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 170.400735][ T7216] 8021q: adding VLAN 0 to HW filter on device batadv0 14:51:08 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000640)=ANY=[@ANYBLOB="0207080002"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000008c0)=ANY=[@ANYBLOB="020300021b"], 0xd8}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) [ 170.457306][ T7010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 170.468355][ T7010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 170.491608][ T7010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 170.505066][ T7010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 170.525385][ T7010] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 170.533093][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 170.549484][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 170.562059][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 170.573472][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 170.753647][ T7037] device veth0_vlan entered promiscuous mode [ 170.805559][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 170.821914][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 14:51:08 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x1000}, 0x4) splice(r0, 0x0, r2, 0x0, 0x100000, 0x0) 14:51:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x8f, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) [ 170.939226][ T7037] device veth1_vlan entered promiscuous mode [ 170.976524][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 170.996983][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 171.011584][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 171.051896][ C0] hrtimer: interrupt took 44785 ns [ 171.215802][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 171.242861][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 171.290973][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 171.338971][ T2520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 14:51:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x8f, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) 14:51:09 executing program 1: syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@block={'block'}}]}) [ 171.654520][ T2519] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 171.678956][ T2519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 171.701812][ T2519] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 171.732207][ T7298] device veth0_vlan entered promiscuous mode [ 171.762927][ T2519] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 171.779950][ T2519] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 171.806523][ T2519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 171.829274][ T2519] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 171.870343][ T7037] device veth0_macvtap entered promiscuous mode [ 171.904416][ T7216] device veth0_vlan entered promiscuous mode [ 171.932016][ T7298] device veth1_vlan entered promiscuous mode [ 171.976692][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 171.991020][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 171.999942][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 172.009831][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 172.022129][ T7037] device veth1_macvtap entered promiscuous mode [ 172.053958][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 172.062543][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 172.084759][ T7037] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 172.096479][ T7037] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.106484][ T7037] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 172.117575][ T7037] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.127514][ T7037] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 172.138109][ T7037] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.150673][ T7037] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 172.167915][ T7216] device veth1_vlan entered promiscuous mode [ 172.179671][ T2518] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 172.190875][ T2518] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready 14:51:10 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) [ 172.203059][ T2518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 172.223649][ T7037] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 172.238910][ T7037] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.249214][ T7037] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 172.260189][ T7037] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.275043][ T7037] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 172.286760][ T7037] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.299160][ T7037] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 172.324244][ T2521] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 172.334572][ T2521] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 172.344229][ T2521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 172.363529][ T7298] device veth0_macvtap entered promiscuous mode [ 172.395638][ T2521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 172.410224][ T2521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 172.443825][ T2521] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 172.460455][ T7298] device veth1_macvtap entered promiscuous mode [ 172.534015][ T2521] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 172.542981][ T2521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 172.552369][ T2521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 172.564320][ T7216] device veth0_macvtap entered promiscuous mode [ 