[ 59.282193][ T26] audit: type=1800 audit(1572338685.924:25): pid=8684 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 59.303639][ T26] audit: type=1800 audit(1572338685.924:26): pid=8684 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 59.346615][ T26] audit: type=1800 audit(1572338685.924:27): pid=8684 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 60.012247][ T8749] sshd (8749) used greatest stack depth: 22888 bytes left [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.137' (ECDSA) to the list of known hosts. 2019/10/29 08:44:55 fuzzer started 2019/10/29 08:44:58 dialing manager at 10.128.0.26:35103 2019/10/29 08:44:58 syscalls: 2541 2019/10/29 08:44:58 code coverage: enabled 2019/10/29 08:44:58 comparison tracing: enabled 2019/10/29 08:44:58 extra coverage: extra coverage is not supported by the kernel 2019/10/29 08:44:58 setuid sandbox: enabled 2019/10/29 08:44:58 namespace sandbox: enabled 2019/10/29 08:44:58 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/29 08:44:58 fault injection: enabled 2019/10/29 08:44:58 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/29 08:44:58 net packet injection: enabled 2019/10/29 08:44:58 net device setup: enabled 2019/10/29 08:44:58 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 08:46:38 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000040)) ioctl$USBDEVFS_SETINTERFACE(r0, 0x5514, 0x0) syzkaller login: [ 172.195571][ T8851] IPVS: ftp: loaded support on port[0] = 21 08:46:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)={0x1, 0x0, [{0xc0000101}]}) [ 172.350175][ T8851] chnl_net:caif_netlink_parms(): no params data found [ 172.395735][ T8851] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.403876][ T8851] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.412241][ T8851] device bridge_slave_0 entered promiscuous mode [ 172.421007][ T8851] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.428358][ T8851] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.436318][ T8851] device bridge_slave_1 entered promiscuous mode [ 172.459703][ T8851] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 172.471123][ T8851] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 172.494650][ T8851] team0: Port device team_slave_0 added [ 172.504127][ T8851] team0: Port device team_slave_1 added 08:46:39 executing program 2: socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/kcm\x00\b\x00\'\xde7znT\r\x1cc\x14=\xd5=_w_\xc8\xa8\x97i\xc8\"\x92\x89{\x90e\x97\x88\xd3\xe4\xf7y\'\x1b\xa7(\x87\x92X\xabK4\xca\xac\xe0P\x99\xa5\xcfB\x88\x03\x14\xae\xa2\xbfG\xe4\x12\xcd\xfe\rIG\xe3Vm\xed\xa2\xb5\x1a\xa4\x18)[[i\xa1\x0eq\xe2\xfe\xf2\xe5\xac\x88\x04\xba`\xac>z\x92S\x89E^Wv\x1brJx\xe9\xa8\x06t\x13%\"N]~\x00IA\x18\xa4\x86\xb6\xad2\x81J8O\xb4)\x89\x14\xd4\x8d\xf7\x85\xeb\x00\x00\x00\x00\x00\x00\x00\x02\xf3\ap|!\x97\x18R\xfc\r\x00\x00\x19\x00\x00\x00\xf9\xb0?s\x8cg\xdf\xc2X8\xfc\x7f\xff\xa5\x86\xf7\xe4d\xe3J\x88s\xf9F\xac\x02V\xaf\xe8\xcfG.\xa8\x03sRU\xa2\xbf\xb7\xe4\x8d\xc24\xdc\xf1\xd7x\xef\xd4\xda\xbc>a\xc3\xb7\x19\xc5\xa3y\xf53\xf2,\x83\xd7 \xd1a\xcd\xbd/\xaf\x03\xd6\nP\xc5\x8f+\x04\f`?^-*\xf5j\r\xed\t\x00\xd5]5`\xf2S\xa7\xcc\xf5Z\xbc\xf3e\x83\xa2\xe0jUq%\x99\xa0\xac&[\xa8\xde8\xfb9\xe0\x02\xc9$\xbd?\xac\x984\xe6xY\x7f\x1cT\x87$\f\x91|\xd8\xa6\xf6\xb7\x16\xb2\xf4\xeec') preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/106, 0x6a}], 0x1, 0x272) [ 172.523873][ T8854] IPVS: ftp: loaded support on port[0] = 21 [ 172.580085][ T8851] device hsr_slave_0 entered promiscuous mode [ 172.637287][ T8851] device hsr_slave_1 entered promiscuous mode [ 172.704259][ T8856] IPVS: ftp: loaded support on port[0] = 21 08:46:39 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x8, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="08000000000000000a00000000000000ff010000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000a004e2200000009fe8000000000000000000000000000bb47820000000000000000000000ad6d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2200000008fe880000000000000000000000000001ffffffff00000000000000000000000000000000000000796c91bd38ba17fd663000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f1000000000000000000000000000000000000000000000000000096e6000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0000000000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000a000e0000000000fe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000fe8000000000000000000000000000bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000200000000a00000000000000fe8000000000000000000000ebffffba00000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff02000000000000000000000000000100000000000089bf250c000000000000000000000000000000000000000000000000000000000000000000000000001e000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000022150c46cad76bd3e58096296bc47c9595a5e158ac4f66af5bf8a7d89bc7c5c489237de4bce41fa16e76365f5e5d60f6489e92fdeec3046434862cea0bb5adad7d78e4e5af75ba33c9a17ef936d454239833be1690473efc45bd97bd914466560af6554a58"], 0x490) [ 172.827935][ T8851] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.835232][ T8851] bridge0: port 2(bridge_slave_1) entered forwarding state [ 172.843109][ T8851] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.850265][ T8851] bridge0: port 1(bridge_slave_0) entered forwarding state [ 172.973058][ T8854] chnl_net:caif_netlink_parms(): no params data found [ 173.099528][ T8854] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.107154][ T8854] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.114923][ T8854] device bridge_slave_0 entered promiscuous mode [ 173.128773][ T8854] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.136758][ T8854] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.144543][ T8854] device bridge_slave_1 entered promiscuous mode [ 173.160522][ T8859] IPVS: ftp: loaded support on port[0] = 21 [ 173.173648][ T8856] chnl_net:caif_netlink_parms(): no params data found 08:46:39 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000000c0)=@ipx, 0x80, 0x0}}], 0x3fffffffffffe7e, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\x03\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\t\x870xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x6, 0x0) write$P9_RWSTAT(r1, &(0x7f00000000c0)={0x32d}, 0x6) [ 177.913870][ T8865] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 177.921655][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 177.935399][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 177.985693][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 178.001222][ T3021] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.008361][ T3021] bridge0: port 1(bridge_slave_0) entered forwarding state [ 178.066377][ T8866] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 178.074577][ T8866] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 178.088550][ T8866] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 178.098656][ T8866] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.105714][ T8866] bridge0: port 2(bridge_slave_1) entered forwarding state [ 178.113482][ T8866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 178.122487][ T8866] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 178.146641][ T8933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 178.155692][ T8933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 178.165612][ T8933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 178.181768][ T8933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 178.195257][ T8933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 178.204192][ T8933] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 178.214754][ T8933] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 178.228749][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 178.237788][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 178.261612][ T8862] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 178.282042][ T8969] mmap: syz-executor.5 (8969): VmData 18542592 exceed data ulimit 1118. Update limits or use boot option ignore_rlimit_data. [ 178.314243][ T8862] 8021q: adding VLAN 0 to HW filter on device batadv0 08:46:45 executing program 1: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0xfeca}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) lstat(0x0, 0x0) socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000134000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) syz_open_dev$vcsa(0x0, 0x0, 0x222a6d8102856fd9) socket$inet6(0xa, 0x1000000000002, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r2 = socket$kcm(0xa, 0x122000000003, 0x11) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)}, 0x0) r3 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="d9090000768606681d012f6a9c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7d8a295b90bf9cc8578ec03a10c48d1e004000000010400006608", 0x47}], 0x1}, 0x0) socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f0000000000), 0x306) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000400)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000140)}], 0x1}, 0x0) r4 = socket$kcm(0xa, 0x122000000003, 0x11) sendmsg$kcm(r4, &(0x7f0000000080)={&(0x7f0000000400)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, 0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYPTR64=&(0x7f0000000540)=ANY=[], @ANYRES16], 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000004c0)={0x0, 0xfff}, 0x8) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r5 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r5) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000003c0)={0x2, 'netdevsim0\x00', 0x1}, 0x18) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r7 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r7, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r7) sendfile(r0, r6, 0x0, 0x102000002) 08:46:45 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000000c0)=@ipx, 0x80, 0x0}}], 0x3fffffffffffe7e, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\x03\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\t\x870xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x6, 0x0) write$P9_RWSTAT(r1, &(0x7f00000000c0)={0x32d}, 0x6) 08:46:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000011ff0)={0x2, 0x4e20, @dev}, 0x10) listen(r0, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @multicast2}, 0x10) listen(r1, 0x0) 08:46:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000001140)="8be571ccc6deb1796405b883ef4b0fa7", 0x10}], 0x1, &(0x7f0000000340)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0x7ffff000}], 0x1}}], 0x2a, 0x0, 0x0) 08:46:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x6, 0x0) write$P9_RWSTAT(r1, &(0x7f00000000c0)={0x32d}, 0x6) 08:46:45 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000000c0)=@ipx, 0x80, 0x0}}], 0x3fffffffffffe7e, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\x03\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\t\x870xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x6, 0x0) write$P9_RWSTAT(r1, &(0x7f00000000c0)={0x32d}, 0x6) 08:46:45 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000000c0)=@ipx, 0x80, 0x0}}], 0x3fffffffffffe7e, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\x03\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\t\x870xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 08:46:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreq(r0, 0x0, 0xc, 0x0, 0x0) 08:46:46 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0xe1002, 0x0) write$9p(r1, &(0x7f0000000140)="0600000000000000c9b9000f06000000001ff7adf576f3790f68bc2c197cbf8d63735a09ab8383afd2de1a5587fe067f00002000249e1dabddb514480a169fc72518f833b3aacfcf04f7b0bdd78687fc006bff51b9f9218a249e3d00000000000000000000000053", 0x68) 08:46:46 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004020000000000"], 0x0, 0x26}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000040)={0x5, 0x2, 0x2, 0x7, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r0, 0x0, 0x1}, 0x3c) 08:46:46 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000000)=0x80a0, 0x1) r1 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r1, 0x0, 0x5, &(0x7f0000000000)=0x80a0, 0x1) [ 179.610394][ T9040] dlm: no locking on control device 08:46:46 executing program 4: io_setup(0x9, &(0x7f0000000180)=0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000000440)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) 08:46:46 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000b67000), &(0x7f0000000000)=0x4) 08:46:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_GET_INFO(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x200089c0) accept$inet6(r4, 0x0, 0x0) 08:46:46 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 08:46:46 executing program 0: prctl$PR_SET_SECUREBITS(0x1c, 0x5) setresuid(0x0, 0xee01, 0x0) getgroups(0x2, &(0x7f0000000100)=[0xffffffffffffffff, 0xee00]) setgroups(0x2, &(0x7f0000000340)=[0x0, r0]) syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) 08:46:46 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0/file0\x00', r2}, 0x10) 08:46:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_GET_INFO(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x200089c0) accept$inet6(r4, 0x0, 0x0) 08:46:46 executing program 4: io_setup(0x9, &(0x7f0000000180)=0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000000440)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) 08:46:46 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 08:46:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x80814, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:46:46 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0/file0\x00', r2}, 0x10) 08:46:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_GET_INFO(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x200089c0) accept$inet6(r4, 0x0, 0x0) 08:46:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000440)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd000000070001000b081000414900000004fcff", 0x58}], 0x1) 08:46:46 executing program 4: io_setup(0x9, &(0x7f0000000180)=0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000000440)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) 08:46:46 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@typedef={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f00000003c0)=""/236, 0x29, 0xec, 0x1}, 0x20) 08:46:47 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 08:46:47 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0/file0\x00', r2}, 0x10) 08:46:47 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r2 = socket$inet6(0xa, 0x80003, 0xff) dup2(r1, r2) 08:46:47 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_GET_INFO(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x200089c0) accept$inet6(r4, 0x0, 0x0) 08:46:47 executing program 4: io_setup(0x9, &(0x7f0000000180)=0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000000440)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) 08:46:47 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup.cpu\x00\x97\xebH\x88N\x81CxA\xdb\xa6\xfd*\xb6mY\xb8\xac\xc3\x94TD\xb3\xca\x135\xcf7\xab\xb9\xee\x8e\x89\x94#\x83\xb3\xfcC\x80\xc38\'\x12\')\xb3\x19\x18\x11\xceD\a\xf2\xe1\x86\x84F\x88O\xf5V\x90_\x10$o;\xa9[\x185\x92{/\x99\x8d*<\x98 \xb2G\xf4?g3.