[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 61.552032][ T26] audit: type=1800 audit(1572380809.064:25): pid=8871 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 61.572422][ T26] audit: type=1800 audit(1572380809.064:26): pid=8871 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 61.616753][ T26] audit: type=1800 audit(1572380809.074:27): pid=8871 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.89' (ECDSA) to the list of known hosts. 2019/10/29 20:27:00 fuzzer started 2019/10/29 20:27:02 dialing manager at 10.128.0.26:38767 2019/10/29 20:27:03 syscalls: 2541 2019/10/29 20:27:03 code coverage: enabled 2019/10/29 20:27:03 comparison tracing: enabled 2019/10/29 20:27:03 extra coverage: extra coverage is not supported by the kernel 2019/10/29 20:27:03 setuid sandbox: enabled 2019/10/29 20:27:03 namespace sandbox: enabled 2019/10/29 20:27:03 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/29 20:27:03 fault injection: enabled 2019/10/29 20:27:03 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/29 20:27:03 net packet injection: enabled 2019/10/29 20:27:03 net device setup: enabled 2019/10/29 20:27:03 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 20:28:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video36\x00', 0x2, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r1, 0x8e, &(0x7f0000000600)=[&(0x7f0000000040)={0xfffffffffffffdef, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 20:28:45 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0x40045644, &(0x7f0000000040)={0x1, 0x0, @raw_data}) syzkaller login: [ 177.556384][ T9036] IPVS: ftp: loaded support on port[0] = 21 [ 177.610948][ T9038] IPVS: ftp: loaded support on port[0] = 21 [ 177.805015][ T9036] chnl_net:caif_netlink_parms(): no params data found [ 177.817052][ T9038] chnl_net:caif_netlink_parms(): no params data found 20:28:45 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) [ 177.895139][ T9036] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.905691][ T9036] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.914207][ T9036] device bridge_slave_0 entered promiscuous mode [ 177.923756][ T9038] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.932949][ T9038] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.942614][ T9038] device bridge_slave_0 entered promiscuous mode [ 177.957307][ T9036] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.964405][ T9036] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.987889][ T9036] device bridge_slave_1 entered promiscuous mode [ 177.996286][ T9038] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.003962][ T9038] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.027840][ T9038] device bridge_slave_1 entered promiscuous mode [ 178.063276][ T9036] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 178.083273][ T9038] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 178.095267][ T9036] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 178.107110][ T9038] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 178.150715][ T9038] team0: Port device team_slave_0 added [ 178.161963][ T9036] team0: Port device team_slave_0 added [ 178.171078][ T9038] team0: Port device team_slave_1 added [ 178.179105][ T9036] team0: Port device team_slave_1 added [ 178.199157][ T9042] IPVS: ftp: loaded support on port[0] = 21 20:28:45 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x20ff0cdc) setresuid(0x0, r3, 0x0) semtimedop(0x0, &(0x7f0000000200)=[{}], 0x1, 0x0) [ 178.292344][ T9038] device hsr_slave_0 entered promiscuous mode [ 178.347098][ T9038] device hsr_slave_1 entered promiscuous mode 20:28:45 executing program 4: r0 = socket(0x2, 0x1000000000000002, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="4a0000007d0000000057acff000000da144f8f7dac3e947f8288785435459b00000000d15e1dcdd1b83451000000000d00004087f8c4bea5c646eb809b0ffb796e"], 0x41) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r1, 0x0, 0xffff, 0x9) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x1c}, 0x1c}}, 0x0) sendfile(r0, r1, 0x0, 0x10001) [ 178.440157][ T9036] device hsr_slave_0 entered promiscuous mode [ 178.509237][ T9036] device hsr_slave_1 entered promiscuous mode [ 178.548840][ T9036] debugfs: Directory 'hsr0' with parent '/' already present! [ 178.594428][ T9044] IPVS: ftp: loaded support on port[0] = 21 [ 178.723805][ T9038] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.731057][ T9038] bridge0: port 2(bridge_slave_1) entered forwarding state [ 178.739316][ T9038] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.746406][ T9038] bridge0: port 1(bridge_slave_0) entered forwarding state 20:28:46 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semtimedop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x3400}], 0x1, 0x0) [ 178.774409][ T9046] IPVS: ftp: loaded support on port[0] = 21 [ 178.854900][ T3024] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.868965][ T3024] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.983430][ T9042] chnl_net:caif_netlink_parms(): no params data found [ 179.051432][ T9042] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.059695][ T9042] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.068226][ T9042] device bridge_slave_0 entered promiscuous mode [ 179.085157][ T9051] IPVS: ftp: loaded support on port[0] = 21 [ 179.088635][ T9038] 8021q: adding VLAN 0 to HW filter on device bond0 [ 179.119803][ T9044] chnl_net:caif_netlink_parms(): no params data found [ 179.131747][ T9042] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.139118][ T9042] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.147056][ T9042] device bridge_slave_1 entered promiscuous mode [ 179.221210][ T9042] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 179.237242][ T9042] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 179.259600][ T9044] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.267114][ T9044] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.275033][ T9044] device bridge_slave_0 entered promiscuous mode [ 179.285012][ T9044] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.292910][ T9044] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.301250][ T9044] device bridge_slave_1 entered promiscuous mode [ 179.323401][ T2817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 179.334013][ T2817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 179.343808][ T9038] 8021q: adding VLAN 0 to HW filter on device team0 [ 179.369541][ T9042] team0: Port device team_slave_0 added [ 179.378188][ T9042] team0: Port device team_slave_1 added [ 179.444530][ T9048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 179.454308][ T9048] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 179.463240][ T9048] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.470416][ T9048] bridge0: port 1(bridge_slave_0) entered forwarding state [ 179.490641][ T9036] 8021q: adding VLAN 0 to HW filter on device bond0 [ 179.505052][ T9044] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 179.518443][ T9046] chnl_net:caif_netlink_parms(): no params data found [ 179.528509][ T2817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 179.538467][ T2817] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 179.547803][ T2817] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.555193][ T2817] bridge0: port 2(bridge_slave_1) entered forwarding state [ 179.610348][ T9042] device hsr_slave_0 entered promiscuous mode [ 179.667466][ T9042] device hsr_slave_1 entered promiscuous mode [ 179.726833][ T9042] debugfs: Directory 'hsr0' with parent '/' already present! [ 179.735861][ T9044] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 179.765141][ T2817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 179.774171][ T2817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 179.783412][ T2817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 179.793129][ T2817] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 179.801911][ T2817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 179.810349][ T2817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 179.818431][ T2817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 179.827357][ T2817] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 179.839024][ T2817] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 179.867328][ T9036] 8021q: adding VLAN 0 to HW filter on device team0 [ 179.888669][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 179.897543][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 179.908824][ T9044] team0: Port device team_slave_0 added [ 179.927583][ T2817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 179.936286][ T2817] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 179.945425][ T2817] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.952562][ T2817] bridge0: port 1(bridge_slave_0) entered forwarding state [ 179.966130][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 179.975529][ T9044] team0: Port device team_slave_1 added [ 180.014522][ T9046] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.022841][ T9046] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.031483][ T9046] device bridge_slave_0 entered promiscuous mode [ 180.039886][ T9046] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.047926][ T9046] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.056153][ T9046] device bridge_slave_1 entered promiscuous mode [ 180.149420][ T9044] device hsr_slave_0 entered promiscuous mode [ 180.187110][ T9044] device hsr_slave_1 entered promiscuous mode [ 180.226817][ T9044] debugfs: Directory 'hsr0' with parent '/' already present! [ 180.236399][ T9046] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 180.247806][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 180.256318][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 180.265021][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 180.273692][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 180.282451][ T9047] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.289657][ T9047] bridge0: port 2(bridge_slave_1) entered forwarding state [ 180.297444][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 180.307856][ T9038] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 180.324195][ T9051] chnl_net:caif_netlink_parms(): no params data found [ 180.344361][ T9046] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 180.386485][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 180.432577][ T9046] team0: Port device team_slave_0 added [ 180.441695][ T9046] team0: Port device team_slave_1 added [ 180.458852][ T9055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 180.467637][ T9055] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 180.476015][ T9055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 180.486482][ T9055] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 180.503489][ T9036] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 180.515034][ T9036] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 180.556658][ T9055] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 180.564681][ T9055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 180.573875][ T9055] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 180.583112][ T9055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 180.592784][ T9055] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 180.605195][ T9055] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 180.632934][ T9051] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.640902][ T9051] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.649136][ T9051] device bridge_slave_0 entered promiscuous mode [ 180.662474][ T9051] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.669681][ T9051] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.678208][ T9051] device bridge_slave_1 entered promiscuous mode [ 180.741500][ T9046] device hsr_slave_0 entered promiscuous mode [ 180.797832][ T9046] device hsr_slave_1 entered promiscuous mode [ 180.836796][ T9046] debugfs: Directory 'hsr0' with parent '/' already present! [ 180.847204][ T9036] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 180.863888][ T9038] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 180.925752][ T9051] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 