172.581542][ T7298] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 172.592636][ T7298] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.604757][ T7298] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 172.635440][ T7298] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.645284][ T7298] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 172.656210][ T7298] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.666087][ T7298] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 172.678593][ T7298] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.690964][ T7298] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 172.779185][ T7216] device veth1_macvtap entered promiscuous mode [ 172.788779][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 172.812468][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 172.863953][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready 14:51:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000001a00)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) preadv(r0, &(0x7f0000000340)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000080)={0x50, 0x0, 0x1, {0x7, 0x1f, 0x0, 0xb0c00, 0x0, 0x0, 0x0, 0x5}}, 0x50) [ 172.907581][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 172.961362][ T7216] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 172.979479][ T7216] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.993036][ T7216] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 173.005851][ T7216] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 173.015970][ T7216] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 173.026536][ T7216] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 173.037418][ T7216] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 173.047954][ T7216] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 173.057849][ T7216] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 173.069687][ T7216] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 173.084044][ T7216] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 173.106391][ T7298] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 173.127459][ T7298] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 173.138357][ T7298] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 173.149923][ T7298] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 173.161342][ T7298] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 173.189037][ T7298] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 173.199486][ T7298] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 173.210208][ T7298] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 173.230777][ T7298] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 173.247840][ T2521] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 173.258194][ T2521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 173.274239][ T2521] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 173.291102][ T2521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 173.307575][ T7216] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 173.320359][ T7216] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 173.332437][ T7216] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 173.350914][ T7216] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 173.364039][ T7216] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 173.378947][ T7216] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 173.389808][ T7216] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 173.402382][ T7216] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 173.412820][ T7216] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 173.423523][ T7216] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 173.436715][ T7216] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 173.460734][ T2498] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 173.471402][ T2498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 173.562100][ T0] NOHZ: local_softirq_pending 08 14:51:11 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x1000}, 0x4) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) splice(r0, 0x0, r2, 0x0, 0x100000, 0x0) 14:51:12 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:51:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) timer_create(0x0, 0x0, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 14:51:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000040)=0x3, 0x2) 14:51:12 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) dup2(r0, r1) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 14:51:12 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000340)=0x203, 0x4) bind$inet(r0, &(0x7f0000000300)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x3) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x510) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000140)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x40, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x2) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYRES32], 0x100000530) 14:51:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000040)=0x3, 0x2) [ 174.344542][ T27] audit: type=1326 audit(1590331872.361:2): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=8256 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f86a code=0xffff0000 14:51:12 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 14:51:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) 14:51:12 executing program 0: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x100000001, 0x0, 0x28120001) [ 174.582102][ T27] audit: type=1326 audit(1590331872.601:3): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=8267 