\xb9\v\x96\x9b~\x90B*\x0f\x93y\n\xd8-\xc11\xa2\t\x00\x00\x00\x00\x00\x00\x00\xa8\xef\x17\x83vY\x82\xa62V\x87(\x8c\x8c4[\x1c\x99\x98\x96\x89\xf4\x861\xb9\x8e\xf2(\x8dC\xb3pd\xda\xcbK\xcaz\xcd\xa3\x88dH\x8a\xf3m\xad\x9e\xd9\x1d@r\xc2\x95w\x80\x83:\x8e \x10\x15\xc4\xcf\xefPT.[\xb5\xf9\x86/pD\b\xcf;n+\rxi\x91\xc1\fw\x95\xc7>\x8d\xb7\xafY\x9a\x06\x87;G\xbc\xd2\x01\x00\x00\x00C\xb9\xcc\"\xe5\x91E\xe9\xfd\x86`\xf8\xd3\xbd\xe4\xa2>=Z\xa5\x9fU6cf\a\xb1\xbd\x8a\xcf\x13\x03\x87[(\x95\xf7\xcf\xf0\xabJ\x85a:\'ah\x7f\xf0\x8b\xf5\xf2\xcf`g\xa7>\xb2\xf8ND;e\x06y@\xc3\xb5\xb3\xef\xa8=f\xf11\xddGL\x18s\xb3$\xa9\xc8s\b0\xc6{\x8b\x18o/\x7f\xa2\x87', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x1) 08:46:47 executing program 0: r0 = semget$private(0x0, 0x20000000102, 0x0) semop(r0, &(0x7f0000000100)=[{0x0, 0xc14}, {}], 0x108) semctl$GETZCNT(r0, 0x0, 0xf, 0x0) 08:46:47 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0/file0\x00', r2}, 0x10) 08:46:47 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f00000000c0)=@ethtool_link_settings={0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) 08:46:47 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, 0x0) 08:46:47 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r0]) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='autofs\x00', 0x0, &(0x7f0000000200)) 08:46:47 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000200), 0x1a7) write$UHID_CREATE(r0, &(0x7f00000004c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00\x00\x00\x00\xf1\xff\xff\xff\x00', &(0x7f0000000100)=""/183, 0xb7}, 0x120) write$UHID_INPUT2(r0, &(0x7f00000011c0), 0x6) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000080), 0xc) 08:46:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000180)={'veth1_to_hsr\x00', &(0x7f00000001c0)=@ethtool_drvinfo={0x3, "747a161d2b23178f373b2541615e257e94647b0f89d06dc42d3eb053c3b39df0", "c534454690775a10033b2a6f781339efcc754a7f39b4ba67ebdfc82128948cc3", "e76ad0b753c70596f3763692ed6e8ce94607ccbb2b9fa54f72992068e75ed031", "8363071d3d47fa773641ad2b53a66e0bccf5ba83c8003cfc9bf5ffa27b55d304", "6893775d464546ea9a57bbc8dc85b2d1d32df1d4dce2edc1665cb95cb25d2310", "9768beb64116147fc6d2b1a7"}}) [ 180.857742][ T12] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 180.873891][ T9145] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 180.873891][ T9145] The task syz-executor.0 (9145) triggered the difference, watch for misbehavior. [ 180.895623][ T12] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 180.919132][ T12] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 180.937425][ T12] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 180.945311][ T12] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 180.954919][ T9148] autofs4:pid:9148:autofs_fill_super: called with bogus options 08:46:47 executing program 2: socket$packet(0x11, 0x2, 0x300) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x4) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x400442c8, &(0x7f0000000040)={0x3, 0x0}) [ 180.963543][ T12] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 180.963573][ T12] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 180.963592][ T12] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 180.963613][ T12] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 08:46:47 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000001c0)) [ 181.052053][ T12] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 181.091430][ T12] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 08:46:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, 0x0) mount$9p_rdma(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001b40)=ANY=[]) getresgid(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) recvmsg(r0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x14, 0x2, [@IFLA_BOND_AD_ACTOR_SYS_PRIO={0x8, 0x18, 0x3f}, @IFLA_BOND_MODE={0x8, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x0, 0x300) 08:46:47 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x53a, 0x3ff, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/kvm\x00', 0x40000, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-generic\x00'}, 0x58) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000140), 0xfffffffffffffe88) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f00000000c0)=@req={0x30a, 0x0, 0x0, 0x7}, 0x10) fcntl$getown(r2, 0x9) read(r0, &(0x7f0000000400)=""/168, 0x41c) r3 = mq_open(&(0x7f0000000300)='\x04\x00\x00\x00\x92\r\x00\x00\x10\x00.\x16\xe8\xc2p\x12v\xc5\x92\xbf\xbd\xca\x19\x1bw|E\xb7m\xd2', 0x6eb3ebbbcc0884f2, 0x0, 0x0) mq_notify(r3, &(0x7f00000001c0)) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x4000) mq_timedsend(r3, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x10000003, 0x0, 0xc8f8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r2, &(0x7f00000110c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000002a40)={0x0, 0x0, &(0x7f0000002a00)}, &(0x7f0000002a80)=0xc) syz_extract_tcp_res(&(0x7f0000000340), 0x20000000000005, 0x1f) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r5, &(0x7f00000003c0), &(0x7f0000000200)=""/208}, 0x18) mq_notify(r3, &(0x7f0000002940)={0x0, 0x2000003f, 0x0, @thr={&(0x7f0000002800)="af66bfe98e95b8cc6a3dced16eb4f5f7e6490cfed992463a3a03faeae42fd6c34280bb44a5e1e56ec8fa0c59ad9a3baa971b39a11fd6c410d7b51bec30ca0523dbebed287de315c9ffb166a5aba7ade4d4df4f26cdeeda59bd7da10798a29832f9de04b603b3c1421976ca57f56ac67df7d67bf9e5da6560ed2ee1132032", 0x0}}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000700)={0x5, 0x4d77, 0x5, 'queue1\x00'}) setsockopt$inet_udp_encap(r3, 0x11, 0x64, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r6 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r6) mkdirat(r6, &(0x7f0000000180)='./file1\x00', 0x0) unlinkat(r6, &(0x7f0000000300)='./file1\x00', 0x200) getsockopt$inet_sctp6_SCTP_RTOINFO(r6, 0x84, 0x0, &(0x7f0000000100)={r4, 0x7, 0x0, 0x7}, &(0x7f00000004c0)=0x10) bind$alg(0xffffffffffffffff, 0x0, 0x0) [ 181.127380][ T12] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz1 [ 181.193044][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 08:46:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x1001000004e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = accept(r0, 0x0, 0x0) write(r1, &(0x7f0000000100), 0x1ede5) shutdown(r1, 0x2) sendto$packet(r2, &(0x7f0000000040)='u', 0x34000, 0x0, 0x0, 0x0) [ 181.256788][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 181.313946][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 181.334102][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 181.367313][ T9169] netlink: 'syz-executor.1': attribute type 24 has an invalid length. [ 181.393714][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 181.407818][ T9169] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 181.432662][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 181.451735][ T9169] INFO: trying to register non-static key. [ 181.457948][ T9169] the code is fine but needs lockdep annotation. [ 181.464376][ T9169] turning off the locking correctness validator. [ 181.470976][ T9169] CPU: 0 PID: 9169 Comm: syz-executor.1 Not tainted 5.4.0-rc5-next-20191028 #0 [ 181.473039][ T3919] kobject: 'loop3' (00000000c364349c): kobject_uevent_env [ 181.479900][ T9169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.479905][ T9169] Call Trace: [ 181.479925][ T9169] dump_stack+0x172/0x1f0 [ 181.479944][ T9169] register_lock_class+0x179e/0x1850 [ 181.479963][ T9169] ? is_dynamic_key+0x1c0/0x1c0 [ 181.491826][ T3919] kobject: 'loop3' (00000000c364349c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 181.497130][ T9169] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 181.497145][ T9169] ? stack_depot_save+0x25a/0x450 [ 181.497156][ T9169] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 181.497170][ T9169] ? lockdep_hardirqs_on+0x421/0x5e0 [ 181.497182][ T9169] __lock_acquire+0xf4/0x4a00 [ 181.497194][ T9169] ? __kasan_check_read+0x11/0x20 [ 181.497210][ T9169] ? mark_lock+0xc2/0x1220 [ 181.561642][ T9169] ? stack_depot_save+0x25a/0x450 [ 181.566691][ T9169] ? mark_held_locks+0xf0/0xf0 [ 181.571483][ T9169] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 181.576940][ T9169] ? lockdep_hardirqs_on+0x421/0x5e0 [ 181.582287][ T9169] ? retint_kernel+0x2b/0x2b [ 181.587050][ T9169] ? trace_hardirqs_on_caller+0x6a/0x240 [ 181.592717][ T9169] lock_acquire+0x190/0x410 [ 181.597403][ T9169] ? bond_3ad_update_ad_actor_settings+0x37b/0x7b0 [ 181.603909][ T9169] _raw_spin_lock_bh+0x33/0x50 [ 181.608670][ T9169] ? bond_3ad_update_ad_actor_settings+0x37b/0x7b0 [ 181.615173][ T9169] bond_3ad_update_ad_actor_settings+0x37b/0x7b0 [ 181.621504][ T9169] ? bond_3ad_bind_slave+0x12e0/0x12e0 [ 181.626963][ T9169] bond_option_ad_actor_sys_prio_set+0x67/0x80 [ 181.633116][ T9169] __bond_opt_set+0x2a1/0x540 [ 181.637788][ T9169] bond_changelink+0x14ed/0x1bd0 [ 181.642718][ T9169] ? memset+0x32/0x40 [ 181.646697][ T9169] ? bond_slave_changelink+0x1e0/0x1e0 [ 181.652156][ T9169] bond_newlink+0x2d/0x90 [ 181.656480][ T9169] ? bond_changelink+0x1bd0/0x1bd0 [ 181.661585][ T9169] __rtnl_newlink+0x10a1/0x16e0 [ 181.666435][ T9169] ? rtnl_link_unregister+0x250/0x250 [ 181.671813][ T9169] ? is_bpf_text_address+0xce/0x160 [ 181.677016][ T9169] ? kernel_text_address+0x73/0xf0 [ 181.682149][ T9169] ? unwind_get_return_address+0x61/0xa0 [ 181.687781][ T9169] ? profile_setup.cold+0xbb/0xbb [ 181.692825][ T9169] ? arch_stack_walk+0x97/0xf0 [ 181.697593][ T9169] ? stack_trace_save+0xac/0xe0 [ 181.702442][ T9169] ? stack_trace_consume_entry+0x190/0x190 [ 181.708252][ T9169] ? save_stack+0x5c/0x90 [ 181.712578][ T9169] ? save_stack+0x23/0x90 [ 181.716903][ T9169] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 181.722702][ T9169] ? kasan_kmalloc+0x9/0x10 [ 181.727210][ T9169] ? kmem_cache_alloc_trace+0x158/0x790 [ 181.732800][ T9169] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 181.738294][ T9169] ? retint_kernel+0x2b/0x2b [ 181.742887][ T9169] rtnl_newlink+0x69/0xa0 [ 181.747215][ T9169] ? __rtnl_newlink+0x16e0/0x16e0 [ 181.752245][ T9169] rtnetlink_rcv_msg+0x45e/0xaf0 [ 181.757197][ T9169] ? rtnl_bridge_getlink+0x910/0x910 [ 181.762482][ T9169] ? lock_release+0x4c0/0x960 [ 181.767156][ T9169] netlink_rcv_skb+0x177/0x450 [ 181.771917][ T9169] ? rtnl_bridge_getlink+0x910/0x910 [ 181.777201][ T9169] ? netlink_ack+0xb50/0xb50 [ 181.781786][ T9169] ? __rcu_read_unlock+0x220/0x6b0 [ 181.786892][ T9169] ? __kasan_check_read+0x11/0x20 [ 181.791915][ T9169] ? netlink_deliver_tap+0x24a/0xbe0 [ 181.797196][ T9169] rtnetlink_rcv+0x1d/0x30 [ 181.801605][ T9169] netlink_unicast+0x531/0x710 [ 181.806364][ T9169] ? netlink_attachskb+0x7c0/0x7c0 [ 181.811476][ T9169] ? _copy_from_iter_full+0x25d/0x8c0 [ 181.816843][ T9169] netlink_sendmsg+0x8cf/0xda0 [ 181.821636][ T9169] ? netlink_unicast+0x710/0x710 [ 181.826568][ T9169] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 181.832107][ T9169] ? apparmor_socket_sendmsg+0x2a/0x30 [ 181.837568][ T9169] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 181.843806][ T9169] ? security_socket_sendmsg+0x8d/0xc0 [ 181.849258][ T9169] ? netlink_unicast+0x710/0x710 [ 181.854205][ T9169] sock_sendmsg+0xd7/0x130 [ 181.858620][ T9169] ___sys_sendmsg+0x803/0x920 [ 181.863385][ T9169] ? copy_msghdr_from_user+0x440/0x440 [ 181.868852][ T9169] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 181.874396][ T9169] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 181.879857][ T9169] ? lockdep_hardirqs_on+0x421/0x5e0 [ 181.885148][ T9169] ? retint_kernel+0x2b/0x2b [ 181.889742][ T9169] ? trace_hardirqs_on_caller+0x6a/0x240 [ 181.895380][ T9169] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 181.900837][ T9169] ? __this_cpu_preempt_check+0x35/0x190 [ 181.906466][ T9169] ? retint_kernel+0x2b/0x2b [ 181.911075][ T9169] ? sockfd_lookup_light+0x78/0x180 [ 181.916291][ T9169] ? __sanitizer_cov_trace_pc+0x32/0x50 [ 181.921838][ T9169] __sys_sendmsg+0x105/0x1d0 [ 181.926432][ T9169] ? __sys_sendmsg_sock+0xd0/0xd0 08:46:48 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) socketpair(0x0, 0x0, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100068, 0x500001c) close(0xffffffffffffffff) 08:46:48 