180.970088][ T9051] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 181.005803][ T9051] team0: Port device team_slave_0 added [ 181.032088][ T9051] team0: Port device team_slave_1 added [ 181.079756][ T9042] 8021q: adding VLAN 0 to HW filter on device bond0 [ 181.149203][ T9051] device hsr_slave_0 entered promiscuous mode [ 181.207582][ T9051] device hsr_slave_1 entered promiscuous mode [ 181.256929][ T9051] debugfs: Directory 'hsr0' with parent '/' already present! [ 181.273241][ T9042] 8021q: adding VLAN 0 to HW filter on device team0 [ 181.308218][ T9044] 8021q: adding VLAN 0 to HW filter on device bond0 [ 181.324783][ T9048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 181.332674][ T9048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 181.364049][ T9048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 181.373614][ T9048] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 181.397503][ T9048] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.404688][ T9048] bridge0: port 1(bridge_slave_0) entered forwarding state [ 181.413137][ T9048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 181.421921][ T9048] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 181.430587][ T9048] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.438013][ T9048] bridge0: port 2(bridge_slave_1) entered forwarding state [ 181.445941][ T9048] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 20:28:49 executing program 0: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r1}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000080)={'sha1-ssse3\x00'}}) [ 181.489290][ T9055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 20:28:49 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB='\x00'], 0x2) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000001c0)={0xf8, 0x972, 0x0, 0x11c, 0x8, 0x8, 0x4, 0xd5d4}, 0x20) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) [ 181.543463][ T9055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 181.577492][ T9055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 20:28:49 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0x40045644, &(0x7f0000000040)={0x1, 0x0, @raw_data}) [ 181.611578][ T9055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 181.631049][ T9055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 181.652975][ T9055] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 181.676391][ T9055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 181.696428][ T9055] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 181.702018][ C0] hrtimer: interrupt took 41805 ns 20:28:49 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0x40045644, &(0x7f0000000040)={0x1, 0x0, @raw_data}) [ 181.727580][ T9044] 8021q: adding VLAN 0 to HW filter on device team0 20:28:49 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB='\x00'], 0x2) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000001c0)={0xf8, 0x972, 0x0, 0x11c, 0x8, 0x8, 0x4, 0xd5d4}, 0x20) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) [ 181.768062][ T9055] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 181.777700][ T9055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 181.786426][ T9055] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 181.836360][ T9042] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 20:28:49 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0x40045644, &(0x7f0000000040)={0x1, 0x0, @raw_data}) [ 181.878749][ T9042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 181.918099][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 20:28:49 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB='\x00'], 0x2) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000001c0)={0xf8, 0x972, 0x0, 0x11c, 0x8, 0x8, 0x4, 0xd5d4}, 0x20) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) [ 181.935798][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 181.960265][ T9047] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.967423][ T9047] bridge0: port 1(bridge_slave_0) entered forwarding state 20:28:49 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000044ff8)={0xffffffffffffffff}) bind$unix(r0, &(0x7f000055b000)=@file={0x1, './file0\x00'}, 0xa) connect$unix(r0, &(0x7f00003de000)=@file={0x1, './file0\x00'}, 0xa) [ 181.987052][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 181.995500][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 182.017452][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 182.026196][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 182.087261][ T9047] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.094442][ T9047] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.103892][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 182.120681][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 182.143096][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 182.186446][ T9046] 8021q: adding VLAN 0 to HW filter on device bond0 [ 182.212734][ T9048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 182.222455][ T9048] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 182.238684][ T9048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 182.247499][ T9048] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 182.255841][ T9048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 182.265023][ T9048] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 182.273823][ T9048] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 182.296121][ T9042] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 182.303881][ T2817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 182.318077][ T2817] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 182.330060][ T9044] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 182.343648][ T9046] 8021q: adding VLAN 0 to HW filter on device team0 [ 182.360590][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.369577][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.400165][ T9048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 182.410232][ T9048] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.420327][ T9048] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.427707][ T9048] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.437081][ T9048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 182.445644][ T9048] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 182.454471][ T9048] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.461613][ T9048] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.469579][ T9048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 182.497289][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 182.523278][ T9044] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 182.580366][ T9051] 8021q: adding VLAN 0 to HW filter on device bond0 [ 182.597041][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 182.606109][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 182.617496][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 20:28:50 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 182.627671][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 182.643854][ T2817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 182.657905][ T2817] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 182.703779][ T9051] 8021q: adding VLAN 0 to HW filter on device team0 [ 182.716450][ T9048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 182.733631][ T9048] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 182.743215][ T9048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.757066][ T9048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.768219][ T9046] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 182.786139][ T9046] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 182.807080][ T9048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 182.815615][ T9048] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 182.827592][ T2817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 182.836237][ T2817] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.845671][ T2817] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.852807][ T2817] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.862502][ T2817] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 182.887151][ T9055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 182.896109][ T9055] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 182.924842][ T9055] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.932101][ T9055] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.950895][ T9046] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 182.964406][ T2817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 20:28:50 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) timer_create(0x0, &(0x7f0000000000), &(0x7f0000044000)) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev}, 0x1c) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x133, 0x0, 0x0, 0xff7d) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000004c0)=[@text64={0x40, &(0x7f0000000400)="69065f6e000066baf80cb884a8908fef66bafc0cedb805000000b94ef54bfc0f01c10fc7700748b804000000000000000f23d00f21f8353000000a0f23f8b9800000c00f3235001000000f30b8010000000f01c166b87e008ec848b812580000000000000f23c00f21f835010009000f23f8b9f0090000b809000000ba000000000f30", 0x315}], 0x1, 0x0, 0x0, 0xfffffffffffffee2) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x40, 0x0, 0xfffffffffffffdd4) open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r4, &(0x7f00000001c0)={0xc, 0x8, 0xfa0e, {0x0}}, 0x9918) dup3(r0, 0xffffffffffffffff, 0x0) tkill(0x0, 0x0) [ 183.000179][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 183.009814][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 183.022648][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 183.031779][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 183.043994][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 183.060501][ T9051] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 183.079431][ T9051] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 183.099747][ T2817] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 183.108173][ T2817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 183.132459][ T2817] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 183.142132][ T2817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 183.151023][ T2817] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 183.161402][ T2817] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 183.168847][ T9126] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 183.210529][ T9051] 8021q: adding VLAN 0 to HW filter on device batadv0 20:28:50 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000001c0)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x69e}}], 0x0, 0x0, 0x0) preadv(r1, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154}, {&(0x7f00000003c0)=""/68}, {&(0x7f00000005c0)=""/214}, {&(0x7f00000006c0)=""/194}, {&(0x7f00000007c0)=""/146}, {&(0x7f0000000880)=""/144}, {&(0x7f0000000480)=""/13}, {&(0x7f0000000940)=""/71}], 0x2a9, 0x0) 20:28:51 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semtimedop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x3400}], 0x1, 0x0) 20:28:51 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB='\x00'], 0x2) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000001c0)={0xf8, 0x972, 0x0, 0x11c, 0x8, 0x8, 0x4, 0xd5d4}, 0x20) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) 20:28:51 executing program 1: r0 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000300)={'syZ', 0x1}, &(0x7f0000000480)="f56fc178e899602542d2b6ef7fbafcf8562e2a81da513f2b5b97f5b85cca25cece2ba76c631ba8727e52fcd917aef91b7088ba2521f1adab3a0f6fcb", 0x3c, 0xfffffffffffffffe) io_setup(0x30, &(0x7f0000000180)) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 20:28:51 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:28:51 executing program 3: r0 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f0000000000)) 20:28:51 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000001c0)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x69e}}], 0x0, 0x0, 0x0) preadv(r1, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154}, {&(0x7f00000003c0)=""/68}, {&(0x7f00000005c0)=""/214}, {&(0x7f00000006c0)=""/194}, {&(0x7f00000007c0)=""/146}, {&(0x7f0000000880)=""/144}, {&(0x7f0000000480)=""/13}, {&(0x7f0000000940)=""/71}], 