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f86a code=0xffff0000 14:51:12 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x81, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003c00)=""/200, 0xc8}, 0x20000}], 0x1, 0x10003, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept4$unix(r3, 0x0, &(0x7f0000000340), 0x80000) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x8842, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x1c24000}, 0x0, 0x400008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000100)="e669", 0x2}]) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$SO_TIMESTAMP(r4, 0x1, 0x1d, &(0x7f0000000180)=0x7fffffff, 0x4) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000003c80), 0x38e, 0x62, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x30, r4, 0x81e6c000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000340)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@ipv4={[], [], @local}, 0x4e20, 0x0, 0x10, 0x0, 0xa}, {0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {0x2000000000000, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x2, 0x80000000000001, 0x1}, {{@in6=@dev={0xfe, 0x80, [], 0x1f}, 0x0, 0xff}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x18}, 0x100000, 0x0, 0x0, 0x1, 0x7fffffff}}, 0xe8) sendmmsg(r5, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0xff00) socket$inet6(0xa, 0x803, 0x2) connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mount$fuse(0x0, 0x0, &(0x7f00000003c0)='fuse\x00', 0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB="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"]) 14:51:12 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x81, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003c00)=""/200, 0xc8}, 0x20000}], 0x1, 0x10003, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept4$unix(r3, 0x0, &(0x7f0000000340), 0x80000) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x8842, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x1c24000}, 0x0, 0x400008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000100)="e669", 0x2}]) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$SO_TIMESTAMP(r4, 0x1, 0x1d, &(0x7f0000000180)=0x7fffffff, 0x4) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000003c80), 0x38e, 0x62, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x30, r4, 0x81e6c000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000340)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@ipv4={[], [], @local}, 0x4e20, 0x0, 0x10, 0x0, 0xa}, {0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {0x2000000000000, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x2, 0x80000000000001, 0x1}, {{@in6=@dev={0xfe, 0x80, [], 0x1f}, 0x0, 0xff}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x18}, 0x100000, 0x0, 0x0, 0x1, 0x7fffffff}}, 0xe8) sendmmsg(r5, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0xff00) socket$inet6(0xa, 0x803, 0x2) connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mount$fuse(0x0, 0x0, &(0x7f00000003c0)='fuse\x00', 0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB="66647d8532b5adca72885e20265b56164fdac68de6fd46112acb9116c26d2f25557d6107c5e06bd06e9a7917897d75a28890cfa674b8796660c5bc0415afba2906e31b9ba599aaee1ad3fa78e1f07d43417cfc5ca4d15a69c0d0073cdf27e5a603eb3d5e3aa31c4199d2909e4ec05e184b9bea2cd66b74f0a559f35ed8aee69a93ac6df8c0b5820b720b7fdbe19a765f5479f045b71407884780d9eb0c0892554609a2f3578b8b935a2be40f11eaa2f653547e5c9b0800bb6f59eb1ed396fd389dfe11628bace821f4980d8b32c4040000006df04e785c7225363d97aca8014d49cadedc431b1115ba4e382ff18074aecd0000000000000000000000000000000000000001000092e7776ef0343cd043ba6b5e8430c2c96d9b0e70d1a9", @ANYRES32, @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 174.908936][ T8283] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 14:51:13 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x81, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003c00)=""/200, 0xc8}, 0x20000}], 0x1, 0x10003, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept4$unix(r3, 0x0, &(0x7f0000000340), 0x80000) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x8842, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x1c24000}, 0x0, 0x400008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000100)="e669", 0x2}]) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$SO_TIMESTAMP(r4, 0x1, 0x1d, &(0x7f0000000180)=0x7fffffff, 0x4) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000003c80), 0x38e, 0x62, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x30, r4, 0x81e6c000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000340)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@ipv4={[], [], @local}, 0x4e20, 0x0, 0x10, 0x0, 0xa}, {0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {0x2000000000000, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x2, 0x80000000000001, 0x1}, {{@in6=@dev={0xfe, 0x80, [], 0x1f}, 0x0, 0xff}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x18}, 0x100000, 0x0, 0x0, 0x1, 0x7fffffff}}, 0xe8) sendmmsg(r5, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0xff00) socket$inet6(0xa, 0x803, 0x2) connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mount$fuse(0x0, 0x0, &(0x7f00000003c0)='fuse\x00', 0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB="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"]) 14:51:13 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) dup2(r0, r1) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 14:51:13 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000340)=0x203, 