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000001c0)) [ 181.931494][ T9169] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 181.936951][ T9169] ? do_syscall_64+0x26/0x760 [ 181.941622][ T9169] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 181.947690][ T9169] ? do_syscall_64+0x26/0x760 [ 181.952374][ T9169] __x64_sys_sendmsg+0x78/0xb0 [ 181.957141][ T9169] do_syscall_64+0xfa/0x760 [ 181.961661][ T9169] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 181.965132][ T3919] kobject: 'loop0' (00000000259ce27f): kobject_uevent_env [ 181.967549][ T9169] RIP: 0033:0x459f49 [ 181.967563][ T9169] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 181.967568][ T9169] RSP: 002b:00007f0e3f11ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 181.967580][ T9169] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f49 [ 181.967586][ T9169] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000007 [ 181.967593][ T9169] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 08:46:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x1001000004e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = accept(r0, 0x0, 0x0) write(r1, &(0x7f0000000100), 0x1ede5) shutdown(r1, 0x2) sendto$packet(r2, &(0x7f0000000040)='u', 0x34000, 0x0, 0x0, 0x0) 08:46:48 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000001c0)) [ 181.967600][ T9169] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0e3f11f6d4 [ 181.967607][ T9169] R13: 00000000004c8338 R14: 00000000004de608 R15: 00000000ffffffff [ 181.986583][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.107914][ T3919] kobject: 'loop0' (00000000259ce27f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 182.110706][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 182.110719][ T26] audit: type=1804 audit(1572338808.754:31): pid=9189 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir127179527/syzkaller.CruDua/15/memory.events" dev="sda1" ino=16572 res=1 [ 182.153054][ T9169] kobject: 'bond1' (00000000ebb06d48): kobject_add_internal: parent: 'net', set: 'devices' [ 182.268543][ T9169] kobject: 'bond1' (00000000ebb06d48): kobject_uevent_env [ 182.275967][ T9169] kobject: 'bond1' (00000000ebb06d48): fill_kobj_path: path = '/devices/virtual/net/bond1' [ 182.337394][ T9169] kobject: 'queues' (00000000c998d734): kobject_add_internal: parent: 'bond1', set: '' 08:46:49 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x53a, 0x3ff, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/kvm\x00', 0x40000, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-generic\x00'}, 0x58) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000140), 0xfffffffffffffe88) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f00000000c0)=@req={0x30a, 0x0, 0x0, 0x7}, 0x10) fcntl$getown(r2, 0x9) read(r0, &(0x7f0000000400)=""/168, 0x41c) r3 = mq_open(&(0x7f0000000300)='\x04\x00\x00\x00\x92\r\x00\x00\x10\x00.\x16\xe8\xc2p\x12v\xc5\x92\xbf\xbd\xca\x19\x1bw|E\xb7m\xd2', 0x6eb3ebbbcc0884f2, 0x0, 0x0) mq_notify(r3, &(0x7f00000001c0)) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x4000) mq_timedsend(r3, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x10000003, 0x0, 0xc8f8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r2, &(0x7f00000110c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000002a40)={0x0, 0x0, &(0x7f0000002a00)}, &(0x7f0000002a80)=0xc) syz_extract_tcp_res(&(0x7f0000000340), 0x20000000000005, 0x1f) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r5, &(0x7f00000003c0), &(0x7f0000000200)=""/208}, 0x18) mq_notify(r3, &(0x7f0000002940)={0x0, 0x2000003f, 0x0, @thr={&(0x7f0000002800)="af66bfe98e95b8cc6a3dced16eb4f5f7e6490cfed992463a3a03faeae42fd6c34280bb44a5e1e56ec8fa0c59ad9a3baa971b39a11fd6c410d7b51bec30ca0523dbebed287de315c9ffb166a5aba7ade4d4df4f26cdeeda59bd7da10798a29832f9de04b603b3c1421976ca57f56ac67df7d67bf9e5da6560ed2ee1132032", 0x0}}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000700)={0x5, 0x4d77, 0x5, 'queue1\x00'}) setsockopt$inet_udp_encap(r3, 0x11, 0x64, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r6 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r6) mkdirat(r6, &(0x7f0000000180)='./file1\x00', 0x0) unlinkat(r6, &(0x7f0000000300)='./file1\x00', 0x200) getsockopt$inet_sctp6_SCTP_RTOINFO(r6, 0x84, 0x0, &(0x7f0000000100)={r4, 0x7, 0x0, 0x7}, &(0x7f00000004c0)=0x10) bind$alg(0xffffffffffffffff, 0x0, 0x0) [ 182.434380][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.434726][ T3919] kobject: 'loop2' (00000000abd9fd3a): kobject_uevent_env [ 182.441996][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.468975][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.492033][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.502746][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.510942][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.521205][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.524922][ T9169] kobject: 'queues' (00000000c998d734): kobject_uevent_env [ 182.528799][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.528818][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.528837][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.528855][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.528873][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.528892][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.528911][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.528929][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.528947][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.528966][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.528984][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.529003][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.529021][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.529038][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.529055][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.546598][ T3919] kobject: 'loop2' (00000000abd9fd3a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 182.551303][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.579004][ T9169] kobject: 'queues' (00000000c998d734): kobject_uevent_env: filter function caused the event to drop! [ 182.586822][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.653002][ T3919] kobject: 'loop3' (00000000c364349c): kobject_uevent_env [ 182.663481][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.703804][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.704486][ T3919] kobject: 'loop3' (00000000c364349c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 182.711325][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.731339][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.739023][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.746621][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.752439][ T26] audit: type=1804 audit(1572338809.394:32): pid=9189 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir127179527/syzkaller.CruDua/15/memory.events" dev="sda1" ino=16572 res=1 [ 182.754326][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.788138][ T3919] kobject: 'loop5' (000000009e4f34ed): kobject_uevent_env [ 182.792863][ T9189] syz-executor.0 (9189) used greatest stack depth: 22792 bytes left [ 182.795369][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.811322][ T3919] kobject: 'loop5' (000000009e4f34ed): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 182.821646][ T26] audit: type=1800 audit(1572338809.434:33): pid=9196 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16572 res=0 [ 182.821812][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.855471][ T3919] kobject: 'loop3' (00000000c364349c): kobject_uevent_env [ 182.865162][ T3919] kobject: 'loop3' (00000000c364349c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 182.878450][ T3919] kobject: 'loop5' (000000009e4f34ed): kobject_uevent_env [ 182.885641][ T3919] kobject: 'loop5' (000000009e4f34ed): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 182.896017][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.903676][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.913453][ T3919] kobject: 'loop0' (00000000259ce27f): kobject_uevent_env [ 182.920757][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.928205][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.935828][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.943434][ T3919] kobject: 'loop0' (00000000259ce27f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 182.946711][ T9169] kobject: 'rx-0' (00000000f2004944): kobject_add_internal: parent: 'queues', set: 'queues' [ 182.953909][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 182.967346][ T9169] kobject: 'rx-0' (00000000f2004944): kobject_uevent_env [ 183.000368][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.007869][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.015420][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.039001][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.042197][ T9169] kobject: 'rx-0' (00000000f2004944): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-0' [ 183.046471][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.060164][ T9169] kobject: 'rx-1' (0000000065aafdae): kobject_add_internal: parent: 'queues', set: 'queues' [ 183.072723][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.075278][ T9169] kobject: 'rx-1' (0000000065aafdae): kobject_uevent_env [ 183.088833][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.091827][ T9169] kobject: 'rx-1' (0000000065aafdae): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-1' [ 183.096998][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.110980][ T9169] kobject: 'rx-2' (00000000355d4d8e): kobject_add_internal: parent: 'queues', set: 'queues' [ 183.115362][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.126451][ T9169] kobject: 'rx-2' (00000000355d4d8e): kobject_uevent_env [ 183.135605][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.140430][ T9169] kobject: 'rx-2' (00000000355d4d8e): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-2' [ 183.147987][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.159067][ T9169] kobject: 'rx-3' (000000003e37383e): kobject_add_internal: parent: 'queues', set: 'queues' [ 183.166716][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.177062][ T9169] kobject: 'rx-3' (000000003e37383e): kobject_uevent_env [ 183.186478][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.191455][ T9169] kobject: 'rx-3' (000000003e37383e): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-3' [ 183.199258][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.199277][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.199302][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.210723][ T9169] kobject: 'rx-4' (000000002c538d73): kobject_add_internal: parent: 'queues', set: 'queues' [ 183.220102][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.225565][ T9169] kobject: 'rx-4' (000000002c538d73): kobject_uevent_env [ 183.232617][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.243278][ T9169] kobject: 'rx-4' (000000002c538d73): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-4' [ 183.252797][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.258096][ T9169] kobject: 'rx-5' (000000009d092779): kobject_add_internal: parent: 'queues', set: 'queues' [ 183.265115][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.276396][ T9169] kobject: 'rx-5' (000000009d092779): kobject_uevent_env [ 183.286566][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.294346][ T9169] kobject: 'rx-5' (000000009d092779): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-5' [ 183.301230][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.310769][ T9169] kobject: 'rx-6' (000000000ccc3783): kobject_add_internal: parent: 'queues', set: 'queues' [ 183.315564][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.329299][ T9169] kobject: 'rx-6' (000000000ccc3783): kobject_uevent_env [ 183.334018][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.344857][ T9169] kobject: 'rx-6' (000000000ccc3783): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-6' [ 183.351873][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.351896][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.351936][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.362529][ T9169] kobject: 'rx-7' (00000000468bebe8): kobject_add_internal: parent: 'queues', set: 'queues' [ 183.367585][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.379046][ T9169] kobject: 'rx-7' (00000000468bebe8): kobject_uevent_env [ 183.386547][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.393691][ T9169] kobject: 'rx-7' (00000000468bebe8): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-7' [ 183.402740][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.411229][ T9169] kobject: 'rx-8' (00000000ad8ae7f5): kobject_add_internal: parent: 'queues', set: 'queues' [ 183.418165][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.418209][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.425531][ T9169] kobject: 'rx-8' (00000000ad8ae7f5): kobject_uevent_env [ 183.434974][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.444803][ T9169] kobject: 'rx-8' (00000000ad8ae7f5): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-8' [ 183.452788][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.461822][ T9169] kobject: 'rx-9' (000000008ae01663): kobject_add_internal: parent: 'queues', set: 'queues' [ 183.471318][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.476926][ T9169] kobject: 'rx-9' (000000008ae01663): kobject_uevent_env [ 183.483913][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.491545][ T9169] kobject: 'rx-9' (000000008ae01663): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-9' [ 