0x2a9, 0x0) 20:28:51 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000001c0)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x69e}}], 0x0, 0x0, 0x0) preadv(r1, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154}, {&(0x7f00000003c0)=""/68}, {&(0x7f00000005c0)=""/214}, {&(0x7f00000006c0)=""/194}, {&(0x7f00000007c0)=""/146}, {&(0x7f0000000880)=""/144}, {&(0x7f0000000480)=""/13}, {&(0x7f0000000940)=""/71}], 0x2a9, 0x0) 20:28:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_tcp_buf(r1, 0x6, 0x1f, &(0x7f00000000c0)="a4", 0x1) 20:28:51 executing program 1: r0 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000300)={'syZ', 0x1}, &(0x7f0000000480)="f56fc178e899602542d2b6ef7fbafcf8562e2a81da513f2b5b97f5b85cca25cece2ba76c631ba8727e52fcd917aef91b7088ba2521f1adab3a0f6fcb", 0x3c, 0xfffffffffffffffe) io_setup(0x30, &(0x7f0000000180)) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 20:28:51 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semtimedop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x3400}], 0x1, 0x0) 20:28:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 20:28:51 executing program 1: r0 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000300)={'syZ', 0x1}, &(0x7f0000000480)="f56fc178e899602542d2b6ef7fbafcf8562e2a81da513f2b5b97f5b85cca25cece2ba76c631ba8727e52fcd917aef91b7088ba2521f1adab3a0f6fcb", 0x3c, 0xfffffffffffffffe) io_setup(0x30, &(0x7f0000000180)) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 20:28:51 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semtimedop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x3400}], 0x1, 0x0) 20:28:51 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000001c0)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x69e}}], 0x0, 0x0, 0x0) preadv(r1, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154}, {&(0x7f00000003c0)=""/68}, {&(0x7f00000005c0)=""/214}, {&(0x7f00000006c0)=""/194}, {&(0x7f00000007c0)=""/146}, {&(0x7f0000000880)=""/144}, {&(0x7f0000000480)=""/13}, {&(0x7f0000000940)=""/71}], 0x2a9, 0x0) 20:28:52 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000001c0)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x69e}}], 0x0, 0x0, 0x0) preadv(r1, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154}, {&(0x7f00000003c0)=""/68}, {&(0x7f00000005c0)=""/214}, {&(0x7f00000006c0)=""/194}, {&(0x7f00000007c0)=""/146}, {&(0x7f0000000880)=""/144}, {&(0x7f0000000480)=""/13}, {&(0x7f0000000940)=""/71}], 0x2a9, 0x0) 20:28:52 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:28:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x50, 0x0, &(0x7f0000000000)=0x270) 20:28:52 executing program 1: r0 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000300)={'syZ', 0x1}, &(0x7f0000000480)="f56fc178e899602542d2b6ef7fbafcf8562e2a81da513f2b5b97f5b85cca25cece2ba76c631ba8727e52fcd917aef91b7088ba2521f1adab3a0f6fcb", 0x3c, 0xfffffffffffffffe) io_setup(0x30, &(0x7f0000000180)) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 20:28:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 20:28:52 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000001c0)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x69e}}], 0x0, 0x0, 0x0) preadv(r1, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154}, {&(0x7f00000003c0)=""/68}, {&(0x7f00000005c0)=""/214}, {&(0x7f00000006c0)=""/194}, {&(0x7f00000007c0)=""/146}, {&(0x7f0000000880)=""/144}, {&(0x7f0000000480)=""/13}, {&(0x7f0000000940)=""/71}], 0x2a9, 0x0) 20:28:52 executing program 5: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) close(r0) 20:28:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 20:28:52 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}], 0x1, 0x60}}], 0x48}, 0x0) 20:28:52 executing program 5: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) close(r0) 20:28:52 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000001c0)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x69e}}], 0x0, 0x0, 0x0) preadv(r1, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154}, {&(0x7f00000003c0)=""/68}, {&(0x7f00000005c0)=""/214}, {&(0x7f00000006c0)=""/194}, {&(0x7f00000007c0)=""/146}, {&(0x7f0000000880)=""/144}, {&(0x7f0000000480)=""/13}, {&(0x7f0000000940)=""/71}], 0x2a9, 0x0) 20:28:52 executing program 1: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, 0x0) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000200)={'broute\x00'}, &(0x7f0000000000)=0x78) 20:28:52 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x3d1, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x14, 0x2, [@IFLA_BOND_AD_LACP_RATE={0x8}, @IFLA_BOND_MODE={0x8, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 185.574778][ T9247] netlink: 'syz-executor.4': attribute type 21 has an invalid length. [ 185.643396][ T9247] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 185.690291][ T9247] INFO: trying to register non-static key. [ 185.696235][ T9247] the code is fine but needs lockdep annotation. [ 185.702560][ T9247] turning off the locking correctness validator. [ 185.708901][ T9247] CPU: 1 PID: 9247 Comm: syz-executor.4 Not tainted 5.4.0-rc5-next-20191029 #0 [ 185.717838][ T9247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.723668][ T3920] kobject: 'loop0' (000000000fbb9f16): kobject_uevent_env [ 185.728852][ T9247] Call Trace: [ 185.728877][ T9247] dump_stack+0x172/0x1f0 [ 185.728894][ T9247] register_lock_class+0x179e/0x1850 [ 185.728908][ T9247] ? is_dynamic_key+0x1c0/0x1c0 [ 185.728918][ T9247] ? mark_held_locks+0xa4/0xf0 [ 185.728930][ T9247] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 185.728941][ T9247] ? stack_depot_save+0x25a/0x450 [ 185.728951][ T9247] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 185.728963][ T9247] __lock_acquire+0xf4/0x4a00 [ 185.728983][ T9247] ? _raw_spin_unlock_irqrestore+0x9f/0xe0 [ 185.758920][ T3920] kobject: 'loop0' (000000000fbb9f16): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 185.764399][ T9247] ? stack_depot_save+0x25a/0x450 [ 185.801599][ T9247] ? mark_held_locks+0xf0/0xf0 [ 185.806378][ T9247] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 185.812216][ T9247] ? kasan_kmalloc+0x9/0x10 [ 185.816737][ T9247] ? __kmalloc_node+0x4e/0x70 [ 185.821956][ T9247] ? kvmalloc_node+0x68/0x100 [ 185.826658][ T9247] ? alloc_netdev_mqs+0x8b4/0xde0 [ 185.831816][ T9247] ? rtnl_create_link+0x22d/0xab0 [ 185.837026][ T9247] ? __rtnl_newlink+0xfa3/0x16e0 [ 185.842023][ T9247] ? rtnl_newlink+0x69/0xa0 [ 185.846546][ T9247] lock_acquire+0x190/0x410 [ 185.851120][ T9247] ? bond_3ad_update_lacp_rate+0xb9/0x290 [ 185.856868][ T9247] _raw_spin_lock_bh+0x33/0x50 [ 185.861648][ T9247] ? bond_3ad_update_lacp_rate+0xb9/0x290 [ 185.867382][ T9247] bond_3ad_update_lacp_rate+0xb9/0x290 [ 185.873729][ T9247] ? bond_opt_get_val+0x120/0x120 [ 185.874421][ T3920] kobject: 'loop2' (000000000fa281cf): kobject_uevent_env [ 185.878752][ T9247] ? bond_3ad_lacpdu_recv+0x730/0x730 [ 185.878766][ T9247] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 185.878778][ T9247] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 185.878791][ T9247] bond_option_lacp_rate_set+0x66/0x80 [ 185.878802][ T9247] __bond_opt_set+0x2a1/0x540 [ 185.878815][ T9247] bond_changelink+0x139e/0x1bd0 [ 185.878826][ T9247] ? memset+0x32/0x40 [ 185.878837][ T9247] ? bond_slave_changelink+0x1e0/0x1e0 [ 185.878857][ T9247] bond_newlink+0x2d/0x90 [ 185.911721][ T3920] kobject: 'loop2' (000000000fa281cf): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 185.913400][ T9247] ? bond_changelink+0x1bd0/0x1bd0 [ 185.913421][ T9247] __rtnl_newlink+0x10a1/0x16e0 [ 185.952686][ T9247] ? rtnl_link_unregister+0x250/0x250 [ 185.958079][ T9247] ? is_bpf_text_address+0xce/0x160 [ 185.959305][ T3920] kobject: 'loop5' (00000000188dff4a): kobject_uevent_env [ 185.963541][ T9247] ? kernel_text_address+0x73/0xf0 [ 185.963555][ T9247] ? unwind_get_return_address+0x61/0xa0 [ 185.963575][ T9247] ? profile_setup.cold+0xbb/0xbb [ 185.986470][ T9247] ? arch_stack_walk+0x97/0xf0 [ 185.991286][ T9247] ? stack_trace_save+0xac/0xe0 [ 185.996156][ T9247] ? stack_trace_consume_entry+0x190/0x190 [ 186.001972][ T9247] ? mark_lock+0xc2/0x1220 [ 186.007189][ T9247] ? save_stack+0x5c/0x90 [ 186.011530][ T9247] ? save_stack+0x23/0x90 [ 186.015873][ T9247] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 186.021694][ T9247] ? kasan_kmalloc+0x9/0x10 [ 186.026210][ T9247] ? kmem_cache_alloc_trace+0x158/0x790 [ 186.031796][ T9247] ? rtnl_newlink+0x4b/0xa0 [ 186.036327][ T9247] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 186.037111][ T3920] kobject: 'loop5' (00000000188dff4a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 186.041872][ T9247] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 186.041892][ T9247] rtnl_newlink+0x69/0xa0 [ 186.041905][ T9247] ? __rtnl_newlink+0x16e0/0x16e0 [ 186.041922][ T9247] rtnetlink_rcv_msg+0x45e/0xaf0 [ 186.072424][ T9247] ? rtnl_bridge_getlink+0x910/0x910 [ 186.077727][ T9247] ? netlink_deliver_tap+0x228/0xbe0 [ 186.083633][ T9247] ? find_held_lock+0x35/0x130 [ 186.088419][ T9247] netlink_rcv_skb+0x177/0x450 [ 186.093202][ T9247] ? rtnl_bridge_getlink+0x910/0x910 [ 186.098526][ T9247] ? netlink_ack+0xb50/0xb50 [ 186.103139][ T9247] ? __kasan_check_read+0x11/0x20 [ 186.108177][ T9247] ? netlink_deliver_tap+0x24a/0xbe0 [ 186.113480][ T9247] rtnetlink_rcv+0x1d/0x30 [ 186.118007][ T9247] netlink_unicast+0x531/0x710 [ 186.121670][ T3920] kobject: 'loop1' (0000000000371cf4): kobject_uevent_env [ 186.122779][ T9247] ? netlink_attachskb+0x7c0/0x7c0 [ 186.122798][ T9247] ? _copy_from_iter_full+0x25d/0x8c0 [ 186.140832][ T9247] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 186.146575][ T9247] ? __check_object_size+0x3d/0x437 [ 186.152507][ T9247] netlink_sendmsg+0x8cf/0xda0 [ 186.157661][ T9247] ? netlink_unicast+0x710/0x710 [ 186.163051][ T9247] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 186.168618][ T9247] ? apparmor_socket_sendmsg+0x2a/0x30 [ 186.170887][ T3920] kobject: 'loop1' (0000000000371cf4): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 186.174086][ T9247] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 186.174099][ T9247] ? security_socket_sendmsg+0x8d/0xc0 [ 186.174119][ T9247] ? netlink_unicast+0x710/0x710 [ 186.201122][ T9247] sock_sendmsg+0xd7/0x130 [ 186.205549][ T9247] ___sys_sendmsg+0x803/0x920 [ 186.210254][ T9247] ? copy_msghdr_from_user+0x440/0x440 [ 186.210274][ T9247] ? __kasan_check_read+0x11/0x20 [ 186.220835][ T9247] ? __fget+0x37f/0x550 [ 186.225008][ T9247] ? ksys_dup3+0x3e0/0x3e0 [ 186.229436][ T9247] ? __fget_light+0x1a9/0x230 [ 186.234153][ T9247] ? __fdget+0x1b/0x20 [ 186.238231][ T9247] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 186.244484][ T9247] __sys_sendmsg+0x105/0x1d0 [ 186.249082][ T9247] ? __sys_sendmsg_sock+0xd0/0xd0 [ 186.254122][ T9247] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 186.259592][ T9247] ? do_syscall_64+0x26/0x760 [ 186.264976][ T9247] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.271055][ T9247] ? do_syscall_64+0x26/0x760 [ 186.275741][ T9247] __x64_sys_sendmsg+0x78/0xb0 [ 186.280516][ T9247] do_syscall_64+0xfa/0x760 [ 186.284381][ T3920] kobject: 'loop1' (0000000000371cf4): kobject_uevent_env 20:28:53 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:28:53 executing program 5: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) close(r0) 20:28:53 executing program 1: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, 0x0) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000200)={'broute\x00'}, &(0x7f0000000000)=0x78) 20:28:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 20:28:53 executing program 3: r0 = memfd_create(&(0x7f0000000080)='dev ', 0x3) fcntl$addseals(r0, 0x409, 0xd) write(r0, &(0x7f0000001c40)="b6", 0x1) 20:28:53 executing program 5: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) close(r0) 20:28:53 executing program 1: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, 0x0) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000200)={'broute\x00'}, &(0x7f0000000000)=0x78) 20:28:53 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x476, 