0x4) bind$inet(r0, &(0x7f0000000300)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x3) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x510) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000140)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x40, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x2) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYRES32], 0x100000530) 14:51:13 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) dup2(r0, r1) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 175.049379][ T27] audit: type=1326 audit(1590331873.071:4): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=8256 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f86a code=0xffff0000 [ 175.166012][ T8300] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 175.374730][ T27] audit: type=1326 audit(1590331873.391:5): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=8267 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f86a code=0xffff0000 14:51:13 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x81, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003c00)=""/200, 0xc8}, 0x20000}], 0x1, 0x10003, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept4$unix(r3, 0x0, &(0x7f0000000340), 0x80000) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x8842, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x1c24000}, 0x0, 0x400008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000100)="e669", 0x2}]) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$SO_TIMESTAMP(r4, 0x1, 0x1d, &(0x7f0000000180)=0x7fffffff, 0x4) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000003c80), 0x38e, 0x62, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x30, r4, 0x81e6c000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000340)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@ipv4={[], [], @local}, 0x4e20, 0x0, 0x10, 0x0, 0xa}, {0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {0x2000000000000, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x2, 0x80000000000001, 0x1}, {{@in6=@dev={0xfe, 0x80, [], 0x1f}, 0x0, 0xff}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x18}, 0x100000, 0x0, 0x0, 0x1, 0x7fffffff}}, 0xe8) sendmmsg(r5, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0xff00) socket$inet6(0xa, 0x803, 0x2) connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mount$fuse(0x0, 0x0, &(0x7f00000003c0)='fuse\x00', 0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYRESDEC=0x0, @ANYBLOB="13ac6f7773a5be231315f5e00075705f69643dc2a407fea20d4d9718364a40f3703d9363c3193393ec196b0fed3cacaffba8f13e297737c6d214d90bfd731bc0c4f15cfc507579f159448a44dd0617c5a0d1e465b03ba5effb5e59a3efda3ed4b1c9ae9da38484cc5d4fc81fb18d142fc39697ef539d922fac06fe1d4c0a238dd32e517b04379910b38dd1059f59ba6060094082e2ef201538b1843973dd321d585b370af85ac4a74b41a0f7220e3c8f870bc76020371b2e68491e65e6733e44b33c6d7cb8260a84d7b0cbdb6572b2aa17abfddd05d7808298ba4ea93c976e3300010000809c4ed12514a09865311d55713547b022755a063b71f1bad57490ebd203964739a858dc5c5afcd5bfcf2c48c85138be3ec3778be3e0b09f52", @ANYRESDEC=0x0, @ANYBLOB="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"]) 14:51:13 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x81, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003c00)=""/200, 0xc8}, 0x20000}], 0x1, 0x10003, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept4$unix(r3, 0x0, &(0x7f0000000340), 0x80000) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x8842, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x1c24000}, 0x0, 0x400008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000100)="e669", 0x2}]) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$SO_TIMESTAMP(r4, 0x1, 0x1d, &(0x7f0000000180)=0x7fffffff, 0x4) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000003c80), 0x38e, 0x62, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x30, r4, 0x81e6c000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000340)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@ipv4={[], [], @local}, 0x4e20, 0x0, 0x10, 0x0, 0xa}, {0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {0x2000000000000, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x2, 0x80000000000001, 0x1}, {{@in6=@dev={0xfe, 0x80, [], 0x1f}, 0x0, 0xff}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x18}, 0x100000, 0x0, 0x0, 0x1, 0x7fffffff}}, 0xe8) sendmmsg(r5, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0xff00) socket$inet6(0xa, 0x803, 0x2) connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mount$fuse(0x0, 0x0, &(0x7f00000003c0)='fuse\x00', 0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB="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"]) 14:51:13 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x81, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003c00)=""/200, 0xc8}, 0x20000}], 0x1, 0x10003, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept4$unix(r3, 0x0, &(0x7f0000000340), 0x80000) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x8842, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x1c24000}, 0x0, 0x400008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000100)="e669", 0x2}]) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$SO_TIMESTAMP(r4, 0x1, 0x1d, &(0x7f0000000180)=0x7fffffff, 0x4) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000003c80), 0x38e, 0x62, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x30, r4, 0x81e6c000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000340)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@ipv4={[], [], @local}, 0x4e20, 0x0, 0x10, 0x0, 0xa}, {0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {0x2000000000000, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x2, 0x80000000000001, 0x1}, {{@in6=@dev={0xfe, 0x80, [], 0x1f}, 0x0, 0xff}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x18}, 