183.514430][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.520814][ T9169] kobject: 'rx-10' (000000005d156275): kobject_add_internal: parent: 'queues', set: 'queues' [ 183.530220][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.538047][ T9169] kobject: 'rx-10' (000000005d156275): kobject_uevent_env [ 183.546951][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.552621][ T9169] kobject: 'rx-10' (000000005d156275): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-10' [ 183.565330][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.570959][ T9169] kobject: 'rx-11' (00000000eadb954a): kobject_add_internal: parent: 'queues', set: 'queues' [ 183.580750][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.580788][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.588689][ T9169] kobject: 'rx-11' (00000000eadb954a): kobject_uevent_env [ 183.596549][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.603698][ T9169] kobject: 'rx-11' (00000000eadb954a): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-11' [ 183.617650][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.623882][ T9169] kobject: 'rx-12' (00000000a70155b0): kobject_add_internal: parent: 'queues', set: 'queues' [ 183.633691][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.633709][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.633727][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.641911][ T9169] kobject: 'rx-12' (00000000a70155b0): kobject_uevent_env [ 183.651230][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.656564][ T9169] kobject: 'rx-12' (00000000a70155b0): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-12' [ 183.663510][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.675197][ T9169] kobject: 'rx-13' (000000003f01db76): kobject_add_internal: parent: 'queues', set: 'queues' [ 183.684182][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.693263][ T9169] kobject: 'rx-13' (000000003f01db76): kobject_uevent_env [ 183.700215][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.707839][ T9169] kobject: 'rx-13' (000000003f01db76): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-13' [ 183.717160][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.722452][ T9169] kobject: 'rx-14' (000000003c55560e): kobject_add_internal: parent: 'queues', set: 'queues' [ 183.731609][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.740967][ T9169] kobject: 'rx-14' (000000003c55560e): kobject_uevent_env [ 183.747987][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.748007][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.748050][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.759143][ T9169] kobject: 'rx-14' (000000003c55560e): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-14' [ 183.766569][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.773173][ T9169] kobject: 'rx-15' (00000000787de2c9): kobject_add_internal: parent: 'queues', set: 'queues' [ 183.782956][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.792324][ T9169] kobject: 'rx-15' (00000000787de2c9): kobject_uevent_env [ 183.799047][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.799066][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.809629][ T9169] kobject: 'rx-15' (00000000787de2c9): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-15' [ 183.818952][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.824351][ T9169] kobject: 'tx-0' (00000000f827eef6): kobject_add_internal: parent: 'queues', set: 'queues' [ 183.831445][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.839464][ T9169] kobject: 'tx-0' (00000000f827eef6): kobject_uevent_env [ 183.849900][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.857994][ T9169] kobject: 'tx-0' (00000000f827eef6): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-0' [ 183.865048][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.875598][ T9169] kobject: 'tx-1' (00000000031c6206): kobject_add_internal: parent: 'queues', set: 'queues' [ 183.885226][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.890454][ T9169] kobject: 'tx-1' (00000000031c6206): kobject_uevent_env [ 183.897673][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.905281][ T9169] kobject: 'tx-1' (00000000031c6206): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-1' [ 183.918482][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.934617][ T9169] kobject: 'tx-2' (000000003d461e8a): kobject_add_internal: parent: 'queues', set: 'queues' [ 183.943988][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.948955][ T9169] kobject: 'tx-2' (000000003d461e8a): kobject_uevent_env [ 183.955935][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.972533][ T9169] kobject: 'tx-2' (000000003d461e8a): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-2' [ 183.981970][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.989961][ T9169] kobject: 'tx-3' (000000002fb1c09b): kobject_add_internal: parent: 'queues', set: 'queues' [ 183.997400][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.005472][ T9169] kobject: 'tx-3' (000000002fb1c09b): kobject_uevent_env [ 184.012587][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.025492][ T9169] kobject: 'tx-3' (000000002fb1c09b): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-3' [ 184.030711][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.043297][ T9169] kobject: 'tx-4' (000000000acc8812): kobject_add_internal: parent: 'queues', set: 'queues' [ 184.048533][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.055728][ T9169] kobject: 'tx-4' (000000000acc8812): kobject_uevent_env [ 184.065161][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.074401][ T9169] kobject: 'tx-4' (000000000acc8812): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-4' [ 184.083405][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.092366][ T9169] kobject: 'tx-5' (00000000e84553d5): kobject_add_internal: parent: 'queues', set: 'queues' [ 184.101726][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.106752][ T9169] kobject: 'tx-5' (00000000e84553d5): kobject_uevent_env [ 184.114289][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.125307][ T9169] kobject: 'tx-5' (00000000e84553d5): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-5' [ 184.134927][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.143167][ T9169] kobject: 'tx-6' (00000000d236a684): kobject_add_internal: parent: 'queues', set: 'queues' [ 184.150538][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.158044][ T9169] kobject: 'tx-6' (00000000d236a684): kobject_uevent_env [ 184.167171][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.176550][ T9169] kobject: 'tx-6' (00000000d236a684): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-6' [ 184.185926][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.193991][ T9169] kobject: 'tx-7' (0000000044caaebe): kobject_add_internal: parent: 'queues', set: 'queues' [ 184.201816][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.209438][ T9169] kobject: 'tx-7' (0000000044caaebe): kobject_uevent_env [ 184.218388][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.227275][ T9169] kobject: 'tx-7' (0000000044caaebe): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-7' [ 184.234499][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.244744][ T9169] kobject: 'tx-8' (00000000c111557d): kobject_add_internal: parent: 'queues', set: 'queues' [ 184.254878][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.259935][ T9169] kobject: 'tx-8' (00000000c111557d): kobject_uevent_env [ 184.267234][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.278393][ T9169] kobject: 'tx-8' (00000000c111557d): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-8' [ 184.287856][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.295951][ T9169] kobject: 'tx-9' (00000000e65ed41e): kobject_add_internal: parent: 'queues', set: 'queues' [ 184.305329][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.310372][ T9169] kobject: 'tx-9' (00000000e65ed41e): kobject_uevent_env [ 184.317554][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.328641][ T9169] kobject: 'tx-9' (00000000e65ed41e): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-9' [ 184.338831][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.347269][ T9169] kobject: 'tx-10' (00000000591eaf03): kobject_add_internal: parent: 'queues', set: 'queues' [ 184.356209][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.362695][ T9169] kobject: 'tx-10' (00000000591eaf03): kobject_uevent_env [ 184.370179][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.381197][ T9169] kobject: 'tx-10' (00000000591eaf03): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-10' [ 184.390705][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.398915][ T9169] kobject: 'tx-11' (00000000bb09bee8): kobject_add_internal: parent: 'queues', set: 'queues' [ 184.407395][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.414120][ T9169] kobject: 'tx-11' (00000000bb09bee8): kobject_uevent_env [ 184.423610][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.432399][ T9169] kobject: 'tx-11' (00000000bb09bee8): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-11' [ 184.439720][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.450179][ T9169] kobject: 'tx-12' (00000000964f6189): kobject_add_internal: parent: 'queues', set: 'queues' [ 184.459591][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.464745][ T9169] kobject: 'tx-12' (00000000964f6189): kobject_uevent_env [ 184.471940][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.483587][ T9169] kobject: 'tx-12' (00000000964f6189): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-12' [ 184.493543][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.500818][ T9169] kobject: 'tx-13' (000000007708fa71): kobject_add_internal: parent: 'queues', set: 'queues' [ 184.508222][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.515454][ T9169] kobject: 'tx-13' (000000007708fa71): kobject_uevent_env [ 184.525053][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.534243][ T9169] kobject: 'tx-13' (000000007708fa71): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-13' [ 184.541453][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.551821][ T9169] kobject: 'tx-14' (00000000b97cbdae): kobject_add_internal: parent: 'queues', set: 'queues' [ 184.561403][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.566996][ T9169] kobject: 'tx-14' (00000000b97cbdae): kobject_uevent_env [ 184.573630][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.584803][ T9169] kobject: 'tx-14' (00000000b97cbdae): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-14' [ 184.594306][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.602451][ T9169] kobject: 'tx-15' (000000000aba368c): kobject_add_internal: parent: 'queues', set: 'queues' [ 184.609687][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.617359][ T9169] kobject: 'tx-15' (000000000aba368c): kobject_uevent_env [ 184.626445][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.636092][ T9169] kobject: 'tx-15' (000000000aba368c): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-15' [ 184.645536][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.654499][ T9169] kobject: 'batman_adv' (00000000b675540d): kobject_add_internal: parent: 'bond1', set: '' [ 184.660981][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.668602][ T9174] netlink: 'syz-executor.1': attribute type 24 has an invalid length. [ 184.677651][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.687283][ T9174] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 184.696429][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.795451][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.802865][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.810369][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.817771][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.825153][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.832547][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.840542][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.848377][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.855752][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.863155][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.870638][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.878038][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.885407][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.892822][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.900206][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.907615][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.915165][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.922560][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.930073][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.937570][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.944951][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.952358][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.959835][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.967772][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.975136][ T12] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 184.982867][ T12] kobject: 'hidraw' (0000000088aced13): kobject_add_internal: parent: '0000:0000:0000.0002', set: '(null)' [ 184.994783][ T12] kobject: 'hidraw0' (000000009015a9a0): kobject_add_internal: parent: 'hidraw', set: 'devices' [ 185.005492][ T12] kobject: 'hidraw0' (000000009015a9a0): kobject_uevent_env [ 185.012946][ T12] kobject: 'hidraw0' (000000009015a9a0): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0002/hidraw/hidraw0' [ 185.029270][ T12] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz1 [ 185.038994][ T12] kobject: '0000:0000:0000.0002' (000000004c3d2c8d): kobject_uevent_env [ 185.049284][ T12] kobject: '0000:0000:0000.0002' (000000004c3d2c8d): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0002' [ 185.062831][ T9140] kobject: 'hidraw0' (000000009015a9a0): kobject_uevent_env [ 185.070291][ T9140] kobject: 'hidraw0' (000000009015a9a0): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0002/hidraw/hidraw0' [ 185.083903][ T9140] kobject: 'hidraw' (0000000088aced13): kobject_cleanup, parent 0000000065142d3e [ 185.093231][ T9140] kobject: 'hidraw' (0000000088aced13): calling ktype release [ 185.100764][ T9140] kobject: 'hidraw': free name [ 185.105644][ T9140] kobject: 'hidraw0' (000000009015a9a0): kobject_cleanup, parent 0000000065142d3e [ 185.114914][ T9140] kobject: 'hidraw0' (000000009015a9a0): calling ktype release [ 185.122519][ T9140] kobject: 'hidraw0': free name [ 185.127483][ T9140] kobject: '0000:0000:0000.0002' (000000004c3d2c8d): kobject_uevent_env [ 185.140918][ T3919] kobject: 'loop1' (00000000496e554f): kobject_uevent_env [ 185.146148][ T9140] kobject: '0000:0000:0000.0002' (000000004c3d2c8d): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0002' [ 185.155860][ T3919] kobject: 'loop1' (00000000496e554f): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 185.165015][ T9140] kobject: '0000:0000:0000.0002' (000000004c3d2c8d): kobject_uevent_env [ 185.183500][ T9140] kobject: '0000:0000:0000.0002' (000000004c3d2c8d): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0002' [ 185.197250][ T9140] kobject: '0000:0000:0000.0002' (000000004c3d2c8d): kobject_cleanup, parent 0000000065142d3e 08:46:51 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000200), 0x1a7) write$UHID_CREATE(r0, &(0x7f00000004c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00\x00\x00\x00\xf1\xff\xff\xff\x00', &(0x7f0000000100)=""/183, 0xb7}, 0x120) write$UHID_INPUT2(r0, &(0x7f00000011c0), 0x6) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000080), 0xc) 08:46:51 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000001c0)) 08:46:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x1001000004e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = accept(r0, 0x0, 0x0) write(r1, &(0x7f0000000100), 0x1ede5) shutdown(r1, 0x2) sendto$packet(r2, &(0x7f0000000040)='u', 0x34000, 0x0, 0x0, 0x0) 08:46:51 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x53a, 0x3ff, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/kvm\x00', 0x40000, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-generic\x00'}, 0x58) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000140), 0xfffffffffffffe88) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f00000000c0)=@req={0x30a, 0x0, 0x0, 0x7}, 0x10) fcntl$getown(r2, 0x9) read(r0, &(0x7f0000000400)=""/168, 0x41c) r3 = mq_open(&(0x7f0000000300)='\x04\x00\x00\x00\x92\r\x00\x00\x10\x00.\x16\xe8\xc2p\x12v\xc5\x92\xbf\xbd\xca\x19\x1bw|E\xb7m\xd2', 0x6eb3ebbbcc0884f2, 0x0, 0x0) mq_notify(r3, &(0x7f00000001c0)) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x4000) mq_timedsend(r3, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x10000003, 0x0, 0xc8f8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r2, &(0x7f00000110c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000002a40)={0x0, 0x0, &(0x7f0000002a00)}, &(0x7f0000002a80)=0xc) syz_extract_tcp_res(&(0x7f0000000340), 0x20000000000005, 0x1f) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r5, &(0x7f00000003c0), &(0x7f0000000200)=""/208}, 0x18) mq_notify(r3, &(0x7f0000002940)={0x0, 0x2000003f, 0x0, @thr={&(0x7f0000002800)="af66bfe98e95b8cc6a3dced16eb4f5f7e6490cfed992463a3a03faeae42fd6c34280bb44a5e1e56ec8fa0c59ad9a3baa971b39a11fd6c410d7b51bec30ca0523dbebed287de315c9ffb166a5aba7ade4d4df4f26cdeeda59bd7da10798a29832f9de04b603b3c1421976ca57f56ac67df7d67bf9e5da6560ed2ee1132032", 0x0}}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000700)={0x5, 0x4d77, 0x5, 'queue1\x00'}) setsockopt$inet_udp_encap(r3, 0x11, 0x64, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r6 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r6) mkdirat(r6, &(0x7f0000000180)='./file1\x00', 0x0) unlinkat(r6, &(0x7f0000000300)='./file1\x00', 0x200) getsockopt$inet_sctp6_SCTP_RTOINFO(r6, 0x84, 0x0, &(0x7f0000000100)={r4, 0x7, 0x0, 0x7}, &(0x7f00000004c0)=0x10) bind$alg(0xffffffffffffffff, 0x0, 0x0) 08:46:51 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) socketpair(0x0, 0x0, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100068, 0x500001c) close(0xffffffffffffffff) 08:46:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, 0x0) mount$9p_rdma(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001b40)=ANY=[]) getresgid(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) recvmsg(r0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x14, 0x2, [@IFLA_BOND_AD_ACTOR_SYS_PRIO={0x8, 0x18, 0x3f}, @IFLA_BOND_MODE={0x8, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x0, 0x300) [ 185.207555][ T9140] kobject: '0000:0000:0000.0002' (000000004c3d2c8d): calling ktype release [ 185.216237][ T9140] kobject: '0000:0000:0000.0002': free name [ 185.259967][ T3919] kobject: 'loop4' (00000000a78a60c0): kobject_uevent_env [ 185.269657][ T8866] kobject: '0000:0000:0000.0003' (000000009751540a): kobject_add_internal: parent: 'uhid', set: 'devices' [ 185.282223][ T8866] kobject: '0000:0000:0000.0003' (000000009751540a): kobject_uevent_env [ 185.284372][ T3919] kobject: 'loop4' (00000000a78a60c0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 185.290772][ T8866] kobject: '0000:0000:0000.0003' (000000009751540a): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0003' [ 185.323950][ T26] audit: type=1804 audit(1572338811.964:34): pid=9228 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir127179527/syzkaller.CruDua/16/memory.events" dev="sda1" ino=16583 res=1 08:46:52 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000200), 0x1a7) write$UHID_CREATE(r0, &(0x7f00000004c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00\x00\x00\x00\xf1\xff\xff\xff\x00', &(0x7f0000000100)=""/183, 0xb7}, 0x120) write$UHID_INPUT2(r0, &(0x7f00000011c0), 0x6) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000080), 0xc) [ 185.370775][ T9221] netlink: 'syz-executor.1': attribute type 24 has an invalid length. [ 185.410442][ T3919] kobject: 'loop3' (00000000c364349c): kobject_uevent_env [ 185.418429][ T9221] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 185.434429][ T3919] kobject: 'loop3' (00000000c364349c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 185.439424][ T8866] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 185.462862][ T9221] kobject: 'bond2' (00000000663f3c53): kobject_add_internal: parent: 'net', set: 'devices' [ 185.488111][ T8866] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 185.489245][ T12] kobject: '0000:0000:0000.0004' (00000000ff0e1ddb): kobject_add_internal: parent: 'uhid', set: 'devices' [ 185.509945][ T12] kobject: '0000:0000:0000.0004' (00000000ff0e1ddb): kobject_uevent_env [ 185.519484][ T12] kobject: '0000:0000:0000.0004' (00000000ff0e1ddb): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0004' [ 185.527532][ T9221] kobject: 'bond2' (00000000663f3c53): kobject_uevent_env [ 185.535103][ T12] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 185.550371][ T12] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 185.557805][ T12] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 185.565186][ T12] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 185.582545][ T12] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 185.591340][ T8866] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 185.594373][ T12] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 185.626831][ T9221] kobject: 'bond2' (00000000663f3c53): fill_kobj_path: path = '/devices/virtual/net/bond2' [ 185.641278][ T12] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 185.645180][ T8866] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 185.654371][ T9221] kobject: 'queues' (000000000dcd5417): kobject_add_internal: parent: 'bond2', set: '' [ 185.669586][ T12] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 185.672426][ T8866] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 185.677179][ T12] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 185.677198][ T12] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 185.677218][ T12] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 185.677409][ T12] kobject: 'hidraw' (00000000c49af214): kobject_add_internal: parent: '0000:0000:0000.0004', set: '(null)' [ 185.703944][ T8866] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 08:46:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x1001000004e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = accept(r0, 0x0, 0x0) write(r1, &(0x7f0000000100), 0x1ede5) shutdown(r1, 0x2) sendto$packet(r2, &(0x7f0000000040)='u', 0x34000, 0x0, 0x0, 0x0) [ 185.716975][ T9221] kobject: 'queues' (000000000dcd5417): kobject_uevent_env [ 185.739202][ T9221] kobject: 'queues' (000000000dcd5417): kobject_uevent_env: filter function caused the event to drop! [ 185.752179][ T3919] kobject: 'loop2' (00000000abd9fd3a): kobject_uevent_env [ 185.762921][ T3919] kobject: 'loop2' (00000000abd9fd3a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 185.778290][ T8866] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 185.783370][ T12] kobject: 'hidraw0' (00000000efda0f41): kobject_add_internal: parent: 'hidraw', set: 'devices' [ 185.796679][ T9221] kobject: 'rx-0' (00000000eec23f8e): kobject_add_internal: parent: 'queues', set: 'queues' [ 185.798666][ T8866] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 185.821071][ T8866] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 185.835415][ T9221] kobject: 'rx-0' (00000000eec23f8e): kobject_uevent_env [ 185.837365][ T8866] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 185.850368][ T9221] kobject: 'rx-0' (00000000eec23f8e): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-0' [ 185.852489][ T12] kobject: 'hidraw0' (00000000efda0f41): kobject_uevent_env [ 185.871431][ T12] kobject: 'hidraw0' (00000000efda0f41): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0004/hidraw/hidraw0' [ 185.985407][ T8866] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 186.004384][ T9221] kobject: 'rx-1' (000000006ad33b15): kobject_add_internal: parent: 'queues', set: 'queues' [ 186.014700][ T12] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz1] on syz1 08:46:52 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) socketpair(0x0, 0x0, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100068, 0x500001c) close(0xffffffffffffffff) 08:46:52 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x53a, 0x3ff, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/kvm\x00', 0x40000, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-generic\x00'}, 0x58) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000140), 0xfffffffffffffe88) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f00000000c0)=@req={0x30a, 0x0, 0x0, 0x7}, 0x10) fcntl$getown(r2, 0x9) read(r0, &(0x7f0000000400)=""/168, 0x41c) r3 = mq_open(&(0x7f0000000300)='\x04\x00\x00\x00\x92\r\x00\x00\x10\x00.\x16\xe8\xc2p\x12v\xc5\x92\xbf\xbd\xca\x19\x1bw|E\xb7m\xd2', 0x6eb3ebbbcc0884f2, 0x0, 0x0) mq_notify(r3, &(0x7f00000001c0)) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x4000) mq_timedsend(r3, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x10000003, 0x0, 0xc8f8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r2, &(0x7f00000110c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000002a40)={0x0, 0x0, &(0x7f0000002a00)}, &(0x7f0000002a80)=0xc) syz_extract_tcp_res(&(0x7f0000000340), 0x20000000000005, 0x1f) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r5, &(0x7f00000003c0), &(0x7f0000000200)=""/208}, 0x18) mq_notify(r3, &(0x7f0000002940)={0x0, 0x2000003f, 0x0, @thr={&(0x7f0000002800)="af66bfe98e95b8cc6a3dced16eb4f5f7e6490cfed992463a3a03faeae42fd6c34280bb44a5e1e56ec8fa0c59ad9a3baa971b39a11fd6c410d7b51bec30ca0523dbebed287de315c9ffb166a5aba7ade4d4df4f26cdeeda59bd7da10798a29832f9de04b603b3c1421976ca57f56ac67df7d67bf9e5da6560ed2ee1132032", 0x0}}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000700)={0x5, 0x4d77, 0x5, 'queue1\x00'}) setsockopt$inet_udp_encap(r3, 0x11, 0x64, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r6 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r6) mkdirat(r6, &(0x7f0000000180)='./file1\x00', 0x0) unlinkat(r6, &(0x7f0000000300)='./file1\x00', 0x200) getsockopt$inet_sctp6_SCTP_RTOINFO(r6, 0x84, 0x0, &(0x7f0000000100)={r4, 0x7, 0x0, 0x7}, &(0x7f00000004c0)=0x10) bind$alg(0xffffffffffffffff, 0x0, 0x0) [ 186.015145][ T8866] kobject: 'hidraw' (000000001c2b486e): kobject_add_internal: parent: '0000:0000:0000.0003', set: '(null)' [ 186.030143][ T9221] kobject: 'rx-1' (000000006ad33b15): kobject_uevent_env [ 186.046351][ T12] kobject: '0000:0000:0000.0004' (00000000ff0e1ddb): kobject_uevent_env [ 186.058777][ T3919] kobject: 'loop0' (00000000259ce27f): kobject_uevent_env [ 186.071213][ T3919] kobject: 'loop0' (00000000259ce27f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 186.082557][ T12] kobject: '0000:0000:0000.0004' (00000000ff0e1ddb): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0004' [ 186.090684][ T8866] kobject: 'hidraw1' (0000000090a67933): kobject_add_internal: parent: 'hidraw', set: 'devices' [ 186.116268][ T3919] kobject: 'loop5' (000000009e4f34ed): kobject_uevent_env [ 186.138007][ T9221] kobject: 'rx-1' (000000006ad33b15): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-1' [ 186.152713][ T3919] kobject: 'loop5' (000000009e4f34ed): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 