0x101102) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001480)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0xfffffffffffffe4c}}, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000080)={0x4, 0x0, 0x0}) write$evdev(r0, &(0x7f0000000100)=[{{0x0, 0x7530}}], 0xff49) 20:28:53 executing program 1: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, 0x0) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000200)={'broute\x00'}, &(0x7f0000000000)=0x78) 20:28:53 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in=@multicast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x2}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) [ 186.285032][ T9247] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.285042][ T9247] RIP: 0033:0x459f49 [ 186.285059][ T9247] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 186.321812][ T9247] RSP: 002b:00007fc6339bbc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 186.330254][ T9247] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f49 20:28:53 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in=@multicast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x2}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) [ 186.331970][ T3920] kobject: 'loop1' (0000000000371cf4): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 186.338241][ T9247] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 186.338247][ T9247] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 186.338255][ T9247] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc6339bc6d4 [ 186.338262][ T9247] R13: 00000000004c8338 R14: 00000000004de608 R15: 00000000ffffffff [ 186.400012][ T3920] kobject: 'loop3' (000000006ac884db): kobject_uevent_env [ 186.414216][ T3920] kobject: 'loop3' (000000006ac884db): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 186.488899][ T3920] kobject: 'loop3' (000000006ac884db): kobject_uevent_env [ 186.496097][ T3920] kobject: 'loop3' (000000006ac884db): fill_kobj_path: path = '/devices/virtual/block/loop3' 20:28:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x3d1, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x14, 0x2, [@IFLA_BOND_AD_LACP_RATE={0x8}, @IFLA_BOND_MODE={0x8, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) [ 186.572043][ T3920] kobject: 'loop4' (00000000bc15ec9a): kobject_uevent_env [ 186.585543][ T3920] kobject: 'loop4' (00000000bc15ec9a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 186.603930][ T9285] netlink: 'syz-executor.4': attribute type 21 has an invalid length. [ 186.612470][ T3920] kobject: 'loop0' (000000000fbb9f16): kobject_uevent_env [ 186.628634][ T9285] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 186.634103][ T3920] kobject: 'loop0' (000000000fbb9f16): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 186.668812][ T3920] kobject: 'loop5' (00000000188dff4a): kobject_uevent_env [ 186.681337][ T3920] kobject: 'loop5' (00000000188dff4a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 186.681555][ T9285] kobject: 'bond1' (00000000910ef303): kobject_add_internal: parent: 'net', set: 'devices' 20:28:54 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:28:54 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in=@multicast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x2}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) 20:28:54 executing program 3: r0 = memfd_create(&(0x7f0000000080)='dev ', 0x3) fcntl$addseals(r0, 0x409, 0xd) write(r0, &(0x7f0000001c40)="b6", 0x1) 20:28:54 executing program 0: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000180)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) 20:28:54 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x476, 0x101102) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001480)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0xfffffffffffffe4c}}, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000080)={0x4, 0x0, 0x0}) write$evdev(r0, &(0x7f0000000100)=[{{0x0, 0x7530}}], 0xff49) [ 186.740111][ T9285] kobject: 'bond1' (00000000910ef303): kobject_uevent_env [ 186.747476][ T9285] kobject: 'bond1' (00000000910ef303): fill_kobj_path: path = '/devices/virtual/net/bond1' 20:28:54 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in=@multicast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x2}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@dev}}, 0xe8) [ 186.782850][ T9285] kobject: 'queues' (000000001d57473d): kobject_add_internal: parent: 'bond1', set: '' [ 186.801011][ T3920] kobject: 'loop2' (000000000fa281cf): kobject_uevent_env [ 186.807976][ T9285] kobject: 'queues' (000000001d57473d): kobject_uevent_env [ 186.814758][ T3920] kobject: 'loop2' (000000000fa281cf): fill_kobj_path: path = '/devices/virtual/block/loop2' 20:28:54 executing program 3: r0 = memfd_create(&(0x7f0000000080)='dev ', 0x3) fcntl$addseals(r0, 0x409, 0xd) write(r0, &(0x7f0000001c40)="b6", 0x1) [ 186.817628][ T9285] kobject: 'queues' (000000001d57473d): kobject_uevent_env: filter function caused the event to drop! [ 186.837353][ T9285] kobject: 'rx-0' (000000007e43ef8e): kobject_add_internal: parent: 'queues', set: 'queues' [ 186.854617][ T9285] kobject: 'rx-0' (000000007e43ef8e): kobject_uevent_env [ 186.861964][ T9285] kobject: 'rx-0' (000000007e43ef8e): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-0' [ 186.873474][ T9285] kobject: 'rx-1' (0000000004aed1d2): kobject_add_internal: parent: 'queues', set: 'queues' [ 186.883247][ T3920] kobject: 'loop3' (000000006ac884db): kobject_uevent_env [ 186.892285][ T9285] kobject: 'rx-1' (0000000004aed1d2): kobject_uevent_env [ 186.915753][ T9285] kobject: 'rx-1' (0000000004aed1d2): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-1' 20:28:54 executing program 3: r0 = memfd_create(&(0x7f0000000080)='dev ', 0x3) fcntl$addseals(r0, 0x409, 0xd) write(r0, &(0x7f0000001c40)="b6", 0x1) 20:28:54 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x476, 0x101102) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001480)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0xfffffffffffffe4c}}, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000080)={0x4, 0x0, 0x0}) write$evdev(r0, &(0x7f0000000100)=[{{0x0, 0x7530}}], 0xff49) [ 186.920171][ T3920] kobject: 'loop3' (000000006ac884db): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 186.927296][ T9285] kobject: 'rx-2' (00000000fab0b4bb): kobject_add_internal: parent: 'queues', set: 'queues' [ 186.948959][ T9285] kobject: 'rx-2' (00000000fab0b4bb): kobject_uevent_env [ 186.957394][ T9285] kobject: 'rx-2' (00000000fab0b4bb): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-2' [ 186.968944][ T9285] kobject: 'rx-3' (00000000d67b8c4b): kobject_add_internal: parent: 'queues', set: 'queues' [ 186.979767][ T9285] kobject: 'rx-3' (00000000d67b8c4b): kobject_uevent_env [ 186.987386][ T9285] kobject: 'rx-3' (00000000d67b8c4b): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-3' [ 186.998992][ T9285] kobject: 'rx-4' (0000000067c1bf40): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.006866][ T3920] kobject: 'loop1' (0000000000371cf4): kobject_uevent_env [ 187.019030][ T9285] kobject: 'rx-4' (0000000067c1bf40): kobject_uevent_env 20:28:54 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x476, 0x101102) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001480)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0xfffffffffffffe4c}}, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000080)={0x4, 0x0, 0x0}) write$evdev(r0, &(0x7f0000000100)=[{{0x0, 0x7530}}], 0xff49) [ 187.022044][ T3920] kobject: 'loop1' (0000000000371cf4): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 187.034329][ T9285] kobject: 'rx-4' (0000000067c1bf40): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-4' [ 187.040053][ T3920] kobject: 'loop3' (000000006ac884db): kobject_uevent_env [ 187.084061][ T9285] kobject: 'rx-5' (00000000348d053d): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.094751][ T9285] kobject: 'rx-5' (00000000348d053d): kobject_uevent_env [ 187.103248][ T3920] kobject: 'loop3' (000000006ac884db): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 187.103570][ T9285] kobject: 'rx-5' (00000000348d053d): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-5' [ 187.142121][ T9285] kobject: 'rx-6' (000000001ba0ea88): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.152825][ T9285] kobject: 'rx-6' (000000001ba0ea88): kobject_uevent_env [ 187.154860][ T3920] kobject: 'loop1' (0000000000371cf4): kobject_uevent_env [ 187.160347][ T9285] kobject: 'rx-6' (000000001ba0ea88): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-6' [ 187.178699][ T9285] kobject: 'rx-7' (000000008666fb0b): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.189455][ T9285] kobject: 'rx-7' (000000008666fb0b): kobject_uevent_env [ 187.197016][ T9285] kobject: 'rx-7' (000000008666fb0b): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-7' [ 187.204585][ T3920] kobject: 'loop1' (0000000000371cf4): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 187.208502][ T9285] kobject: 'rx-8' (0000000080fd376b): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.229066][ T9285] kobject: 'rx-8' (0000000080fd376b): kobject_uevent_env [ 187.236378][ T9285] kobject: 'rx-8' (0000000080fd376b): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-8' [ 187.248046][ T9285] kobject: 'rx-9' (000000005b21ff0a): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.281187][ T9285] kobject: 'rx-9' (000000005b21ff0a): kobject_uevent_env [ 187.311355][ T9285] kobject: 'rx-9' (000000005b21ff0a): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-9' [ 187.343897][ T9285] kobject: 'rx-10' (00000000825d8229): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.368672][ T9285] kobject: 'rx-10' (00000000825d8229): kobject_uevent_env [ 187.376078][ T9285] kobject: 'rx-10' (00000000825d8229): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-10' [ 187.388719][ T9285] kobject: 'rx-11' (00000000fc4a8415): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.399534][ T9285] kobject: 'rx-11' (00000000fc4a8415): kobject_uevent_env 20:28:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@newlink={0x50, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x12, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0xa, 0x1, {0x2}}}}}]}, 0x50}}, 0x0) [ 187.416931][ T9285] kobject: 'rx-11' (00000000fc4a8415): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-11' [ 187.435988][ T3920] kobject: 'loop2' (000000000fa281cf): kobject_uevent_env [ 187.440538][ T9285] kobject: 'rx-12' (00000000ededc771): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.451143][ T3920] kobject: 'loop2' (000000000fa281cf): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 187.453880][ T9285] kobject: 'rx-12' (00000000ededc771): kobject_uevent_env [ 187.480058][ T9285] kobject: 'rx-12' (00000000ededc771): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-12' [ 187.496811][ T9285] kobject: 'rx-13' (00000000b11627b0): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.507698][ T9285] kobject: 'rx-13' (00000000b11627b0): kobject_uevent_env [ 187.514880][ T9285] kobject: 'rx-13' (00000000b11627b0): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-13' [ 187.526845][ T9285] kobject: 'rx-14' (000000009993bb95): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.538259][ T9285] kobject: 'rx-14' (000000009993bb95): kobject_uevent_env [ 187.545665][ T9285] kobject: 'rx-14' (000000009993bb95): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-14' [ 187.557077][ T9285] kobject: 'rx-15' (00000000854d585b): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.567378][ T9285] kobject: 'rx-15' (00000000854d585b): kobject_uevent_env [ 187.574533][ T9285] kobject: 'rx-15' (00000000854d585b): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-15' [ 187.586115][ T9285] kobject: 'tx-0' (000000009ab5eaa8): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.597033][ T9285] kobject: 'tx-0' (000000009ab5eaa8): kobject_uevent_env [ 187.604100][ T9285] kobject: 'tx-0' (000000009ab5eaa8): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-0' [ 187.615423][ T9285] kobject: 'tx-1' (00000000d3d41ff8): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.627117][ T9285] kobject: 'tx-1' (00000000d3d41ff8): kobject_uevent_env [ 187.634234][ T9285] kobject: 