0x100000, 0x0, 0x0, 0x1, 0x7fffffff}}, 0xe8) sendmmsg(r5, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0xff00) socket$inet6(0xa, 0x803, 0x2) connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mount$fuse(0x0, 0x0, &(0x7f00000003c0)='fuse\x00', 0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB="66647d8532b5adca72885e20265b56164fdac68de6fd46112acb9116c26d2f25557d6107c5e06bd06e9a7917897d75a28890cfa674b8796660c5bc0415afba2906e31b9ba599aaee1ad3fa78e1f07d43417cfc5ca4d15a69c0d0073cdf27e5a603eb3d5e3aa31c4199d2909e4ec05e184b9bea2cd66b74f0a559f35ed8aee69a93ac6df8c0b5820b720b7fdbe19a765f5479f045b71407884780d9eb0c0892554609a2f3578b8b935a2be40f11eaa2f653547e5c9b0800bb6f59eb1ed396fd389dfe11628bace821f4980d8b32c4040000006df04e785c7225363d97aca8014d49cadedc431b1115ba4e382ff18074aecd0000000000000000000000000000000000000001000092e7776ef0343cd043ba6b5e8430c2c96d9b0e70d1a9", @ANYRES32, @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 175.744134][ T8329] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 14:51:13 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) dup2(r0, r1) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 14:51:13 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x496]}, 0x45c) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000000700)=[{&(0x7f0000000140)=""/188, 0xbc}], 0x1, 0xffffffd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(r3) socket(0x840000000002, 0x3, 0x6) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x400102, 0x0) sendmsg$IPSET_CMD_PROTOCOL(r4, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x1, 0x6, 0x101, 0x0, 0x0, {0x2, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0xc891) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r3, &(0x7f0000006d00), 0x800000000000237, 0x0) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x12) ioctl$UI_DEV_CREATE(r1, 0x5501) 14:51:13 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x81, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003c00)=""/200, 0xc8}, 0x20000}], 0x1, 0x10003, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept4$unix(r3, 0x0, &(0x7f0000000340), 0x80000) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x8842, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x1c24000}, 0x0, 0x400008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000100)="e669", 0x2}]) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$SO_TIMESTAMP(r4, 0x1, 0x1d, &(0x7f0000000180)=0x7fffffff, 0x4) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000003c80), 0x38e, 0x62, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x30, r4, 0x81e6c000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000340)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@ipv4={[], [], @local}, 0x4e20, 0x0, 0x10, 0x0, 0xa}, {0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {0x2000000000000, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x2, 0x80000000000001, 0x1}, {{@in6=@dev={0xfe, 0x80, [], 0x1f}, 0x0, 0xff}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x18}, 0x100000, 0x0, 0x0, 0x1, 0x7fffffff}}, 0xe8) sendmmsg(r5, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0xff00) socket$inet6(0xa, 0x803, 0x2) connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mount$fuse(0x0, 0x0, &(0x7f00000003c0)='fuse\x00', 0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB="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"]) 14:51:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {}, 0x27}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r4 = open(&(0x7f0000000140)='./file0/../file0\x00', 0x141042, 0x1e1) sendfile(r4, r3, 0x0, 0x283) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) getsockname$packet(r3, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000600)=0x14) r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000040)={0x3}, 0x8, 0x0) msgsnd(r5, &(0x7f00000000c0)=ANY=[@ANYBLOB="95"], 0x1, 0x0) prctl$PR_GET_TSC(0x19, &(0x7f0000000000)) syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0)='l2tp\x00') setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) msgrcv(r5, &(0x7f0000000300)={0x0, ""/210}, 0xda, 0x3, 0x2000) msgctl$MSG_INFO(r5, 0xc, &(0x7f00000000c0)=""/142) 14:51:13 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x81, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003c00)=""/200, 0xc8}, 0x20000}], 0x1, 0x10003, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept4$unix(r3, 0x0, &(0x7f0000000340), 0x80000) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x8842, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x1c24000}, 0x0, 0x400008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000100)="e669", 0x2}]) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$SO_TIMESTAMP(r4, 0x1, 0x1d, &(0x7f0000000180)=0x7fffffff, 0x4) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000003c80), 0x38e, 0x62, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x30, r4, 0x81e6c000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000340)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@ipv4={[], [], @local}, 0x4e20, 0x0, 0x10, 0x0, 0xa}, {0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {0x2000000000000, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x2, 0x80000000000001, 0x1}, {{@in6=@dev={0xfe, 0x80, [], 0x1f}, 0x0, 0xff}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x18}, 0x100000, 0x0, 0x0, 0x1, 0x7fffffff}}, 0xe8) sendmmsg(r5, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0xff00) socket$inet6(0xa, 0x803, 0x2) connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mount$fuse(0x0, 0x0, &(0x7f00000003c0)='fuse\x00', 