186.174951][ T9221] kobject: 'rx-2' (00000000beb11452): kobject_add_internal: parent: 'queues', set: 'queues' [ 186.199088][ T8866] kobject: 'hidraw1' (0000000090a67933): kobject_uevent_env [ 186.203942][ T9221] kobject: 'rx-2' (00000000beb11452): kobject_uevent_env [ 186.225062][ T9221] kobject: 'rx-2' (00000000beb11452): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-2' [ 186.239000][ T9221] kobject: 'rx-3' (000000007f09eca0): kobject_add_internal: parent: 'queues', set: 'queues' [ 186.243982][ T8866] kobject: 'hidraw1' (0000000090a67933): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0003/hidraw/hidraw1' [ 186.249511][ T26] audit: type=1804 audit(1572338812.884:35): pid=9251 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir127179527/syzkaller.CruDua/17/memory.events" dev="sda1" ino=16583 res=1 [ 186.290895][ T9221] kobject: 'rx-3' (000000007f09eca0): kobject_uevent_env [ 186.298463][ T9221] kobject: 'rx-3' (000000007f09eca0): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-3' [ 186.312265][ T9221] kobject: 'rx-4' (00000000fbcad138): kobject_add_internal: parent: 'queues', set: 'queues' [ 186.323816][ T9221] kobject: 'rx-4' (00000000fbcad138): kobject_uevent_env [ 186.328105][ T8866] hid-generic 0000:0000:0000.0003: hidraw1: HID v0.00 Device [syz1] on syz1 [ 186.341301][ T9236] kobject: 'hidraw0' (00000000efda0f41): kobject_uevent_env [ 186.341366][ T9221] kobject: 'rx-4' (00000000fbcad138): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-4' [ 186.353272][ T9236] kobject: 'hidraw0' (00000000efda0f41): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0004/hidraw/hidraw0' [ 186.373621][ T8866] kobject: '0000:0000:0000.0003' (000000009751540a): kobject_uevent_env [ 186.382227][ T8866] kobject: '0000:0000:0000.0003' (000000009751540a): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0003' [ 186.396587][ T9236] kobject: 'hidraw' (00000000c49af214): kobject_cleanup, parent 0000000065142d3e [ 186.405883][ T9236] kobject: 'hidraw' (00000000c49af214): calling ktype release [ 186.414946][ T9236] kobject: 'hidraw': free name [ 186.419934][ T9236] kobject: 'hidraw0' (00000000efda0f41): kobject_cleanup, parent 0000000065142d3e [ 186.434895][ T9236] kobject: 'hidraw0' (00000000efda0f41): calling ktype release [ 186.435229][ T9221] kobject: 'rx-5' (0000000007777450): kobject_add_internal: parent: 'queues', set: 'queues' [ 186.445175][ T9236] kobject: 'hidraw0': free name [ 186.456302][ T9221] kobject: 'rx-5' (0000000007777450): kobject_uevent_env [ 186.468818][ T9221] kobject: 'rx-5' (0000000007777450): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-5' [ 186.480746][ T9221] kobject: 'rx-6' (00000000a44852f1): kobject_add_internal: parent: 'queues', set: 'queues' 08:46:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, 0x0) mount$9p_rdma(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001b40)=ANY=[]) getresgid(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) recvmsg(r0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x14, 0x2, [@IFLA_BOND_AD_ACTOR_SYS_PRIO={0x8, 0x18, 0x3f}, @IFLA_BOND_MODE={0x8, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x0, 0x300) [ 186.494085][ T9221] kobject: 'rx-6' (00000000a44852f1): kobject_uevent_env [ 186.501677][ T9221] kobject: 'rx-6' (00000000a44852f1): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-6' [ 186.521125][ T9221] kobject: 'rx-7' (0000000046416c5a): kobject_add_internal: parent: 'queues', set: 'queues' [ 186.532555][ T3919] kobject: 'loop5' (000000009e4f34ed): kobject_uevent_env [ 186.539141][ T9236] kobject: '0000:0000:0000.0004' (00000000ff0e1ddb): kobject_uevent_env 08:46:53 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) socketpair(0x0, 0x0, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100068, 0x500001c) close(0xffffffffffffffff) [ 186.549053][ T9236] kobject: '0000:0000:0000.0004' (00000000ff0e1ddb): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0004' [ 186.562275][ T9224] kobject: 'hidraw1' (0000000090a67933): kobject_uevent_env [ 186.570478][ T9224] kobject: 'hidraw1' (0000000090a67933): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0003/hidraw/hidraw1' [ 186.584321][ T9236] kobject: '0000:0000:0000.0004' (00000000ff0e1ddb): kobject_uevent_env [ 186.593030][ T9224] kobject: 'hidraw' (000000001c2b486e): kobject_cleanup, parent 0000000065142d3e [ 186.594582][ T3919] kobject: 'loop5' (000000009e4f34ed): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 186.603474][ T9236] kobject: '0000:0000:0000.0004' (00000000ff0e1ddb): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0004' [ 186.618226][ T9221] kobject: 'rx-7' (0000000046416c5a): kobject_uevent_env [ 186.634383][ T9224] kobject: 'hidraw' (000000001c2b486e): calling ktype release [ 186.649568][ T9224] kobject: 'hidraw': free name [ 186.654999][ T9224] kobject: 'hidraw1' (0000000090a67933): kobject_cleanup, parent 0000000065142d3e [ 186.665698][ T9236] kobject: '0000:0000:0000.0004' (00000000ff0e1ddb): kobject_cleanup, parent 0000000065142d3e [ 186.668406][ T9221] kobject: 'rx-7' (0000000046416c5a): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-7' [ 186.688940][ T3919] kobject: 'loop2' (00000000abd9fd3a): kobject_uevent_env [ 186.689641][ T9221] kobject: 'rx-8' (00000000144f6fae): kobject_add_internal: parent: 'queues', set: 'queues' [ 186.704848][ T9224] kobject: 'hidraw1' (0000000090a67933): calling ktype release [ 186.706276][ T26] audit: type=1804 audit(1572338813.344:36): pid=9259 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245090453/syzkaller.HW9vpC/15/memory.events" dev="sda1" ino=16586 res=1 [ 186.736859][ T3919] kobject: 'loop2' (00000000abd9fd3a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 186.745967][ T9236] kobject: '0000:0000:0000.0004' (00000000ff0e1ddb): calling ktype release [ 186.755547][ T9224] kobject: 'hidraw1': free name [ 186.771483][ T9224] kobject: '0000:0000:0000.0003' (000000009751540a): kobject_uevent_env [ 186.773513][ T9221] kobject: 'rx-8' (00000000144f6fae): kobject_uevent_env [ 186.799919][ T9236] kobject: '0000:0000:0000.0004': free name [ 186.826334][ T9224] kobject: '0000:0000:0000.0003' (000000009751540a): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0003' [ 186.840897][ T3919] kobject: 'loop0' (00000000259ce27f): kobject_uevent_env [ 186.866766][ T3919] kobject: 'loop0' (00000000259ce27f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 186.873300][ T9221] kobject: 'rx-8' (00000000144f6fae): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-8' [ 186.896937][ T9224] kobject: '0000:0000:0000.0003' (000000009751540a): kobject_uevent_env [ 186.897073][ T9221] kobject: 'rx-9' (00000000f1ae8d58): kobject_add_internal: parent: 'queues', set: 'queues' [ 186.938115][ T9224] kobject: '0000:0000:0000.0003' (000000009751540a): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0003' [ 186.942746][ T9221] kobject: 'rx-9' (00000000f1ae8d58): kobject_uevent_env [ 186.960165][ T3919] kobject: 'loop3' (00000000c364349c): kobject_uevent_env [ 186.968894][ T9221] kobject: 'rx-9' (00000000f1ae8d58): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-9' [ 186.984071][ T3919] kobject: 'loop3' (00000000c364349c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 186.990229][ T9221] kobject: 'rx-10' (000000003d6bd133): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.007351][ T9221] kobject: 'rx-10' (000000003d6bd133): kobject_uevent_env [ 187.011985][ T9224] kobject: '0000:0000:0000.0003' (000000009751540a): kobject_cleanup, parent 0000000065142d3e [ 187.014592][ T9221] kobject: 'rx-10' (000000003d6bd133): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-10' [ 187.039020][ T9221] kobject: 'rx-11' (00000000339b4cc0): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.063839][ T9224] kobject: '0000:0000:0000.0003' (000000009751540a): calling ktype release [ 187.068242][ T9221] kobject: 'rx-11' (00000000339b4cc0): kobject_uevent_env [ 187.080993][ T9224] kobject: '0000:0000:0000.0003': free name 08:46:53 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000200), 0x1a7) write$UHID_CREATE(r0, &(0x7f00000004c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00\x00\x00\x00\xf1\xff\xff\xff\x00', &(0x7f0000000100)=""/183, 0xb7}, 0x120) write$UHID_INPUT2(r0, &(0x7f00000011c0), 0x6) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000080), 0xc) 08:46:53 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) socketpair(0x0, 0x0, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100068, 0x500001c) close(0xffffffffffffffff) 08:46:53 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000200), 0x1a7) write$UHID_CREATE(r0, &(0x7f00000004c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00\x00\x00\x00\xf1\xff\xff\xff\x00', &(0x7f0000000100)=""/183, 0xb7}, 0x120) write$UHID_INPUT2(r0, &(0x7f00000011c0), 0x6) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000080), 0xc) 08:46:53 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) socketpair(0x0, 0x0, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100068, 0x500001c) close(0xffffffffffffffff) [ 187.088704][ T9221] kobject: 'rx-11' (00000000339b4cc0): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-11' [ 187.103378][ T9221] kobject: 'rx-12' (00000000bf7f893b): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.119517][ T3919] kobject: 'loop4' (00000000a78a60c0): kobject_uevent_env [ 187.130030][ T9221] kobject: 'rx-12' (00000000bf7f893b): kobject_uevent_env [ 187.145067][ T12] kobject: '0000:0000:0000.0005' (000000004001de00): kobject_add_internal: parent: 'uhid', set: 'devices' [ 187.149841][ T3919] kobject: 'loop4' (00000000a78a60c0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 187.163557][ T9269] kobject: '(null)' (000000007478fee3): kobject_cleanup, parent 0000000065142d3e [ 187.168141][ T9221] kobject: 'rx-12' (00000000bf7f893b): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-12' [ 187.177891][ T12] kobject: '0000:0000:0000.0005' (000000004001de00): kobject_uevent_env [ 187.201161][ T9269] kobject: '(null)' (000000007478fee3): calling ktype release [ 187.207116][ T26] audit: type=1804 audit(1572338813.854:37): pid=9266 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir127179527/syzkaller.CruDua/18/memory.events" dev="sda1" ino=16580 res=1 [ 187.209071][ T12] kobject: '0000:0000:0000.0005' (000000004001de00): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0005' [ 187.264496][ T9267] kobject: '(null)' (000000001f6f293b): kobject_cleanup, parent 0000000065142d3e [ 187.276401][ T3919] kobject: 'loop2' (00000000abd9fd3a): kobject_uevent_env [ 187.292338][ T3919] kobject: 'loop2' (00000000abd9fd3a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 187.314848][ T9267] kobject: '(null)' (000000001f6f293b): calling ktype release 08:46:54 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000200), 0x1a7) write$UHID_CREATE(r0, &(0x7f00000004c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00\x00\x00\x00\xf1\xff\xff\xff\x00', &(0x7f0000000100)=""/183, 0xb7}, 0x120) write$UHID_INPUT2(r0, &(0x7f00000011c0), 0x6) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000080), 0xc) [ 187.317009][ T26] audit: type=1804 audit(1572338813.954:38): pid=9272 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245090453/syzkaller.HW9vpC/16/memory.events" dev="sda1" ino=16583 res=1 [ 187.342203][ T12] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 187.355181][ T9221] kobject: 'rx-13' (00000000aa146049): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.383935][ T12] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 187.392524][ T12] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 187.401250][ T3919] kobject: 'loop4' (00000000a78a60c0): kobject_uevent_env [ 187.408562][ T9221] kobject: 'rx-13' (00000000aa146049): kobject_uevent_env [ 187.418773][ T9221] kobject: 'rx-13' (00000000aa146049): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-13' [ 187.430667][ T3919] kobject: 'loop4' (00000000a78a60c0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 187.443340][ T12] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 187.451598][ T9221] kobject: 'rx-14' (00000000645e1a83): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.472726][ T12] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 187.490186][ T12] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 187.497987][ T8866] kobject: '0000:0000:0000.0006' (000000009dc02512): kobject_add_internal: parent: 'uhid', set: 'devices' [ 187.501247][ T9221] kobject: 'rx-14' (00000000645e1a83): kobject_uevent_env [ 187.527299][ T12] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 187.534847][ T9221] kobject: 'rx-14' (00000000645e1a83): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-14' [ 187.544804][ T8866] kobject: '0000:0000:0000.0006' (000000009dc02512): kobject_uevent_env [ 187.554521][ T8866] kobject: '0000:0000:0000.0006' (000000009dc02512): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0006' [ 187.569222][ T8866] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 187.576875][ T8866] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 187.586137][ T8866] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 187.593823][ T9221] kobject: 'rx-15' (000000008b62f07c): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.599929][ T12] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 187.604942][ T8866] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 187.620762][ T9221] kobject: 'rx-15' (000000008b62f07c): kobject_uevent_env [ 187.628831][ T9221] kobject: 'rx-15' (000000008b62f07c): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-15' [ 187.640561][ T8866] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 187.648434][ T8866] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 