'tx-1' (00000000d3d41ff8): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-1' [ 187.646134][ T9285] kobject: 'tx-2' (00000000368497cd): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.656785][ T9285] kobject: 'tx-2' (00000000368497cd): kobject_uevent_env [ 187.663849][ T9285] kobject: 'tx-2' (00000000368497cd): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-2' [ 187.675150][ T9285] kobject: 'tx-3' (000000003e7ebde3): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.685645][ T9285] kobject: 'tx-3' (000000003e7ebde3): kobject_uevent_env [ 187.692764][ T9285] kobject: 'tx-3' (000000003e7ebde3): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-3' [ 187.704913][ T9285] kobject: 'tx-4' (00000000775c9791): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.715458][ T9285] kobject: 'tx-4' (00000000775c9791): kobject_uevent_env [ 187.722687][ T9285] kobject: 'tx-4' (00000000775c9791): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-4' [ 187.733812][ T9285] kobject: 'tx-5' (0000000092332b27): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.744162][ T9285] kobject: 'tx-5' (0000000092332b27): kobject_uevent_env [ 187.751299][ T9285] kobject: 'tx-5' (0000000092332b27): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-5' [ 187.762502][ T9285] kobject: 'tx-6' (00000000e9b36594): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.773104][ T9285] kobject: 'tx-6' (00000000e9b36594): kobject_uevent_env [ 187.780726][ T9285] kobject: 'tx-6' (00000000e9b36594): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-6' [ 187.792040][ T9285] kobject: 'tx-7' (000000009e10c410): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.802662][ T9285] kobject: 'tx-7' (000000009e10c410): kobject_uevent_env [ 187.809780][ T9285] kobject: 'tx-7' (000000009e10c410): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-7' [ 187.821056][ T9285] kobject: 'tx-8' (0000000081485a36): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.831595][ T9285] kobject: 'tx-8' (0000000081485a36): kobject_uevent_env [ 187.840145][ T9285] kobject: 'tx-8' (0000000081485a36): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-8' [ 187.852606][ T9285] kobject: 'tx-9' (00000000ea2664b1): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.863595][ T9285] kobject: 'tx-9' (00000000ea2664b1): kobject_uevent_env [ 187.871025][ T9285] kobject: 'tx-9' (00000000ea2664b1): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-9' [ 187.882202][ T9285] kobject: 'tx-10' (00000000411768ed): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.892799][ T9285] kobject: 'tx-10' (00000000411768ed): kobject_uevent_env [ 187.900677][ T9285] kobject: 'tx-10' (00000000411768ed): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-10' [ 187.912050][ T9285] kobject: 'tx-11' (00000000e1262683): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.922451][ T9285] kobject: 'tx-11' (00000000e1262683): kobject_uevent_env [ 187.929670][ T9285] kobject: 'tx-11' (00000000e1262683): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-11' [ 187.942382][ T9285] kobject: 'tx-12' (00000000e5f070de): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.952756][ T9285] kobject: 'tx-12' (00000000e5f070de): kobject_uevent_env [ 187.960243][ T9285] kobject: 'tx-12' (00000000e5f070de): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-12' [ 187.971563][ T9285] kobject: 'tx-13' (000000002e5c1748): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.982036][ T9285] kobject: 'tx-13' (000000002e5c1748): kobject_uevent_env [ 187.989249][ T9285] kobject: 'tx-13' (000000002e5c1748): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-13' [ 188.000852][ T9285] kobject: 'tx-14' (00000000d056e2ab): kobject_add_internal: parent: 'queues', set: 'queues' [ 188.011365][ T9285] kobject: 'tx-14' (00000000d056e2ab): kobject_uevent_env [ 188.019235][ T9285] kobject: 'tx-14' (00000000d056e2ab): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-14' [ 188.030561][ T9285] kobject: 'tx-15' (00000000e7a85425): kobject_add_internal: parent: 'queues', set: 'queues' [ 188.041137][ T9285] kobject: 'tx-15' (00000000e7a85425): kobject_uevent_env [ 188.048355][ T9285] kobject: 'tx-15' (00000000e7a85425): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-15' [ 188.060449][ T9285] kobject: 'batman_adv' (000000002f8caab6): kobject_add_internal: parent: 'bond1', set: '' 20:28:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x3d1, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x14, 0x2, [@IFLA_BOND_AD_LACP_RATE={0x8}, @IFLA_BOND_MODE={0x8, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 20:28:55 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x476, 0x101102) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001480)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0xfffffffffffffe4c}}, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000080)={0x4, 0x0, 0x0}) write$evdev(r0, &(0x7f0000000100)=[{{0x0, 0x7530}}], 0xff49) 20:28:55 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x476, 0x101102) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001480)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0xfffffffffffffe4c}}, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000080)={0x4, 0x0, 0x0}) write$evdev(r0, &(0x7f0000000100)=[{{0x0, 0x7530}}], 0xff49) [ 188.071605][ T9297] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 188.097716][ T9320] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 188.110606][ T3920] kobject: 'loop4' (00000000bc15ec9a): kobject_uevent_env 20:28:55 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x476, 0x101102) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001480)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0xfffffffffffffe4c}}, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000080)={0x4, 0x0, 0x0}) write$evdev(r0, &(0x7f0000000100)=[{{0x0, 0x7530}}], 0xff49) 20:28:55 executing program 0: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000180)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) [ 188.142888][ T3920] kobject: 'loop4' (00000000bc15ec9a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 188.153958][ T9320] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. [ 188.173819][ T3920] kobject: 'loop5' (00000000188dff4a): kobject_uevent_env [ 188.184881][ T9320] kobject: 'veth2' (00000000fc897104): kobject_add_internal: parent: 'net', set: 'devices' [ 188.195548][ T3920] kobject: 'loop5' (00000000188dff4a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 188.210848][ T9320] kobject: 'veth2' (00000000fc897104): kobject_uevent_env [ 188.225444][ T3920] kobject: 'loop1' (0000000000371cf4): kobject_uevent_env [ 188.227336][ T9320] kobject: 'veth2' (00000000fc897104): fill_kobj_path: path = '/devices/virtual/net/veth2' [ 188.238387][ T3920] kobject: 'loop1' (0000000000371cf4): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 188.266346][ T3920] kobject: 'loop3' (000000006ac884db): kobject_uevent_env [ 188.270154][ T9320] kobject: 'queues' (00000000eb565cf0): kobject_add_internal: parent: 'veth2', set: '' [ 188.276271][ T3920] kobject: 'loop3' (000000006ac884db): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 188.283943][ T9320] kobject: 'queues' (00000000eb565cf0): kobject_uevent_env [ 188.295862][ T3920] kobject: 'loop0' (000000000fbb9f16): kobject_uevent_env [ 188.301680][ T9320] kobject: 'queues' (00000000eb565cf0): kobject_uevent_env: filter function caused the event to drop! [ 188.311264][ T3920] kobject: 'loop0' (000000000fbb9f16): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 188.319846][ T9320] kobject: 'rx-0' (00000000943b95f6): kobject_add_internal: parent: 'queues', set: 'queues' [ 188.388000][ T9320] kobject: 'rx-0' (00000000943b95f6): kobject_uevent_env [ 188.395344][ T9320] kobject: 'rx-0' (00000000943b95f6): fill_kobj_path: path = '/devices/virtual/net/veth2/queues/rx-0' [ 188.406869][ T9320] kobject: 'tx-0' (0000000075156aa0): kobject_add_internal: parent: 'queues', set: 'queues' [ 188.418911][ T9320] kobject: 'tx-0' (0000000075156aa0): kobject_uevent_env [ 188.426671][ T9320] kobject: 'tx-0' (0000000075156aa0): fill_kobj_path: path = '/devices/virtual/net/veth2/queues/tx-0' [ 188.440205][ T9320] kobject: 'batman_adv' (00000000ee1decff): kobject_add_internal: parent: 'veth2', set: '' [ 188.451737][ T9320] kobject: 'veth3' (00000000d8b955a0): kobject_add_internal: parent: 'net', set: 'devices' [ 188.462416][ T9320] kobject: 'veth3' (00000000d8b955a0): kobject_uevent_env [ 188.469962][ T9320] kobject: 'veth3' (00000000d8b955a0): fill_kobj_path: path = '/devices/virtual/net/veth3' [ 188.480109][ T9320] kobject: 'queues' (000000003278a382): kobject_add_internal: parent: 'veth3', set: '' [ 188.490365][ T9320] kobject: 'queues' (000000003278a382): kobject_uevent_env [ 188.498332][ T9320] kobject: 'queues' (000000003278a382): kobject_uevent_env: filter function caused the event to drop! [ 188.509455][ T9320] kobject: 'rx-0' (00000000cdfdeff5): kobject_add_internal: parent: 'queues', set: 'queues' [ 188.519797][ T9320] kobject: 'rx-0' (00000000cdfdeff5): kobject_uevent_env [ 188.526963][ T9320] kobject: 'rx-0' (00000000cdfdeff5): fill_kobj_path: path = '/devices/virtual/net/veth3/queues/rx-0' [ 188.538608][ T9320] kobject: 'tx-0' (0000000066a8f617): kobject_add_internal: parent: 'queues', set: 'queues' [ 188.548914][ T9320] kobject: 'tx-0' (0000000066a8f617): kobject_uevent_env [ 188.557297][ T9320] kobject: 'tx-0' (0000000066a8f617): fill_kobj_path: path = '/devices/virtual/net/veth3/queues/tx-0' [ 188.569188][ T9320] kobject: 'batman_adv' (00000000107475a6): kobject_add_internal: parent: 'veth3', set: '' [ 188.582620][ T9320] kobject: 'batman_adv' (00000000107475a6): kobject_uevent_env [ 188.590282][ T9320] kobject: 'batman_adv' (00000000107475a6): kobject_uevent_env: filter function caused the event to drop! [ 188.602024][ T9320] kobject: 'batman_adv' (00000000107475a6): kobject_cleanup, parent 000000008d654363 [ 188.611643][ T9320] kobject: 'batman_adv' (00000000107475a6): calling ktype release [ 188.619682][ T9320] kobject: (00000000107475a6): dynamic_kobj_release [ 188.626300][ T9320] kobject: 'batman_adv': free name [ 188.632902][ T9320] kobject: 'rx-0' (00000000cdfdeff5): kobject_cleanup, parent 000000003278a382 [ 188.642047][ T9320] kobject: 'rx-0' (00000000cdfdeff5): auto cleanup 'remove' event [ 188.650189][ T9320] kobject: 'rx-0' (00000000cdfdeff5): kobject_uevent_env [ 188.657463][ T9320] kobject: 'rx-0' (00000000cdfdeff5): fill_kobj_path: path = '/devices/virtual/net/veth3/queues/rx-0' [ 188.668653][ T9320] kobject: 'rx-0' (00000000cdfdeff5): auto cleanup kobject_del [ 188.680954][ T9320] kobject: 'rx-0' (00000000cdfdeff5): calling ktype release [ 188.688306][ T9320] kobject: 'rx-0': free name [ 188.692950][ T9320] kobject: 'tx-0' (0000000066a8f617): kobject_cleanup, parent 000000003278a382 [ 188.701941][ T9320] kobject: 'tx-0' (0000000066a8f617): auto cleanup 'remove' event [ 188.709812][ T9320] kobject: 'tx-0' (0000000066a8f617): kobject_uevent_env [ 188.717090][ T9320] kobject: 'tx-0' (0000000066a8f617): fill_kobj_path: path = '/devices/virtual/net/veth3/queues/tx-0' [ 188.728190][ T9320] kobject: 'tx-0' (0000000066a8f617): auto cleanup kobject_del [ 188.735865][ T9320] kobject: 'tx-0' (0000000066a8f617): calling ktype release [ 188.743257][ T9320] kobject: 'tx-0': free name [ 188.747958][ T9320] kobject: 'queues' (000000003278a382): kobject_cleanup, parent 000000008d654363 [ 188.757432][ T9320] kobject: 'queues' (000000003278a382): calling ktype release [ 188.764898][ T9320] kobject: 'queues' (000000003278a382): kset_release [ 188.771638][ T9320] kobject: 'queues': free name [ 188.776902][ T9320] kobject: 'veth3' (00000000d8b955a0): kobject_uevent_env [ 188.784069][ T9320] kobject: 'veth3' (00000000d8b955a0): fill_kobj_path: path = '/devices/virtual/net/veth3' [ 188.796249][ T9320] kobject: 'batman_adv' (00000000ee1decff): kobject_uevent_env [ 188.803967][ T9320] kobject: 'batman_adv' (00000000ee1decff): kobject_uevent_env: filter function caused the event to drop! [ 188.815490][ T9320] kobject: 'batman_adv' (00000000ee1decff): kobject_cleanup, parent 000000008d654363 [ 188.826722][ T9320] kobject: 'batman_adv' (00000000ee1decff): calling ktype release [ 188.834893][ T9320] kobject: (00000000ee1decff): dynamic_kobj_release [ 188.841567][ T9320] kobject: 'batman_adv': free name [ 188.847031][ T9320] kobject: 'rx-0' (00000000943b95f6): kobject_cleanup, parent 00000000eb565cf0 [ 188.856244][ T9320] kobject: 'rx-0' (00000000943b95f6): auto cleanup 'remove' event [ 188.864323][ T9320] kobject: 'rx-0' (00000000943b95f6): kobject_uevent_env [ 188.871658][ T9320] kobject: 'rx-0' (00000000943b95f6): fill_kobj_path: path = '/devices/virtual/net/veth2/queues/rx-0' [ 188.883084][ T9320] kobject: 'rx-0' (00000000943b95f6): auto cleanup kobject_del [ 188.890793][ T9320] kobject: 'rx-0' (00000000943b95f6): calling ktype release [ 188.898642][ T9320] kobject: 'rx-0': free name [ 188.903324][ T9320] kobject: 'tx-0' (0000000075156aa0): kobject_cleanup, parent 00000000eb565cf0 [ 188.912347][ T9320] kobject: 'tx-0' (0000000075156aa0): auto cleanup 'remove' event [ 188.920288][ T9320] kobject: 'tx-0' (0000000075156aa0): kobject_uevent_env [ 188.927718][ T9320] kobject: 'tx-0' (0000000075156aa0): fill_kobj_path: path = '/devices/virtual/net/veth2/queues/tx-0' [ 188.938783][ T9320] kobject: 'tx-0' (0000000075156aa0): auto cleanup kobject_del [ 188.946356][ T9320] kobject: 'tx-0' (0000000075156aa0): calling ktype release [ 188.953691][ T9320] kobject: 'tx-0': free name [ 188.958416][ T9320] kobject: 'queues' (00000000eb565cf0): kobject_cleanup, parent 000000008d654363 [ 188.967599][ T9320] kobject: 'queues' (00000000eb565cf0): calling ktype release [ 188.975080][ T9320] kobject: 'queues' (00000000eb565cf0): kset_release [ 188.982015][ T9320] kobject: 'queues': free name [ 188.987173][ T9320] kobject: 'veth2' (00000000fc897104): kobject_uevent_env [ 188.994594][ T9320] kobject: 'veth2' (00000000fc897104): fill_kobj_path: path = '/devices/virtual/net/veth2' [ 189.004971][ T9326] netlink: 'syz-executor.4': attribute type 21 has an invalid length. [ 189.013391][ T9326] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 20:28:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x3d1, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x14, 0x2, [@IFLA_BOND_AD_LACP_RATE={0x8}, @IFLA_BOND_MODE={0x8, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 20:28:56 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x476, 0x101102) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001480)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0xfffffffffffffe4c}}, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000080)={0x4, 0x0, 0x0}) write$evdev(r0, &(0x7f0000000100)=[{{0x0, 0x7530}}], 0xff49) 20:28:56 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x476, 0x101102) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001480)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0xfffffffffffffe4c}}, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000080)={0x4, 0x0, 0x0}) write$evdev(r0, &(0x7f0000000100)=[{{0x0, 0x7530}}], 0xff49) 20:28:56 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x476, 0x101102) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001480)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0xfffffffffffffe4c}}, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000080)={0x4, 0x0, 0x0}) write$evdev(r0, &(0x7f0000000100)=[{{0x0, 0x7530}}], 0xff49) [ 189.196715][ T9334] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 189.205416][ T3920] kobject: 'loop4' (00000000bc15ec9a): kobject_uevent_env [ 189.216492][ T9320] kobject: 'veth3' (00000000d8b955a0): kobject_cleanup, parent 000000008d654363 [ 189.217920][ T3920] kobject: 'loop4' (00000000bc15ec9a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 189.247703][ T9346] netlink: 'syz-executor.4': attribute type 21 has an invalid length. [ 189.256017][ T9346] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 189.266492][ T9320] kobject: 'veth3' (00000000d8b955a0): calling ktype release [ 189.273119][ T3920] kobject: 'loop1' (0000000000371cf4): kobject_uevent_env 20:28:56 executing program 0: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000180)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) [ 189.291989][ T3920] kobject: 'loop1' (0000000000371cf4): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 189.310560][ T9320] kobject: 'veth3': free name [ 189.314872][ T3920] kobject: 'loop3' (000000006ac884db): kobject_uevent_env [ 189.322905][ T9346] kobject: 'bond2' (00000000092aea0c): kobject_add_internal: parent: 'net', set: 'devices' [ 189.337732][ T9346] kobject: 'bond2' (00000000092aea0c): kobject_uevent_env [ 189.344274][ T3920] kobject: 'loop3' (000000006ac884db): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 189.345036][ T9346] kobject: 'bond2' (00000000092aea0c): fill_kobj_path: path = '/devices/virtual/net/bond2' [ 189.357320][ T3920] kobject: 'loop5' (00000000188dff4a): kobject_uevent_env [ 189.368265][ T9346] kobject: 'queues' (000000004381b805): kobject_add_internal: parent: 'bond2', set: '' [ 189.388478][ T9346] kobject: 'queues' (000000004381b805): kobject_uevent_env [ 189.392120][ T3920] kobject: 'loop5' (00000000188dff4a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 189.395879][ T9346] kobject: 'queues' (000000004381b805): kobject_uevent_env: filter function caused the event to drop! [ 189.424503][ T3920] kobject: 'loop0' (000000000fbb9f16): kobject_uevent_env [ 189.427068][ T9346] kobject: 'rx-0' (00000000293638e4): kobject_add_internal: parent: 'queues', set: 'queues' [ 189.437515][ T3920] kobject: 'loop0' (000000000fbb9f16): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 189.444859][ T9346] kobject: 'rx-0' (00000000293638e4): kobject_uevent_env [ 189.459418][ T9346] kobject: 'rx-0' (00000000293638e4): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-0' [ 189.470820][ T9346] kobject: 'rx-1' (00000000bb7abe0e): kobject_add_internal: parent: 'queues', set: 'queues' [ 189.481414][ T9346] kobject: 'rx-1' (00000000bb7abe0e): kobject_uevent_env [ 189.498981][ T9346] kobject: 'rx-1' (00000000bb7abe0e): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-1' [ 189.522423][ T9346] kobject: 'rx-2' (000000001306d159): kobject_add_internal: parent: 'queues', set: 'queues' [ 189.532923][ T9346] kobject: 'rx-2' (000000001306d159): kobject_uevent_env [ 189.540285][ T9346] kobject: 'rx-2' (000000001306d159): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-2' [ 189.551702][ T9346] kobject: 'rx-3' (000000006503d03f): kobject_add_internal: parent: 'queues', set: 'queues' [ 189.561980][ T9346] kobject: 'rx-3' (000000006503d03f): kobject_uevent_env [ 189.569106][ T9346] kobject: 'rx-3' (000000006503d03f): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-3' [ 189.580622][ T9346] kobject: 'rx-4' (00000000446c1dcf): kobject_add_internal: parent: 'queues', set: 'queues' [ 189.590929][ T9346] kobject: 'rx-4' (00000000446c1dcf): kobject_uevent_env [ 189.598174][ T9346] kobject: 'rx-4' (00000000446c1dcf): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-4' [ 189.609874][ T9346] kobject: 'rx-5' (0000000079b796b7): kobject_add_internal: parent: 'queues', set: 'queues' [ 189.627366][ T9346] kobject: 'rx-5' (0000000079b796b7): kobject_uevent_env [ 189.634624][ T9346] kobject: 'rx-5' (0000000079b796b7): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-5' [ 189.646433][ T9346] kobject: 'rx-6' (00000000c2a16e16): kobject_add_internal: parent: 'queues', set: 'queues' [ 189.656639][ T9346] kobject: 'rx-6' (00000000c2a16e16): kobject_uevent_env [ 189.663697][ T9346] kobject: 'rx-6' (00000000c2a16e16): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-6' [ 189.675016][ T9346] kobject: 'rx-7' (000000007e4cb02c): kobject_add_internal: parent: 'queues', set: 'queues' [ 189.685160][ T9346] kobject: 'rx-7' (000000007e4cb02c): kobject_uevent_env [ 189.692785][ T9346] kobject: 'rx-7' (000000007e4cb02c): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-7' [ 189.704049][ T9346] kobject: 'rx-8' (00000000645f2fae): kobject_add_internal: parent: 'queues', set: 'queues' [ 189.714328][ T9346] kobject: 'rx-8' (00000000645f2fae): kobject_uevent_env [ 189.721424][ T9346] kobject: 'rx-8' (00000000645f2fae): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-8' [ 189.732665][ T9346] kobject: 'rx-9' (00000000dc384123): kobject_add_internal: parent: 'queues', set: 'queues' [ 189.743415][ T9346] kobject: 'rx-9' (00000000dc384123): kobject_uevent_env [ 189.750582][ T9346] kobject: 'rx-9' (00000000dc384123): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-9' [ 189.761639][ T9346] kobject: 'rx-10' (00000000c0071258): kobject_add_internal: parent: 'queues', set: 'queues' [ 189.772002][ T9346] kobject: 'rx-10' (00000000c0071258): kobject_uevent_env [ 189.779355][ T9346] kobject: 'rx-10' (00000000c0071258): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-10' [ 189.790587][ T9346] kobject: 'rx-11' (00000000511bf454): kobject_add_internal: parent: 'queues', set: 'queues' [ 189.801284][ T9346] kobject: 'rx-11' (00000000511bf454): kobject_uevent_env [ 189.808769][ T9346] kobject: 'rx-11' (00000000511bf454): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-11' [ 189.820085][ T9346] kobject: 'rx-12' (000000009d5e2e99): kobject_add_internal: parent: 'queues', set: 'queues' [ 189.831078][ T9346] kobject: 'rx-12' (000000009d5e2e99): kobject_uevent_env [ 189.838360][ T9346] kobject: 'rx-12' (000000009d5e2e99): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-12' [ 189.849569][ T9346] kobject: 'rx-13' (000000009e22646d): kobject_add_internal: parent: 'queues', set: 'queues' [ 189.859859][ T9346] kobject: 'rx-13' (000000009e22646d): kobject_uevent_env [ 189.867340][ T9346] kobject: 'rx-13' (000000009e22646d): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-13' [ 189.878686][ T9346] kobject: 'rx-14' (00000000abfb6082): kobject_add_internal: parent: 'queues', set: 'queues' [ 189.889126][ T9346] kobject: 'rx-14' (00000000abfb6082): kobject_uevent_env [ 189.896421][ T9346] kobject: 'rx-14' (00000000abfb6082): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-14' [ 189.907795][ T9346] kobject: 'rx-15' (00000000a79f8893): kobject_add_internal: parent: 'queues', set: 'queues' [ 189.918598][ T9346] kobject: 'rx-15' (00000000a79f8893): kobject_uevent_env [ 189.925744][ T9346] kobject: 'rx-15' (00000000a79f8893): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-15' [ 189.937339][ T9346] kobject: 'tx-0' (0000000038cd32fc): kobject_add_internal: parent: 'queues', set: 'queues' [ 189.947574][ T9346] kobject: 'tx-0' (0000000038cd32fc): kobject_uevent_env [ 189.954628][ T9346] kobject: 'tx-0' (0000000038cd32fc): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-0' [ 189.965785][ T9346] kobject: 'tx-1' (00000000de94cfa5): kobject_add_internal: parent: 'queues', set: 'queues' [ 189.976135][ T9346] kobject: 'tx-1' (00000000de94cfa5): kobject_uevent_env [ 189.983245][ T9346] kobject: 'tx-1' (00000000de94cfa5): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-1' [ 189.994358][ T9346] kobject: 'tx-2' (0000000010ecb282): kobject_add_internal: parent: 'queues', set: 'queues' [ 190.004590][ T9346] kobject: 'tx-2' (0000000010ecb282): kobject_uevent_env [ 190.011675][ T9346] kobject: 'tx-2' (0000000010ecb282): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-2' [ 190.022757][ T9346] kobject: 'tx-3' (0000000049548b4f): kobject_add_internal: parent: 'queues', set: 'queues' [ 190.033326][ T9346] kobject: 'tx-3' (0000000049548b4f): kobject_uevent_env [ 190.040474][ T9346] kobject: 'tx-3' (0000000049548b4f): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-3' [ 190.051703][ T9346] kobject: 'tx-4' (00000000e9f67801): kobject_add_internal: parent: 'queues', set: 'queues' [ 190.062232][ T9346] kobject: 'tx-4' (00000000e9f67801): kobject_uevent_env [ 190.069575][ T9346] kobject: 'tx-4' (00000000e9f67801): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-4' [ 190.080745][ T9346] kobject: 'tx-5' (00000000008005c3): kobject_add_internal: parent: 'queues', set: 'queues' [ 190.091128][ T9346] kobject: 'tx-5' (00000000008005c3): kobject_uevent_env [ 190.098225][ T9346] kobject: 'tx-5' (00000000008005c3): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-5' [ 190.110364][ T9346] kobject: 'tx-6' (00000000b0696f71): kobject_add_internal: parent: 'queues', set: 'queues' [ 190.120605][ T9346] kobject: 'tx-6' (00000000b0696f71): kobject_uevent_env [ 190.128087][ T9346] kobject: 