0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB="2c00841e921dff890900bc253046e6c84f0841f721095d5db8349ac23935996c062e9c89898bb67fb4aa19c9d2db16e43132d37ac0e297cb0fb0a7b952fc92fcb078b9e441599f231f8d409ef8ff22f12b9229482ec1347f0e9996a5e3418e8d2906dbf8264acf0e4a19b4cec64ac5fd62e4d167d7fb7b2641f3a8e30b7551b8d91f6c8dff86c88f41e751caa939eb8a0ccc42171713abd1432862052a1f1de64eac09b02cf478e40e0f8bdbc7c295aa400c801f1d37a5d154fe1f0c761c2817e56fa590c2bece9c00323443da8906d84f9275ac95aea767684b94943906e8b2a296d12c597bbefcdb1b458474620608f6d16316206eb4b3c1f6df015cafd339fcaa81178b5b3cdb87377b2e7b0dcc739abcaf0d3d09dc835c5b01ab362ae1631db7023665af22a99ea85f8b7f739f1da80ed79ad2e61a5c95983d016913ce06565d6d78a653e03b211ad3a41622741bc82bf2533e1045ccd763f2c27569d03a16db465d473f4afed7658bbfecde36769451fa08c83909da67664d0f41cf175eb7150c9f4a59bb619c000000000000000000"]) 14:51:14 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000340)=0x203, 0x4) bind$inet(r0, &(0x7f0000000300)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x3) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x510) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000140)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x40, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x2) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYRES32], 0x100000530) 14:51:14 executing program 2: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f00000004c0)='1', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000100)='\x00A6\xa9\xbbc\xb0\xf6\xda\x0e\xba\xe5\x91\x8f\xfb\x8dR\xac\x1f\xe9qB\xc7\x882\xb8\xf9\x1f9\xa7\xd1\xbb|\xceL\x81\xb3n\x0e\xa5\xde\xe1K\xf4\xc8.r\xff(\xcc\a,\n\x91_\xd5\xf0\xfe\xecz\t\xd2\xd0F\xe5\xba\xb9M\xd9\x8cWJ\xbc?\xda\x99\x1c_\xed,\frL\xf7\v\xafG\xa0\xf7\xd2\xdfU:\xf3\xd3\x8f\n\xaf]\xd0\xdd\xaat>\xc3.\x0e`\x85=\xd5#\xe7\x00\xdd\xb8\x9fC\x13?\xe4P\x02z\r\xab\x03\x83\x8460q\xb4\xe6@>\xd9;\"\x0f\xfd\x19\xa4\xb0\xe5z\xb6:P:\xdc\xbcH\xd3rq\xc4%\xe9\xb9\xa6E\xf4\x15\x7f\r\xd2\x1c\xca\xf58\x1e\xc6\xfb\xb5\xbf\xae\x82R=\xbb\xc6t\\%\'GK\x02\x98\xd3\xfe\xceB\'\x9b\xf6\xee\xb8.\xb3\xad\x9d\xbe\xac^E\xec\xbd\x8b_\xe0\xa2h\xa9}\'\xce1') 14:51:14 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x81, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003c00)=""/200, 0xc8}, 0x20000}], 0x1, 0x10003, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept4$unix(r3, 0x0, &(0x7f0000000340), 0x80000) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x8842, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x1c24000}, 0x0, 0x400008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000100)="e669", 0x2}]) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$SO_TIMESTAMP(r4, 0x1, 0x1d, &(0x7f0000000180)=0x7fffffff, 0x4) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000003c80), 0x38e, 0x62, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x30, r4, 0x81e6c000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000340)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@ipv4={[], [], @local}, 0x4e20, 0x0, 0x10, 0x0, 0xa}, {0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {0x2000000000000, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x2, 0x80000000000001, 0x1}, {{@in6=@dev={0xfe, 0x80, [], 0x1f}, 0x0, 0xff}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x18}, 0x100000, 0x0, 0x0, 0x1, 0x7fffffff}}, 0xe8) sendmmsg(r5, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0xff00) socket$inet6(0xa, 0x803, 0x2) connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mount$fuse(0x0, 0x0, &(0x7f00000003c0)='fuse\x00', 0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB="66647d8532b5adca72885e20265b56164fdac68de6fd46112acb9116c26d2f25557d6107c5e06bd06e9a7917897d75a28890cfa674b8796660c5bc0415afba2906e31b9ba599aaee1ad3fa78e1f07d43417cfc5ca4d15a69c0d0073cdf27e5a603eb3d5e3aa31c4199d2909e4ec05e184b9bea2cd66b74f0a559f35ed8aee69a93ac6df8c0b5820b720b7fdbe19a765f5479f045b71407884780d9eb0c0892554609a2f3578b8b935a2be40f11eaa2f653547e5c9b0800bb6f59eb1ed396fd389dfe11628bace821f4980d8b32c4040000006df04e785c7225363d97aca8014d49cadedc431b1115ba4e382ff18074aecd0000000000000000000000000000000000000001000092e7776ef0343cd043ba6b5e8430c2c96d9b0e70d1a9", @ANYRES32, @ANYRESDEC=0x0, @ANYBLOB="13ac6f7773a5be231315f5e00075705f69643dc2a407fea20d4d9718364a40f3703d9363c3193393ec196b0fed3cacaffba8f13e297737c6d214d90bfd731bc0c4f15cfc507579f159448a44dd0617c5a0d1e465b03ba5effb5e59a3efda3ed4b1c9ae9da38484cc5d4fc81fb18d142fc39697ef539d922fac06fe1d4c0a238dd32e517b04379910b38dd1059f59ba6060094082e2ef201538b1843973dd321d585b370af85ac4a74b41a0f7220e3c8f870bc76020371b2e68491e65e6733e44b33c6d7cb8260a84d7b0cbdb6572b2aa17abfddd05d7808298ba4ea93c976e3300010000809c4ed12514a09865311d55713547b022755a063b71f1bad57490ebd203964739a858dc5c5afcd5bfcf2c48c85138be3ec3778be3e0b09f52", @ANYRESDEC=0x0, @ANYBLOB="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"]) 14:51:14 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x81, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003c00)=""/200, 0xc8}, 0x20000}], 0x1, 0x10003, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept4$unix(r3, 0x0, &(0x7f0000000340), 0x80000) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x8842, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x1c24000}, 0x0, 0x400008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000100)="e669", 0x2}]) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$SO_TIMESTAMP(r4, 0x1, 0x1d, &(0x7f0000000180)=0x7fffffff, 0x4) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000003c80), 0x38e, 0x62, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x30, r4, 0x81e6c000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000340)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@ipv4={[], [], @local}, 