187.656083][ T9221] kobject: 'tx-0' (000000006c80b264): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.667557][ T8866] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 187.675487][ T9221] kobject: 'tx-0' (000000006c80b264): kobject_uevent_env [ 187.683496][ T8866] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 187.690307][ T12] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 187.691482][ T9221] kobject: 'tx-0' (000000006c80b264): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-0' [ 187.709911][ T8866] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 187.717734][ T8866] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 187.725422][ T9221] kobject: 'tx-1' (00000000f0d7b697): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.736113][ T8866] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 187.743792][ T12] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 187.744187][ T8866] kobject: 'hidraw' (0000000032a171ea): kobject_add_internal: parent: '0000:0000:0000.0006', set: '(null)' [ 187.767926][ T9221] kobject: 'tx-1' (00000000f0d7b697): kobject_uevent_env [ 187.778017][ T12] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 187.780346][ T9221] kobject: 'tx-1' (00000000f0d7b697): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-1' [ 187.802017][ T8866] kobject: 'hidraw0' (0000000048b4e5ad): kobject_add_internal: parent: 'hidraw', set: 'devices' [ 187.817194][ T9221] kobject: 'tx-2' (00000000e7bad5e7): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.828251][ T8866] kobject: 'hidraw0' (0000000048b4e5ad): kobject_uevent_env [ 187.835932][ T9221] kobject: 'tx-2' (00000000e7bad5e7): kobject_uevent_env [ 187.843474][ T8866] kobject: 'hidraw0' (0000000048b4e5ad): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0006/hidraw/hidraw0' [ 187.850220][ T9221] kobject: 'tx-2' (00000000e7bad5e7): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-2' [ 187.870726][ T9221] kobject: 'tx-3' (000000007d94e36a): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.882134][ T3919] kobject: 'loop0' (00000000259ce27f): kobject_uevent_env [ 187.886696][ T8866] hid-generic 0000:0000:0000.0006: hidraw0: HID v0.00 Device [syz1] on syz1 [ 187.889356][ T12] kobject: 'hidraw' (0000000030f7ef2e): kobject_add_internal: parent: '0000:0000:0000.0005', set: '(null)' [ 187.911039][ T8866] kobject: '0000:0000:0000.0006' (000000009dc02512): kobject_uevent_env [ 187.921338][ T8866] kobject: '0000:0000:0000.0006' (000000009dc02512): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0006' [ 187.924111][ T3919] kobject: 'loop0' (00000000259ce27f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 187.947500][ T9221] kobject: 'tx-3' (000000007d94e36a): kobject_uevent_env [ 187.954566][ T9221] kobject: 'tx-3' (000000007d94e36a): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-3' [ 187.967175][ T12] kobject: 'hidraw1' (000000008446332a): kobject_add_internal: parent: 'hidraw', set: 'devices' [ 187.972145][ T3919] kobject: 'loop2' (00000000abd9fd3a): kobject_uevent_env [ 187.984251][ T12] kobject: 'hidraw1' (000000008446332a): kobject_uevent_env [ 187.985752][ T3919] kobject: 'loop2' (00000000abd9fd3a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 187.992710][ T12] kobject: 'hidraw1' (000000008446332a): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0005/hidraw/hidraw1' [ 188.030654][ T9221] kobject: 'tx-4' (0000000063586ae1): kobject_add_internal: parent: 'queues', set: 'queues' [ 188.050714][ T9221] kobject: 'tx-4' (0000000063586ae1): kobject_uevent_env [ 188.058038][ T12] hid-generic 0000:0000:0000.0005: hidraw1: HID v0.00 Device [syz1] on syz1 [ 188.064482][ T9221] kobject: 'tx-4' (0000000063586ae1): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-4' [ 188.074085][ T12] kobject: '0000:0000:0000.0005' (000000004001de00): kobject_uevent_env [ 188.080163][ T9283] kobject: 'hidraw0' (0000000048b4e5ad): kobject_uevent_env [ 188.088274][ T12] kobject: '0000:0000:0000.0005' (000000004001de00): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0005' [ 188.100255][ T9283] kobject: 'hidraw0' (0000000048b4e5ad): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0006/hidraw/hidraw0' [ 188.116648][ T9221] kobject: 'tx-5' (0000000088632f57): kobject_add_internal: parent: 'queues', set: 'queues' [ 188.125095][ T9283] kobject: 'hidraw' (0000000032a171ea): kobject_cleanup, parent 0000000065142d3e [ 188.136412][ T9221] kobject: 'tx-5' (0000000088632f57): kobject_uevent_env [ 188.144294][ T9283] kobject: 'hidraw' (0000000032a171ea): calling ktype release [ 188.148654][ T9221] kobject: 'tx-5' (0000000088632f57): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-5' [ 188.148770][ T9221] kobject: 'tx-6' (00000000a61f4ecb): kobject_add_internal: parent: 'queues', set: 'queues' [ 188.159877][ T9283] kobject: 'hidraw': free name [ 188.169531][ T9221] kobject: 'tx-6' (00000000a61f4ecb): kobject_uevent_env [ 188.179742][ T9283] kobject: 'hidraw0' (0000000048b4e5ad): kobject_cleanup, parent 0000000065142d3e [ 188.186687][ T9221] kobject: 'tx-6' (00000000a61f4ecb): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-6' [ 188.191697][ T9283] kobject: 'hidraw0' (0000000048b4e5ad): calling ktype release [ 188.201197][ T9221] kobject: 'tx-7' (000000000bf7599b): kobject_add_internal: parent: 'queues', set: 'queues' [ 188.214272][ T9283] kobject: 'hidraw0': free name [ 188.219827][ T9221] kobject: 'tx-7' (000000000bf7599b): kobject_uevent_env [ 188.230476][ T9283] kobject: '0000:0000:0000.0006' (000000009dc02512): kobject_uevent_env [ 188.237351][ T9221] kobject: 'tx-7' (000000000bf7599b): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-7' [ 188.242801][ T9268] kobject: 'hidraw1' (000000008446332a): kobject_uevent_env [ 188.254313][ T9221] kobject: 'tx-8' (0000000087807f0c): kobject_add_internal: parent: 'queues', set: 'queues' [ 188.263873][ T9268] kobject: 'hidraw1' (000000008446332a): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0005/hidraw/hidraw1' [ 188.270508][ T9283] kobject: '0000:0000:0000.0006' (000000009dc02512): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0006' [ 188.281081][ T9268] kobject: 'hidraw' (0000000030f7ef2e): kobject_cleanup, parent 0000000065142d3e [ 188.301189][ T9221] kobject: 'tx-8' (0000000087807f0c): kobject_uevent_env [ 188.308257][ T9268] kobject: 'hidraw' (0000000030f7ef2e): calling ktype release [ 188.327565][ T9221] kobject: 'tx-8' (0000000087807f0c): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-8' [ 188.332122][ T9268] kobject: 'hidraw': free name [ 188.346162][ T9283] kobject: '0000:0000:0000.0006' (000000009dc02512): kobject_uevent_env [ 188.350048][ T9268] kobject: 'hidraw1' (000000008446332a): kobject_cleanup, parent 0000000065142d3e [ 188.355888][ T9283] kobject: '0000:0000:0000.0006' (000000009dc02512): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0006' [ 188.365677][ T9268] kobject: 'hidraw1' (000000008446332a): calling ktype release [ 188.378513][ T9221] kobject: 'tx-9' (0000000075606785): kobject_add_internal: parent: 'queues', set: 'queues' [ 188.388466][ T9268] kobject: 'hidraw1': free name [ 188.396310][ T9221] kobject: 'tx-9' (0000000075606785): kobject_uevent_env [ 188.401557][ T9268] kobject: '0000:0000:0000.0005' (000000004001de00): kobject_uevent_env [ 188.409444][ T9283] kobject: '0000:0000:0000.0006' (000000009dc02512): kobject_cleanup, parent 0000000065142d3e [ 188.418951][ T9268] kobject: '0000:0000:0000.0005' (000000004001de00): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0005' [ 188.426974][ T9221] kobject: 'tx-9' (0000000075606785): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-9' [ 188.442746][ T9268] kobject: '0000:0000:0000.0005' (000000004001de00): kobject_uevent_env [ 188.452936][ T9283] kobject: '0000:0000:0000.0006' (000000009dc02512): calling ktype release [ 188.464213][ T9268] kobject: '0000:0000:0000.0005' (000000004001de00): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0005' [ 188.469735][ T9221] kobject: 'tx-10' (00000000ba58f049): kobject_add_internal: parent: 'queues', set: 'queues' [ 188.485923][ T9268] kobject: '0000:0000:0000.0005' (000000004001de00): kobject_cleanup, parent 0000000065142d3e [ 188.493660][ T9283] kobject: '0000:0000:0000.0006': free name [ 188.504855][ T9268] kobject: '0000:0000:0000.0005' (000000004001de00): calling ktype release [ 188.512306][ T9221] kobject: 'tx-10' (00000000ba58f049): kobject_uevent_env [ 188.519365][ T9268] kobject: '0000:0000:0000.0005': free name [ 188.534406][ T9221] kobject: 'tx-10' (00000000ba58f049): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-10' [ 188.548719][ T9221] kobject: 'tx-11' (00000000935ca60c): kobject_add_internal: parent: 'queues', set: 'queues' [ 188.554042][ T3919] kobject: 'loop3' (00000000c364349c): kobject_uevent_env [ 188.559513][ T9221] kobject: 'tx-11' (00000000935ca60c): kobject_uevent_env [ 188.571394][ T3919] kobject: 'loop3' (00000000c364349c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 188.577709][ T9221] kobject: 'tx-11' (00000000935ca60c): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-11' [ 188.589598][ T3919] kobject: 'loop4' (00000000a78a60c0): kobject_uevent_env [ 188.604148][ T3919] kobject: 'loop4' (00000000a78a60c0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 188.612028][ T9221] kobject: 'tx-12' (000000003aa36ef5): kobject_add_internal: parent: 'queues', set: 'queues' [ 188.627644][ T9221] kobject: 'tx-12' (000000003aa36ef5): kobject_uevent_env [ 188.635048][ T9221] kobject: 'tx-12' (000000003aa36ef5): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-12' [ 188.650352][ T9221] kobject: 'tx-13' (000000003b14f0cd): kobject_add_internal: parent: 'queues', set: 'queues' [ 188.660798][ T9221] kobject: 'tx-13' (000000003b14f0cd): kobject_uevent_env [ 188.668047][ T9221] kobject: 'tx-13' (000000003b14f0cd): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-13' [ 188.679632][ T9221] kobject: 'tx-14' (000000005570d0b5): kobject_add_internal: parent: 'queues', set: 'queues' [ 188.689922][ T9221] kobject: 'tx-14' (000000005570d0b5): kobject_uevent_env [ 188.697270][ T9221] kobject: 'tx-14' (000000005570d0b5): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-14' [ 188.708486][ T9221] kobject: 'tx-15' (00000000067c7ec1): kobject_add_internal: parent: 'queues', set: 'queues' [ 188.718862][ T9221] kobject: 'tx-15' (00000000067c7ec1): kobject_uevent_env [ 188.726080][ T9221] kobject: 'tx-15' (00000000067c7ec1): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-15' [ 188.738461][ T9221] kobject: 'batman_adv' (00000000c32458a6): kobject_add_internal: parent: 'bond2', set: '' 08:46:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, 0x0) mount$9p_rdma(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001b40)=ANY=[]) getresgid(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) recvmsg(r0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x14, 0x2, [@IFLA_BOND_AD_ACTOR_SYS_PRIO={0x8, 0x18, 0x3f}, @IFLA_BOND_MODE={0x8, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x0, 0x300) 08:46:55 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) socketpair(0x0, 0x0, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100068, 0x500001c) close(0xffffffffffffffff) 08:46:55 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) socketpair(0x0, 0x0, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100068, 0x500001c) close(0xffffffffffffffff) 08:46:55 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000200), 0x1a7) write$UHID_CREATE(r0, &(0x7f00000004c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00\x00\x00\x00\xf1\xff\xff\xff\x00', &(0x7f0000000100)=""/183, 0xb7}, 0x120) write$UHID_INPUT2(r0, &(0x7f00000011c0), 0x6) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000080), 0xc) 08:46:55 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) socketpair(0x0, 0x0, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100068, 0x500001c) close(0xffffffffffffffff) [ 188.749935][ T9255] netlink: 'syz-executor.5': attribute type 24 has an invalid length. [ 188.760812][ T9255] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 188.776128][ T3919] kobject: 'loop1' (00000000496e554f): kobject_uevent_env [ 188.796822][ T3919] kobject: 'loop1' (00000000496e554f): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 188.797551][ T8911] kobject: '0000:0000:0000.0007' (0000000048fab780): kobject_add_internal: parent: 'uhid', set: 'devices' [ 188.840939][ T8911] kobject: '0000:0000:0000.0007' (0000000048fab780): kobject_uevent_env [ 188.844093][ T26] audit: type=1804 audit(1572338815.484:39): pid=9296 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir588306483/syzkaller.AmiYar/12/memory.events" dev="sda1" ino=16589 res=1 [ 188.850158][ T8911] kobject: '0000:0000:0000.0007' (0000000048fab780): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0007' [ 188.928183][ T26] audit: type=1804 audit(1572338815.534:40): pid=9306 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245090453/syzkaller.HW9vpC/17/memory.events" dev="sda1" ino=16595 res=1 [ 189.003474][ T8911] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 189.022410][ T9302] netlink: 'syz-executor.1': attribute type 24 has an invalid length. 