0x4e20, 0x0, 0x10, 0x0, 0xa}, {0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {0x2000000000000, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x2, 0x80000000000001, 0x1}, {{@in6=@dev={0xfe, 0x80, [], 0x1f}, 0x0, 0xff}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x18}, 0x100000, 0x0, 0x0, 0x1, 0x7fffffff}}, 0xe8) sendmmsg(r5, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0xff00) socket$inet6(0xa, 0x803, 0x2) connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mount$fuse(0x0, 0x0, &(0x7f00000003c0)='fuse\x00', 0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 176.173586][ T8354] input: syz0 as /devices/virtual/input/input5 14:51:14 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x81, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003c00)=""/200, 0xc8}, 0x20000}], 0x1, 0x10003, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept4$unix(r3, 0x0, &(0x7f0000000340), 0x80000) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x8842, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x1c24000}, 0x0, 0x400008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000100)="e669", 0x2}]) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$SO_TIMESTAMP(r4, 0x1, 0x1d, &(0x7f0000000180)=0x7fffffff, 0x4) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000003c80), 0x38e, 0x62, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x30, r4, 0x81e6c000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000340)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@ipv4={[], [], @local}, 0x4e20, 0x0, 0x10, 0x0, 0xa}, {0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {0x2000000000000, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x2, 0x80000000000001, 0x1}, {{@in6=@dev={0xfe, 0x80, [], 0x1f}, 0x0, 0xff}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x18}, 0x100000, 0x0, 0x0, 0x1, 0x7fffffff}}, 0xe8) sendmmsg(r5, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0xff00) socket$inet6(0xa, 0x803, 0x2) connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 14:51:14 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) dup2(r0, r1) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 14:51:14 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) socket$packet(0x11, 0x0, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) splice(r0, 0x0, r2, 0x0, 0x100000, 0x0) [ 176.730782][ T8336] ================================================================== [ 176.739402][ T8336] BUG: KASAN: use-after-free in __mutex_lock+0x1033/0x13c0 [ 176.746745][ T8336] Read of size 8 at addr ffff8880688f8150 by task syz-executor.4/8336 [ 176.754949][ T8336] [ 176.757292][ T8336] CPU: 1 PID: 8336 Comm: syz-executor.4 Not tainted 5.7.0-rc6-next-20200522-syzkaller #0 [ 176.767112][ T8336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.778046][ T8336] Call Trace: [ 176.781495][ T8336] dump_stack+0x18f/0x20d [ 176.785868][ T8336] ? __mutex_lock+0x1033/0x13c0 [ 176.791338][ T8336] ? __mutex_lock+0x1033/0x13c0 [ 176.796207][ T8336] print_address_description.constprop.0.cold+0xd3/0x413 [ 176.803512][ T8336] ? cdev_device_del+0x69/0x80 [ 176.808288][ T8336] ? joydev_disconnect+0x3d/0xb0 [ 176.813240][ T8336] ? __input_unregister_device+0x1b0/0x430 [ 176.819067][ T8336] ? input_unregister_device+0xb4/0xf0 [ 176.824564][ T8336] ? uinput_destroy_device+0x1e2/0x240 [ 176.830039][ T8336] ? vprintk_func+0x97/0x1a6 [ 176.834666][ T8336] ? __mutex_lock+0x1033/0x13c0 [ 176.839534][ T8336] kasan_report.cold+0x1f/0x37 [ 176.844332][ T8336] ? __mutex_lock+0x1033/0x13c0 [ 176.849202][ T8336] __mutex_lock+0x1033/0x13c0 [ 176.853894][ T8336] ? joydev_cleanup+0x21/0x190 [ 176.858667][ T8336] ? print_usage_bug+0x240/0x240 [ 176.863619][ T8336] ? trace_hardirqs_off+0x50/0x220 [ 176.868748][ T8336] ? mutex_trylock+0x2c0/0x2c0 [ 176.873616][ T8336] ? mark_held_locks+0x9f/0xe0 [ 176.878396][ T8336] ? kfree+0x1eb/0x2b0 [ 176.882493][ T8336] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 176.888577][ T8336] ? kfree_const+0x51/0x60 [ 176.893015][ T8336] ? joydev_cleanup+0x21/0x190 [ 176.898758][ T8336] joydev_cleanup+0x21/0x190 [ 176.903478][ T8336] joydev_disconnect+0x45/0xb0 [ 176.908320][ T8336] __input_unregister_device+0x1b0/0x430 [ 176.913974][ T8336] input_unregister_device+0xb4/0xf0 [ 176.919364][ T8336] uinput_destroy_device+0x1e2/0x240 [ 176.924722][ T8336] ? uinput_destroy_device+0x240/0x240 [ 176.930205][ T8336] uinput_release+0x37/0x50 [ 176.934728][ T8336] __fput+0x33e/0x880 [ 176.938737][ T8336] task_work_run+0xf4/0x1b0 [ 176.943300][ T8336] exit_to_usermode_loop+0x2fa/0x360 [ 176.948600][ T8336] do_syscall_64+0x6b1/0x7d0 [ 176.953206][ T8336] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 176.959111][ T8336] RIP: 0033:0x416621 [ 176.963027][ T8336] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 176.982756][ T8336] RSP: 002b:00007ffc635bec30 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 176.991153][ T8336] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000416621 [ 176.999211][ T8336] RDX: 0000000000000000 RSI: 0000000000001638 RDI: 0000000000000004 [ 177.007252][ T8336] RBP: 0000000000000001 R08: 00000000178f3638 R09: 00000000178f363c [ 177.015214][ T8336] R10: 00007ffc635bed20 R11: 0000000000000293 R12: 000000000078c900 [ 177.023173][ T8336] R13: 000000000078c900 R14: ffffffffffffffff R15: 000000000078bfac [ 177.031141][ T8336] [ 177.033460][ T8336] Allocated by task 8354: [ 177.037773][ T8336] save_stack+0x1b/0x40 [ 177.041919][ T8336] __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 177.047549][ T8336] kmem_cache_alloc_trace+0x153/0x7d0 [ 177.052901][ T8336] joydev_connect+0x83/0xd2f [ 177.057622][ T8336] input_attach_handler+0x194/0x200 [ 177.062840][ T8336] input_register_device.cold+0xf5/0x246 [ 177.068550][ T8336] uinput_ioctl_handler.isra.0+0x1210/0x1d80 [ 177.074551][ T8336] ksys_ioctl+0x11a/0x180 [ 177.078864][ T8336] __x64_sys_ioctl+0x6f/0xb0 [ 177.083452][ T8336] do_syscall_64+0xf6/0x7d0 [ 177.087980][ T8336] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 177.094379][ T8336] [ 177.096709][ T8336] Freed by task 8336: [ 177.100687][ T8336] save_stack+0x1b/0x40 [ 177.104835][ T8336] __kasan_slab_free+0xf7/0x140 [ 177.109663][ T8336] kfree+0x109/0x2b0 [ 177.113539][ T8336] device_release+0x71/0x200 [ 177.118896][ T8336] kobject_put+0x1c8/0x2f0 [ 177.123308][ T8336] cdev_device_del+0x69/0x80 [ 177.127887][ T8336] joydev_disconnect+0x3d/0xb0 [ 177.132644][ T8336] __input_unregister_device+0x1b0/0x430 [ 177.138256][ T8336] input_unregister_device+0xb4/0xf0 [ 177.143521][ T8336] uinput_destroy_device+0x1e2/0x240 [ 177.148783][ T8336] uinput_release+0x37/0x50 [ 177.153269][ T8336] __fput+0x33e/0x880 [ 177.157240][ T8336] task_work_run+0xf4/0x1b0 [ 177.161722][ T8336] exit_to_usermode_loop+0x2fa/0x360 [ 177.166986][ T8336] do_syscall_64+0x6b1/0x7d0 [ 177.171569][ T8336] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 177.177538][ T8336] [ 177.179859][ T8336] The buggy address belongs to the object at ffff8880688f8000 [ 177.179859][ T8336] which belongs to the cache kmalloc-8k of size 8192 [ 177.193894][ T8336] The buggy address is located 336 bytes inside of [ 177.193894][ T8336] 8192-byte region [ffff8880688f8000, ffff8880688fa000) [ 177.208529][ T8336] The buggy address belongs to the page: [ 177.214162][ T8336] page:ffffea0001a23e00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 head:ffffea0001a23e00 order:2 compound_mapcount:0 compound_pincount:0 [ 177.229677][ T8336] flags: 0xfffe0000010200(slab|head) [ 177.234946][ T8336] raw: 00fffe0000010200 ffffea0001a22b08 ffffea000196ed08 ffff8880aa0021c0 [ 177.243956][ T8336] raw: 0000000000000000 ffff8880688f8000 0000000100000001 0000000000000000 [ 177.252513][ T8336] page dumped because: kasan: bad access detected [ 177.258986][ T8336] [ 177.261314][ T8336] Memory state around the buggy address: [ 177.266924][ T8336] ffff8880688f8000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 177.275244][ T8336] ffff8880688f8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 177.283467][ T8336] >ffff8880688f8100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 177.291685][ T8336] ^ [ 177.298341][ T8336] ffff8880688f8180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 177.306754][ T8336] ffff8880688f8200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 177.315060][ T8336] ================================================================== [ 177.323100][ T8336] Disabling lock debugging due to kernel taint [ 177.638177][ T8336] Kernel panic - not syncing: panic_on_warn set ... [ 177.645805][ T8336] CPU: 0 PID: 8336 Comm: syz-executor.4 Tainted: G B 5.7.0-rc6-next-20200522-syzkaller #0 [ 177.657090][ T8336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.667231][ T8336] Call Trace: [ 177.670521][ T8336] dump_stack+0x18f/0x20d [ 177.675114][ T8336] ? __mutex_lock+0xf50/0x13c0 [ 177.679963][ T8336] panic+0x2e3/0x75c [ 177.683858][ T8336] ? __warn_printk+0xf3/0xf3 [ 177.688454][ T8336] ? preempt_schedule_common+0x5e/0xc0 [ 177.693912][ T8336] ? __mutex_lock+0x1033/0x13c0 [ 177.698760][ T8336] ? __mutex_lock+0x1033/0x13c0 [ 177.703611][ T8336] ? preempt_schedule_thunk+0x16/0x18 [ 177.708999][ T8336] ? trace_hardirqs_on+0x55/0x230 [ 177.714020][ T8336] ? __mutex_lock+0x1033/0x13c0 [ 177.718896][ T8336] ? __mutex_lock+0x1033/0x13c0 [ 177.723772][ T8336] end_report+0x4d/0x53 [ 177.727928][ T8336] kasan_report.cold+0xd/0x37 [ 177.732606][ T8336] ? __mutex_lock+0x1033/0x13c0 [ 177.737462][ T8336] __mutex_lock+0x1033/0x13c0 [ 177.742137][ T8336] ? joydev_cleanup+0x21/0x190 [ 177.746899][ T8336] ? print_usage_bug+0x240/0x240 [ 177.751945][ T8336] ? trace_hardirqs_off+0x50/0x220 [ 177.757050][ T8336] ? mutex_trylock+0x2c0/0x2c0 [ 177.761887][ T8336] ? mark_held_locks+0x9f/0xe0 [ 177.766759][ T8336] ? kfree+0x1eb/0x2b0 [ 177.770833][ T8336] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 177.776820][ T8336] ? kfree_const+0x51/0x60 [ 177.781271][ T8336] ? joydev_cleanup+0x21/0x190 [ 177.786037][ T8336] joydev_cleanup+0x21/0x190 [ 177.790634][ T8336] joydev_disconnect+0x45/0xb0 [ 177.795400][ T8336] __input_unregister_device+0x1b0/0x430 [ 177.801039][ T8336] input_unregister_device+0xb4/0xf0 [ 177.807195][ T8336] uinput_destroy_device+0x1e2/0x240 [ 177.812482][ T8336] ? uinput_destroy_device+0x240/0x240 [ 177.817941][ T8336] uinput_release+0x37/0x50 [ 177.822443][ T8336] __fput+0x33e/0x880 [ 177.826427][ T8336] task_work_run+0xf4/0x1b0 [ 177.830933][ T8336] exit_to_usermode_loop+0x2fa/0x360 [ 177.836220][ T8336] do_syscall_64+0x6b1/0x7d0 [ 177.840812][ T8336] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 177.846702][ T8336] RIP: 0033:0x416621 [ 177.850594][ T8336] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 177.870287][ T8336] RSP: 002b:00007ffc635bec30 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 177.879133][ T8336] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000416621 [ 177.887193][ T8336] RDX: 0000000000000000 RSI: 0000000000001638 RDI: 0000000000000004 [ 177.895163][ T8336] RBP: 0000000000000001 R08: 00000000178f3638 R09: 00000000178f363c [ 177.903308][ T8336] R10: 00007ffc635bed20 R11: 0000000000000293 R12: 000000000078c900 [ 177.911427][ T8336] R13: 000000000078c900 R14: ffffffffffffffff R15: 000000000078bfac [ 177.920998][ T8336] Kernel Offset: disabled [ 177.925373][ T8336] Rebooting in 86400 seconds..