08:46:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, 0x0) mount$9p_rdma(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001b40)=ANY=[]) getresgid(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) recvmsg(r0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x14, 0x2, [@IFLA_BOND_AD_ACTOR_SYS_PRIO={0x8, 0x18, 0x3f}, @IFLA_BOND_MODE={0x8, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x0, 0x300) [ 189.051371][ T9302] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 189.051727][ T8911] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 189.092419][ T26] audit: type=1804 audit(1572338815.544:41): pid=9307 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir127179527/syzkaller.CruDua/19/memory.events" dev="sda1" ino=16591 res=1 [ 189.099101][ T3919] kobject: 'loop5' (000000009e4f34ed): kobject_uevent_env [ 189.139689][ T8911] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 189.167787][ T8911] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 189.177931][ T9302] kobject: 'bond3' (0000000096405664): kobject_add_internal: parent: 'net', set: 'devices' [ 189.216031][ T8911] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 189.237250][ T9302] kobject: 'bond3' (0000000096405664): kobject_uevent_env [ 189.255865][ T3919] kobject: 'loop5' (000000009e4f34ed): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 189.263095][ T9302] kobject: 'bond3' (0000000096405664): fill_kobj_path: path = '/devices/virtual/net/bond3' [ 189.277485][ T9302] kobject: 'queues' (0000000057d5bcc4): kobject_add_internal: parent: 'bond3', set: '' [ 189.288006][ T9302] kobject: 'queues' (0000000057d5bcc4): kobject_uevent_env [ 189.295317][ T9302] kobject: 'queues' (0000000057d5bcc4): kobject_uevent_env: filter function caused the event to drop! [ 189.303038][ T8911] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 189.306523][ T9302] kobject: 'rx-0' (00000000e75d5df0): kobject_add_internal: parent: 'queues', set: 'queues' [ 189.324123][ T9302] kobject: 'rx-0' (00000000e75d5df0): kobject_uevent_env [ 189.331464][ T9302] kobject: 'rx-0' (00000000e75d5df0): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-0' [ 189.342936][ T9302] kobject: 'rx-1' (000000006a02add2): kobject_add_internal: parent: 'queues', set: 'queues' [ 189.353422][ T9302] kobject: 'rx-1' (000000006a02add2): kobject_uevent_env [ 189.360751][ T9302] kobject: 'rx-1' (000000006a02add2): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-1' [ 189.372152][ T9302] kobject: 'rx-2' (00000000fc9ec053): kobject_add_internal: parent: 'queues', set: 'queues' [ 189.382632][ T9302] kobject: 'rx-2' (00000000fc9ec053): kobject_uevent_env [ 189.418303][ T8911] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 189.434789][ T9302] kobject: 'rx-2' (00000000fc9ec053): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-2' [ 189.482880][ T9302] kobject: 'rx-3' (0000000074f134cc): kobject_add_internal: parent: 'queues', set: 'queues' [ 189.489798][ T8911] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 189.493468][ T9302] kobject: 'rx-3' (0000000074f134cc): kobject_uevent_env [ 189.508055][ T9302] kobject: 'rx-3' (0000000074f134cc): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-3' [ 189.523759][ T9302] kobject: 'rx-4' (000000003df026c2): kobject_add_internal: parent: 'queues', set: 'queues' [ 189.534278][ T9302] kobject: 'rx-4' (000000003df026c2): kobject_uevent_env [ 189.541959][ T9302] kobject: 'rx-4' (000000003df026c2): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-4' [ 189.555982][ T9302] kobject: 'rx-5' (00000000d7db090d): kobject_add_internal: parent: 'queues', set: 'queues' [ 189.560017][ T8911] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 189.580489][ T9302] kobject: 'rx-5' (00000000d7db090d): kobject_uevent_env [ 189.587935][ T8911] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 189.595968][ T8911] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 189.611171][ T9302] kobject: 'rx-5' (00000000d7db090d): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-5' 08:46:56 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) socketpair(0x0, 0x0, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100068, 0x500001c) close(0xffffffffffffffff) [ 189.623658][ T8911] kobject: 'hidraw' (000000007bc1e34e): kobject_add_internal: parent: '0000:0000:0000.0007', set: '(null)' [ 189.625540][ T9296] syz-executor.4 (9296) used greatest stack depth: 22584 bytes left [ 189.641777][ T8911] kobject: 'hidraw0' (000000000f667960): kobject_add_internal: parent: 'hidraw', set: 'devices' [ 189.658148][ T8911] kobject: 'hidraw0' (000000000f667960): kobject_uevent_env [ 189.661538][ T9302] kobject: 'rx-6' (00000000522fa0d1): kobject_add_internal: parent: 'queues', set: 'queues' 08:46:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x1001000004e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = accept(r0, 0x0, 0x0) write(r1, &(0x7f0000000100), 0x1ede5) shutdown(r1, 0x2) sendto$packet(r2, &(0x7f0000000040)='u', 0x34000, 0x0, 0x0, 0x0) [ 189.665607][ T8911] kobject: 'hidraw0' (000000000f667960): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0007/hidraw/hidraw0' [ 189.698079][ T8911] hid-generic 0000:0000:0000.0007: hidraw0: HID v0.00 Device [syz1] on syz1 [ 189.708900][ T3919] kobject: 'loop0' (00000000259ce27f): kobject_uevent_env [ 189.716053][ T3919] kobject: 'loop0' (00000000259ce27f): fill_kobj_path: path = '/devices/virtual/block/loop0' 08:46:56 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) socketpair(0x0, 0x0, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100068, 0x500001c) close(0xffffffffffffffff) [ 189.727317][ T8911] kobject: '0000:0000:0000.0007' (0000000048fab780): kobject_uevent_env [ 189.745720][ T3919] kobject: 'loop2' (00000000abd9fd3a): kobject_uevent_env [ 189.750671][ T9302] kobject: 'rx-6' (00000000522fa0d1): kobject_uevent_env [ 189.754192][ T8911] kobject: '0000:0000:0000.0007' (0000000048fab780): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0007' [ 189.778881][ T3919] kobject: 'loop2' (00000000abd9fd3a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 189.826867][ T9299] kobject: 'hidraw0' (000000000f667960): kobject_uevent_env [ 189.834417][ T9299] kobject: 'hidraw0' (000000000f667960): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0007/hidraw/hidraw0' [ 189.848327][ T9299] kobject: 'hidraw' (000000007bc1e34e): kobject_cleanup, parent 0000000065142d3e [ 189.857968][ T9299] kobject: 'hidraw' (000000007bc1e34e): calling ktype release [ 189.865577][ T9299] kobject: 'hidraw': free name [ 189.870851][ T9299] kobject: 'hidraw0' (000000000f667960): kobject_cleanup, parent 0000000065142d3e [ 189.881153][ T9299] kobject: 'hidraw0' (000000000f667960): calling ktype release [ 189.893007][ T9299] kobject: 'hidraw0': free name [ 189.898046][ T26] audit: type=1804 audit(1572338816.534:42): pid=9323 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir127179527/syzkaller.CruDua/20/memory.events" dev="sda1" ino=16588 res=1 [ 189.923306][ T9302] kobject: 'rx-6' (00000000522fa0d1): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-6' [ 190.037234][ T3919] kobject: 'loop4' (00000000a78a60c0): kobject_uevent_env [ 190.044424][ T3919] kobject: 'loop4' (00000000a78a60c0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 190.045268][ T9299] kobject: '0000:0000:0000.0007' (0000000048fab780): kobject_uevent_env [ 190.073218][ T9302] kobject: 'rx-7' (0000000012a3d875): kobject_add_internal: parent: 'queues', set: 'queues' [ 190.080618][ T9299] kobject: '0000:0000:0000.0007' (0000000048fab780): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0007' [ 190.105045][ T9302] kobject: 'rx-7' (0000000012a3d875): kobject_uevent_env 08:46:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x1001000004e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = accept(r0, 0x0, 0x0) write(r1, &(0x7f0000000100), 0x1ede5) shutdown(r1, 0x2) sendto$packet(r2, &(0x7f0000000040)='u', 0x34000, 0x0, 0x0, 0x0) [ 190.132072][ T26] audit: type=1804 audit(1572338816.774:43): pid=9328 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir588306483/syzkaller.AmiYar/13/memory.events" dev="sda1" ino=16589 res=1 [ 190.134359][ T9302] kobject: 'rx-7' (0000000012a3d875): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-7' [ 190.194279][ T3919] kobject: 'loop2' (00000000abd9fd3a): kobject_uevent_env [ 190.212772][ T3919] kobject: 'loop2' (00000000abd9fd3a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 190.232049][ T9299] kobject: '0000:0000:0000.0007' (0000000048fab780): kobject_uevent_env [ 190.372496][ T9302] kobject: 'rx-8' (00000000f6c87b7b): kobject_add_internal: parent: 'queues', set: 'queues' [ 190.389258][ T9299] kobject: '0000:0000:0000.0007' (0000000048fab780): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0007' [ 190.434261][ T9299] kobject: '0000:0000:0000.0007' (0000000048fab780): kobject_cleanup, parent 0000000065142d3e [ 190.454128][ T9302] kobject: 'rx-8' (00000000f6c87b7b): kobject_uevent_env 08:46:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x1001000004e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = accept(r0, 0x0, 0x0) write(r1, &(0x7f0000000100), 0x1ede5) shutdown(r1, 0x2) sendto$packet(r2, &(0x7f0000000040)='u', 0x34000, 0x0, 0x0, 0x0) [ 190.518410][ T9299] kobject: '0000:0000:0000.0007' (0000000048fab780): calling ktype release [ 190.527189][ T9299] kobject: '0000:0000:0000.0007': free name [ 190.532979][ T9302] kobject: 'rx-8' (00000000f6c87b7b): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-8' [ 190.551027][ T3919] kobject: 'loop3' (00000000c364349c): kobject_uevent_env [ 190.572511][ T3919] kobject: 'loop3' (00000000c364349c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 190.620615][ T9302] kobject: 'rx-9' (00000000fa0139f9): kobject_add_internal: parent: 'queues', set: 'queues' [ 190.696233][ T9302] kobject: 'rx-9' (00000000fa0139f9): kobject_uevent_env [ 190.731198][ T9302] kobject: 'rx-9' (00000000fa0139f9): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-9' 08:46:57 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) socketpair(0x0, 0x0, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100068, 0x500001c) close(0xffffffffffffffff) [ 190.758569][ T9302] kobject: 'rx-10' (00000000fb88865a): kobject_add_internal: parent: 'queues', set: 'queues' [ 190.781720][ T9302] kobject: 'rx-10' (00000000fb88865a): kobject_uevent_env [ 190.802804][ T9302] kobject: 'rx-10' (00000000fb88865a): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-10' [ 190.816325][ T3919] kobject: 'loop4' (00000000a78a60c0): kobject_uevent_env [ 190.829330][ T3919] kobject: 'loop4' (00000000a78a60c0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 190.848228][ T9302] kobject: 'rx-11' (000000008e1f3d05): kobject_add_internal: parent: 'queues', set: 'queues' [ 190.885670][ T9302] kobject: 'rx-11' (000000008e1f3d05): kobject_uevent_env [ 190.931923][ T26] audit: type=1804 audit(1572338817.574:44): pid=9342 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir588306483/syzkaller.AmiYar/14/memory.events" dev="sda1" ino=16589 res=1 [ 190.933687][ T9302] kobject: 'rx-11' (000000008e1f3d05): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-11' [ 190.977326][ T9302] kobject: 'rx-12' (0000000092b0d0f1): kobject_add_internal: parent: 'queues', set: 'queues' [ 191.029357][ T9302] kobject: 'rx-12' (0000000092b0d0f1): kobject_uevent_env [ 191.029928][ T3919] kobject: 'loop2' (00000000abd9fd3a): kobject_uevent_env [ 191.038538][ T9302] kobject: 'rx-12' (0000000092b0d0f1): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-12' [ 191.057812][ T3919] kobject: 'loop2' (00000000abd9fd3a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 191.095251][ T9302] kobject: 'rx-13' (0000000023a76382): kobject_add_internal: parent: 'queues', set: 'queues' [ 191.137231][ T3919] kobject: 'loop0' (00000000259ce27f): kobject_uevent_env [ 191.144484][ T3919] kobject: 'loop0' (00000000259ce27f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 191.164464][ T9302] kobject: 'rx-13' (0000000023a76382): kobject_uevent_env [ 191.173272][ T3919] kobject: 'loop3' (00000000c364349c): kobject_uevent_env [ 191.180646][ T3919] kobject: 'loop3' (00000000c364349c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 191.194200][ T9302] kobject: 'rx-13' (0000000023a76382): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-13' [ 191.233542][ T9302] kobject: 'rx-14' (0000000039af9f99): kobject_add_internal: parent: 'queues', set: 'queues' [ 191.257806][ T9302] kobject: 'rx-14' (0000000039af9f99): kobject_uevent_env [ 191.265050][ T9302] kobject: 'rx-14' (0000000039af9f99): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-14' [ 191.278570][ T9302] kobject: 'rx-15' (000000005fa1c8db): kobject_add_internal: parent: 'queues', set: 'queues' [ 191.289273][ T9302] kobject: 'rx-15' (000000005fa1c8db): kobject_uevent_env [ 191.296778][ T9302] kobject: 'rx-15' (000000005fa1c8db): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-15' [ 191.308174][ T9302] kobject: 'tx-0' (0000000055b61556): kobject_add_internal: parent: 'queues', set: 'queues' [ 191.319230][ T9302] kobject: 'tx-0' (0000000055b61556): kobject_uevent_env [ 191.326468][ T9302] kobject: 'tx-0' (0000000055b61556): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/tx-0' [ 191.338002][ T9302] kobject: 'tx-1' (0000000029875d6c): kobject_add_internal: parent: 'queues', set: 'queues' [ 191.348514][ T9302] kobject: 'tx-1' (0000000029875d6c): kobject_uevent_env [ 191.357135][ T9302] kobject: 'tx-1' (0000000029875d6c): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/tx-1' [ 191.365438][ T3919] kobject: 'loop4' (00000000a78a60c0): kobject_uevent_env [ 191.368950][ T9302] kobject: 'tx-2' (00000000f67b8d54): kobject_add_internal: parent: 'queues', set: 'queues' [ 191.379751][ T3919] kobject: 'loop4' (00000000a78a60c0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 191.386006][ T9302] kobject: 'tx-2' (00000000f67b8d54): kobject_uevent_env [ 191.403517][ T9302] kobject: 'tx-2' (00000000f67b8d54): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/tx-2' [ 191.414823][ T9302] kobject: 'tx-3' (00000000aa11d1d3): kobject_add_internal: parent: 'queues', set: 'queues' [ 191.425156][ T9302] kobject: 'tx-3' (00000000aa11d1d3): kobject_uevent_env