'tx-6' (00000000b0696f71): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-6' [ 190.139280][ T9346] kobject: 'tx-7' (00000000a7b79707): kobject_add_internal: parent: 'queues', set: 'queues' [ 190.149468][ T9346] kobject: 'tx-7' (00000000a7b79707): kobject_uevent_env [ 190.156514][ T9346] kobject: 'tx-7' (00000000a7b79707): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-7' [ 190.168854][ T9346] kobject: 'tx-8' (0000000065b4c905): kobject_add_internal: parent: 'queues', set: 'queues' [ 190.179258][ T9346] kobject: 'tx-8' (0000000065b4c905): kobject_uevent_env [ 190.186400][ T9346] kobject: 'tx-8' (0000000065b4c905): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-8' [ 190.197887][ T9346] kobject: 'tx-9' (00000000add3b034): kobject_add_internal: parent: 'queues', set: 'queues' [ 190.208298][ T9346] kobject: 'tx-9' (00000000add3b034): kobject_uevent_env [ 190.215464][ T9346] kobject: 'tx-9' (00000000add3b034): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-9' [ 190.226522][ T9346] kobject: 'tx-10' (000000002d51ca19): kobject_add_internal: parent: 'queues', set: 'queues' [ 190.236966][ T9346] kobject: 'tx-10' (000000002d51ca19): kobject_uevent_env [ 190.244112][ T9346] kobject: 'tx-10' (000000002d51ca19): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-10' [ 190.255339][ T9346] kobject: 'tx-11' (00000000b0b079ae): kobject_add_internal: parent: 'queues', set: 'queues' [ 190.265637][ T9346] kobject: 'tx-11' (00000000b0b079ae): kobject_uevent_env [ 190.272846][ T9346] kobject: 'tx-11' (00000000b0b079ae): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-11' [ 190.284376][ T9346] kobject: 'tx-12' (00000000abd24be5): kobject_add_internal: parent: 'queues', set: 'queues' [ 190.294800][ T9346] kobject: 'tx-12' (00000000abd24be5): kobject_uevent_env [ 190.301983][ T9346] kobject: 'tx-12' (00000000abd24be5): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-12' [ 190.313224][ T9346] kobject: 'tx-13' (00000000beb9732f): kobject_add_internal: parent: 'queues', set: 'queues' [ 190.323657][ T9346] kobject: 'tx-13' (00000000beb9732f): kobject_uevent_env [ 190.331609][ T9346] kobject: 'tx-13' (00000000beb9732f): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-13' [ 190.345371][ T9346] kobject: 'tx-14' (00000000b6e8c9b9): kobject_add_internal: parent: 'queues', set: 'queues' [ 190.356159][ T9346] kobject: 'tx-14' (00000000b6e8c9b9): kobject_uevent_env [ 190.363452][ T9346] kobject: 'tx-14' (00000000b6e8c9b9): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-14' [ 190.374808][ T9346] kobject: 'tx-15' (000000008c04be8b): kobject_add_internal: parent: 'queues', set: 'queues' [ 190.385092][ T9346] kobject: 'tx-15' (000000008c04be8b): kobject_uevent_env [ 190.392357][ T9346] kobject: 'tx-15' (000000008c04be8b): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-15' 20:28:57 executing program 0: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000180)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) [ 190.405526][ T9346] kobject: 'batman_adv' (00000000f184abe3): kobject_add_internal: parent: 'bond2', set: '' [ 190.444296][ T9320] kobject: 'veth2' (00000000fc897104): kobject_cleanup, parent 000000008d654363 [ 190.464323][ T3920] kobject: 'loop0' (000000000fbb9f16): kobject_uevent_env [ 190.490965][ T3920] kobject: 'loop0' (000000000fbb9f16): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 190.504743][ T9320] kobject: 'veth2' (00000000fc897104): calling ktype release 20:28:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@newlink={0x50, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x12, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0xa, 0x1, {0x2}}}}}]}, 0x50}}, 0x0) 20:28:58 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xae04, 0x0) 20:28:58 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000dc0)=@in6={0xa, 0x0, 0x0, @local, 0x6}, 0x80, 0x0}, 0x20004040) 20:28:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x87f1a7) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000040)) 20:28:58 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000940)=0x14d) 20:28:58 executing program 0: r0 = openat$random(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/urandom\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x8) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x11, r1, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000000)) [ 190.514626][ T9320] kobject: 'veth2': free name [ 190.522720][ T3920] kobject: 'loop3' (000000006ac884db): kobject_uevent_env 20:28:58 executing program 4: r0 = memfd_create(&(0x7f0000000080)='&l\x80(ritylo\x00\"\x86\xe6\xb1\xc2\xb2d\xfa\xd0\x84d\xff\xc5;K\xd0*\xa2\x7f\xd4\xb5\xbd\xbf\x19\x04:\xd1~\xddY\x92lN\xe7\xb9E^gM\xed^O\xea\xff\xa2\x1d\x19\x92\xfa\xef$f7i\xe6\x10v\x00\x00\x00\x04\xcc\xef\x19\x88\xd8/\xe44&\x9f-t\xec\x8f\xe0\xd1\x1a-r3\xbf\x84]\xfb\xd8\xb9\x0f\x990l4\x9fL_\"\xef\x8dY\xcd\xf6\xff\x84\xa2\\\xf7LTQ7\x8d=r}\xff\x0f\x17', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x2000400) fcntl$getflags(r0, 0x40a) 20:28:58 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x50c7ad0cc64da3c3, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r0, r1, 0x1, 0x2}, 0x10) r2 = socket$caif_stream(0x25, 0x1, 0x1) sendmsg$sock(r2, &(0x7f00000004c0)={&(0x7f00000001c0)=@sco={0x1f, {0x5, 0x81, 0x8, 0x9, 0x40, 0x1f}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)="0dbafd74599acf2dc6dbc72cbf922ab8c96d", 0x12}, {&(0x7f0000000280)="68997abea16f2557b16ccbf4487f019384f98a27d0e87148b9524b9ff9e2b07f7be07cc404a56a9d9d58059ff9656e29aa7c6710f0cc110b18bb43ad5bba19468a516fe3aba109d0667716dc787645751a28e01d3acebdb565692ba99981894873b6abc37676", 0x66}, {&(0x7f0000000300)="fe55de568622b4", 0x7}, {&(0x7f0000000340)="87078821db703d8e52c4ae9ec5fe2d496eeda3bfcef2a7e2bdd02bc06eb14658222d628a50bc72fd48ac07558112fe1879d53af9e1f62b08649ad552a74a0958a2233214d1a089d31f7947d7a5401921ce9515d5cae350c2bccf16e1b5124153", 0x60}], 0x4, &(0x7f0000000400)=[@timestamping={{0x14, 0x1, 0x25, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @timestamping={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0x501}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x9}}], 0xa8}, 0x4) r3 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0xfff, 0x4000) r4 = creat(&(0x7f0000000080)='./file1\x00', 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) fsetxattr$security_capability(r4, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [], r6}, 0x18, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(0x0, 0x0, &(0x7f0000001d40)=0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x8801) setregid(r7, 0xee00) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c80, 0x0) r9 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r9) fchownat(r3, &(0x7f00000005c0)='./file0\x00', r6, r7, 0x1000) [ 190.587874][ T3920] kobject: 'loop3' (000000006ac884db): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 190.622667][ T3920] kobject: 'loop1' (0000000000371cf4): kobject_uevent_env 20:28:58 executing program 0: r0 = openat$random(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/urandom\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x8) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x11, r1, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000000)) [ 190.626956][ T9379] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 190.639934][ T3920] kobject: 'loop1' (0000000000371cf4): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 190.664182][ T3920] kobject: 'loop4' (00000000bc15ec9a): kobject_uevent_env [ 190.677253][ T3920] kobject: 'loop4' (00000000bc15ec9a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 190.682808][ T9379] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. [ 190.699764][ T3920] kobject: 'loop5' (00000000188dff4a): kobject_uevent_env [ 190.707696][ T9379] kobject: 'veth2' (0000000016970b80): kobject_add_internal: parent: 'net', set: 'devices' [ 190.718337][ T9370] syz-executor.1 (9370) used greatest stack depth: 22112 bytes left 20:28:58 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000dc0)=@in6={0xa, 0x0, 0x0, @local, 0x6}, 0x80, 0x0}, 0x20004040) [ 190.730844][ T3920] kobject: 'loop5' (00000000188dff4a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 190.743101][ T9379] kobject: 'veth2' (0000000016970b80): kobject_uevent_env [ 190.759041][ T3920] kobject: 'loop2' (000000000fa281cf): kobject_uevent_env [ 190.765957][ T9384] kobject: 'integrity' (00000000089889dc): kobject_uevent_env [ 190.769541][ T9379] kobject: 'veth2' (0000000016970b80): fill_kobj_path: path = '/devices/virtual/net/veth2' 20:28:58 executing program 0: r0 = openat$random(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/urandom\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x8) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x11, r1, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000000)) [ 190.786699][ T9384] kobject: 'integrity' (00000000089889dc): kobject_uevent_env: filter function caused the event to drop! [ 190.803935][ T3920] kobject: 'loop2' (000000000fa281cf): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 190.826757][ T9379] kobject: 'queues' (00000000239d4350): kobject_add_internal: parent: 'veth2', set: '' [ 190.830217][ T3920] kobject: 'loop4' (00000000bc15ec9a): kobject_uevent_env [ 190.844640][ T9379] kobject: 'queues' (00000000239d4350): kobject_uevent_env [ 190.845698][ T9384] kobject: 'integrity' (00000000089889dc): kobject_cleanup, parent 000000008d654363 [ 190.859950][ T9379] kobject: 'queues' (00000000239d4350): kobject_uevent_env: filter function caused the event to drop! [ 190.862092][ T3920] kobject: 'loop4' (00000000bc15ec9a): fill_kobj_path: path = '/devices/virtual/block/loop4' 20:28:58 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000dc0)=@in6={0xa, 0x0, 0x0, @local, 0x6}, 0x80, 0x0}, 0x20004040) [ 190.891459][ T9379] kobject: 'rx-0' (000000008d9bc744): kobject_add_internal: parent: 'queues', set: 'queues' [ 190.902964][ T3920] kobject: 'loop3' (000000006ac884db): kobject_uevent_env [ 190.908061][ T9379] kobject: 'rx-0' (000000008d9bc744): kobject_uevent_env [ 190.910677][ T3920] kobject: 'loop3' (000000006ac884db): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 190.928140][ T9384] kobject: 'integrity' (00000000089889dc): does not have a release() function, it is broken and must be fixed. See Documentation/kobject.txt. [ 190.933956][ T9379] kobject: 'rx-0' (000000008d9bc744): fill_kobj_path: path = '/devices/virtual/net/veth2/queues/rx-0' [ 190.951943][ T3920] kobject: 'loop1' (0000000000371cf4): kobject_uevent_env [ 190.956693][ T9379] kobject: 'tx-0' (000000005fab8241): kobject_add_internal: parent: 'queues', set: 'queues' [ 190.962146][ T9384] kobject: 'integrity': free name [ 190.978946][ T3920] kobject: 'loop1' (0000000000371cf4): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 191.001493][ T9384] kobject: '7:0' (00000000810847a6): kobject_uevent_env [ 191.012669][ T9379] kobject: 'tx-0' (000000005fab8241): kobject_uevent_env [ 191.027405][ T9384] kobject: '7:0' (00000000810847a6): fill_kobj_path: path = '/devices/virtual/bdi/7:0' [ 191.044091][ T9379] kobject: 'tx-0' (000000005fab8241): fill_kobj_path: path = '/devices/virtual/net/veth2/queues/tx-0' [ 191.060476][ T9384] kobject: '7:0' (00000000810847a6): kobject_cleanup, parent 000000008d654363 [ 191.061215][ T9379] kobject: 'batman_adv' (0000000055fb1b62): kobject_add_internal: parent: 'veth2', set: '' [ 191.072530][ T9384] kobject: '7:0' (00000000810847a6): calling ktype release [ 191.080940][ T9379] kobject: 'veth3' (000000001c6a85c0): kobject_add_internal: parent: 'net', set: 'devices' [ 191.090534][ T9384] kobject: '7:0': free name [ 191.098449][ T9379] kobject: 'veth3' (000000001c6a85c0): kobject_uevent_env [ 191.103644][ T9384] kobject: 'mq' (000000001bf54974): kobject_uevent_env [ 191.109830][ T9379] kobject: 'veth3' (000000001c6a85c0): fill_kobj_path: path = '/devices/virtual/net/veth3' [ 191.109929][ T9379] kobject: 'queues' (0000000071f876ba): kobject_add_internal: parent: 'veth3', set: '' [ 191.109954][ T9379] kobject: 'queues' (0000000071f876ba): kobject_uevent_env [ 191.109963][ T9379] kobject: 'queues' (0000000071f876ba): kobject_uevent_env: filter function caused the event to drop! [ 191.109988][ T9379] kobject: 'rx-0' (00000000efea4a30): kobject_add_internal: parent: 'queues', set: 'queues' [ 191.110041][ T9379] kobject: 'rx-0' (00000000efea4a30): kobject_uevent_env [ 191.110081][ T9379] kobject: 'rx-0' (00000000efea4a30): fill_kobj_path: path = '/devices/virtual/net/veth3/queues/rx-0' [ 191.110162][ T9379] kobject: 'tx-0' (0000000076f736d7): kobject_add_internal: parent: 'queues', set: 'queues' [ 191.110282][ T9379] kobject: 'tx-0' (0000000076f736d7): kobject_uevent_env [ 191.119933][ T9384] kobject: 'mq' (000000001bf54974): kobject_uevent_env: filter function caused the event to drop! [ 191.127242][ T9379] kobject: 'tx-0' (0000000076f736d7): fill_kobj_path: path = '/devices/virtual/net/veth3/queues/tx-0' [ 191.128023][ T9379] kobject: 'batman_adv' (00000000e1f6c61c): kobject_add_internal: parent: 'veth3', set: '' [ 191.147331][ T9384] kobject: 'queue' (00000000dc32d88e): kobject_uevent_env [ 191.243486][ T9384] kobject: 'queue' (00000000dc32d88e): kobject_uevent_env: filter function caused the event to drop! [ 191.256183][ T9379] kobject: 'batman_adv' (00000000e1f6c61c): kobject_uevent_env [ 191.260424][ T9384] kobject: 'iosched' (0000000022029e8f): kobject_uevent_env [ 191.264257][ T9379] kobject: 'batman_adv' (00000000e1f6c61c): kobject_uevent_env: filter function caused the event to drop! [ 191.271810][ T9384] kobject: 'iosched' (0000000022029e8f): kobject_uevent_env: attempted to send uevent without kset! [ 191.285841][ T9379] kobject: 'batman_adv' (00000000e1f6c61c): kobject_cleanup, parent 000000008d654363 [ 191.296508][ T9384] kobject: 'holders' (000000000933476b): kobject_cleanup, parent 000000000fbb9f16 [ 191.305667][ T9379] kobject: 'batman_adv' (00000000e1f6c61c): calling ktype release [ 191.315001][ T9384] kobject: 'holders' (000000000933476b): auto cleanup kobject_del [ 191.325420][ T9379] kobject: (00000000e1f6c61c): dynamic_kobj_release [ 191.330863][ T9384] kobject: 'holders' (000000000933476b): calling ktype release [ 191.337607][ T9379] kobject: 'batman_adv': free name [ 191.345813][ T9384] kobject: (000000000933476b): dynamic_kobj_release [ 191.353824][ T9379] kobject: 'rx-0' (00000000efea4a30): kobject_cleanup, parent 0000000071f876ba [ 191.357618][ T9384] kobject: 'holders': free name [ 191.368269][ T9379] kobject: 'rx-0' (00000000efea4a30): auto cleanup 'remove' event [ 191.373143][ T9384] kobject: 'slaves' (000000000a59b80f): kobject_cleanup, parent 000000000fbb9f16 [ 191.383734][ T9379] kobject: 'rx-0' (00000000efea4a30): kobject_uevent_env [ 191.391398][ T9384] kobject: 'slaves' (000000000a59b80f): auto cleanup kobject_del [ 191.400988][ T9379] kobject: 'rx-0' (00000000efea4a30): fill_kobj_path: path = '/devices/virtual/net/veth3/queues/rx-0' [ 191.406896][ T9384] kobject: 'slaves' (000000000a59b80f): calling ktype release [ 191.420220][ T9379] kobject: 'rx-0' (00000000efea4a30): auto cleanup kobject_del [ 191.426969][ T9384] kobject: (000000000a59b80f): dynamic_kobj_release [ 191.433461][ T9379] kobject: 'rx-0' (00000000efea4a30): calling ktype release [ 191.447536][ T9384] kobject: 'slaves': free name [ 191.451382][ T9379] kobject: 'rx-0': free name [ 191.458381][ T9379] kobject: 'tx-0' (0000000076f736d7): kobject_cleanup, parent 0000000071f876ba [ 191.458859][ T9384] kobject: 'loop0' (000000000fbb9f16): kobject_uevent_env [ 191.469905][ T9379] kobject: 'tx-0' (0000000076f736d7): auto cleanup 'remove' event [ 191.475886][ T9384] kobject: 'loop0' (000000000fbb9f16): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 191.493601][ T9379] kobject: 'tx-0' (0000000076f736d7): kobject_uevent_env [ 191.518039][ T9379] kobject: 'tx-0' (0000000076f736d7): fill_kobj_path: path = '/devices/virtual/net/veth3/queues/tx-0' [ 191.529560][ T9379] kobject: 'tx-0' (0000000076f736d7): auto cleanup kobject_del [ 191.537452][ T9379] kobject: 'tx-0' (0000000076f736d7): calling ktype release [ 191.544923][ T9379] kobject: 'tx-0': free name [ 191.549169][ T9036] kobject: 'loop0' (000000000fbb9f16): kobject_cleanup, parent 000000008d654363 [ 191.577194][ T9379] kobject: 'queues' (0000000071f876ba): kobject_cleanup, parent 000000008d654363 [ 191.580426][ T9036] kobject: 'loop0' (000000000fbb9f16): calling ktype release [ 191.600582][ T9036] kobject: 'queue' (00000000dc32d88e): kobject_cleanup, parent 000000008d654363 [ 191.606713][ T9383] caif:caif_disconnect_client(): nothing to disconnect [ 191.612082][ T9036] kobject: 'queue' (00000000dc32d88e): calling ktype release [ 191.639149][ T9036] kobject: 'queue': free name [ 191.644268][ T9047] kobject: 'iosched' (0000000022029e8f): kobject_cleanup, parent 000000008d654363 [ 191.659650][ T9047] kobject: 'iosched' (0000000022029e8f): calling ktype release [ 191.660220][ T9379] kobject: 'queues' (0000000071f876ba): calling ktype release [ 191.670238][ T9036] kobject: 'loop0': free name [ 191.690864][ T9047] kobject: 'iosched': free name [ 191.705275][ T9047] kobject: '0' (00000000833bb3f1): kobject_cleanup, parent 000000008d654363 [ 191.705783][ T9379] kobject: 'queues' (0000000071f876ba): kset_release [ 191.723863][ T9047] kobject: '0' (00000000833bb3f1): calling ktype release [ 191.727269][ T9379] kobject: 'queues': free name [ 191.749414][ T9047] kobject: '0': free name [ 191.750766][ T9379] kobject: 'veth3' (000000001c6a85c0): kobject_uevent_env [ 191.755447][ T9047] kobject: 'cpu0' (00000000c224d194): kobject_cleanup, parent 000000008d654363 [ 191.761555][ T9379] kobject: 'veth3' (000000001c6a85c0): fill_kobj_path: path = '/devices/virtual/net/veth3' [ 191.778851][ T9047] kobject: 'cpu0' (00000000c224d194): calling ktype release [ 191.784668][ T9379] kobject: 'batman_adv' (0000000055fb1b62): kobject_uevent_env [ 191.790720][ T9047] kobject: 'cpu0': free name [ 191.795338][ T9379] kobject: 'batman_adv' (0000000055fb1b62): kobject_uevent_env: filter function caused the event to drop! [ 191.803292][ T9047] kobject: 'cpu1' (00000000ad5545b2): kobject_cleanup, parent 000000008d654363 [ 191.820199][ T9379] kobject: 'batman_adv' (0000000055fb1b62): kobject_cleanup, parent 000000008d654363 [ 191.820467][ T9384] kobject: '7:0' (00000000365aad67): kobject_add_internal: parent: 'bdi', set: 'devices' [ 191.833918][ T9379] kobject: 'batman_adv' (0000000055fb1b62): calling ktype release [ 191.839868][ T9047] kobject: 'cpu1' (00000000ad5545b2): calling ktype release [ 191.839874][ T9047] kobject: 'cpu1': free name [ 191.839892][ T9047] kobject: 'mq' (000000001bf54974): kobject_cleanup, parent 000000008d654363 [ 191.839897][ T9047] kobject: 'mq' (000000001bf54974): calling ktype release [ 191.839914][ T9047] kobject: 'mq': free name [ 191.840715][ T9384] kobject: '7:0' (00000000365aad67): kobject_uevent_env [ 191.848053][ T9379] kobject: (0000000055fb1b62): dynamic_kobj_release [ 191.866743][ T9384] kobject: '7:0' (00000000365aad67): fill_kobj_path: path = '/devices/virtual/bdi/7:0' [ 191.880619][ T9379] kobject: 'batman_adv': free name [ 191.881164][ T9383] caif:caif_disconnect_client(): nothing to disconnect [ 191.890490][ T9379] kobject: 'rx-0' (000000008d9bc744): kobject_cleanup, parent 00000000239d4350 [ 191.894819][ T9384] kobject: 'loop0' (00000000f792355f): kobject_add_internal: parent: 'block', set: 'devices' [ 191.909963][ T9379] kobject: 'rx-0' (000000008d9bc744): auto cleanup 'remove' event [ 191.938184][ T9384] kobject: 'loop0' (00000000f792355f): kobject_uevent_env [ 191.943492][ T9379] kobject: 'rx-0' (000000008d9bc744): kobject_uevent_env [ 191.952103][ T9384] kobject: 'loop0' (00000000f792355f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 191.957693][ T9379] kobject: 'rx-0' (000000008d9bc744): fill_kobj_path: path = '/devices/virtual/net/veth2/queues/rx-0' [ 191.972249][ T9384] kobject: 'holders' (00000000fb828214): kobject_add_internal: parent: 'loop0', set: '' [ 191.979570][ T9379] kobject: 'rx-0' (000000008d9bc744): auto cleanup kobject_del [ 191.992473][ T9384] kobject: 'slaves' (00000000cf0528c5): kobject_add_internal: parent: 'loop0', set: '' [ 191.997358][ T9379] kobject: 'rx-0' (000000008d9bc744): calling ktype release [ 191.997364][ T9379] kobject: 'rx-0': free name [ 191.997406][ T9379] kobject: 'tx-0' (000000005fab8241): kobject_cleanup, parent 00000000239d4350 [ 192.010393][ T9384] kobject: 'loop0' (00000000f792355f): kobject_uevent_env [ 192.014813][ T9379] kobject: 'tx-0' (000000005fab8241): auto cleanup 'remove' event [ 192.014821][ T9379] kobject: 'tx-0' (000000005fab8241): kobject_uevent_env [ 192.014875][ T9379] kobject: 'tx-0' (000000005fab8241): fill_kobj_path: path = '/devices/virtual/net/veth2/queues/tx-0' [ 192.019525][ T9384] kobject: 'loop0' (00000000f792355f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 192.028747][ T9379] kobject: 'tx-0' (000000005fab8241): auto cleanup kobject_del [ 192.038299][ T9384] kobject: 'queue' (000000004d2ddc08): kobject_add_internal: parent: 'loop0', set: '' [ 192.054610][ T9379] kobject: 'tx-0' (000000005fab8241): calling ktype release [ 192.064264][ T9384] kobject: 'mq' (000000005ebf3c76): kobject_add_internal: parent: 'loop0', set: '' [ 192.074064][ T9379] kobject: 'tx-0': free name [ 192.081876][ T9384] kobject: 'mq' (000000005ebf3c76): kobject_uevent_env [ 192.089725][ T9379] kobject: 'queues' (00000000239d4350): kobject_cleanup, parent 000000008d654363 [ 192.099831][ T9384] kobject: 'mq' (000000005ebf3c76): kobject_uevent_env: filter function caused the event to drop! [ 192.107168][ T9379] kobject: 'queues' (00000000239d4350): calling ktype release [ 192.111758][ T9384] kobject: '0' (00000000dabfedae): kobject_add_internal: parent: 'mq', set: '' [ 192.118547][ T9379] kobject: 'queues' (00000000239d4350): kset_release [ 192.131122][ T9384] kobject: 'cpu0' (00000000ca2ffd52): kobject_add_internal: parent: '0', set: '' [ 192.139370][ T9379] kobject: 'queues': free name [ 192.149183][ T9384] kobject: 'cpu1' (00000000ea89264b): kobject_add_internal: parent: '0', set: '' [ 192.157161][ T9379] kobject: 'veth2' (0000000016970b80): kobject_uevent_env [ 192.164747][ T9384] kobject: 'iosched' (0000000099ce93c0): kobject_add_internal: parent: 'queue', set: '' [ 192.173446][ T9379] kobject: 'veth2' (0000000016970b80): fill_kobj_path: path = '/devices/virtual/net/veth2' [ 192.180825][ T9384] kobject: 'queue' (000000004d2ddc08): kobject_uevent_env [ 192.222413][ T9384] kobject: 'queue' (000000004d2ddc08): kobject_uevent_env: filter function caused the event to drop! [ 192.233622][ T9384] kobject: 'iosched' (0000000099ce93c0): kobject_uevent_env [ 192.240999][ T9384] kobject: 'iosched' (0000000099ce93c0): kobject_uevent_env: filter function caused the event to drop! [ 192.252120][ T9384] kobject: 'integrity' (00000000301ecc1a): kobject_add_internal: parent: 'loop0', set: '' [ 192.263052][ T9384] kobject: 'integrity' (00000000301ecc1a): kobject_uevent_env [ 192.270590][ T9384] kobject: 'integrity' (00000000301ecc1a): kobject_uevent_env: filter function caused the event to drop! [ 192.288132][ T3920] kobject: 'loop1' (0000000000371cf4): kobject_uevent_env [ 192.295292][ T3920] kobject: 'loop1' (0000000000371cf4): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 192.312685][ T3920] kobject: 'loop4' (00000000bc15ec9a): kobject_uevent_env [ 192.320584][ T3920] kobject: 'loop4' (00000000bc15ec9a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 192.333657][ T3920] kobject: 'loop3' (000000006ac884db): kobject_uevent_env [ 192.341065][ T3920] kobject: 'loop3' (000000006ac884db): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 192.446750][ T9379] kobject: 'veth3' (000000001c6a85c0): kobject_cleanup, parent 000000008d654363 [ 192.455865][ T9379] kobject: 'veth3' (000000001c6a85c0): calling ktype release [ 192.463457][ T9379] kobject: 'veth3': free name 20:29:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@newlink={0x50, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x12, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0xa, 0x1, {0x2}}}}}]}, 0x50}}, 0x0) 20:29:00 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000dc0)=@in6={0xa, 0x0, 0x0, @local, 0x6}, 0x80, 0x0}, 0x20004040) 20:29:00 executing program 0: r0 = openat$random(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/urandom\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x8) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x11, r1, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000000)) 20:29:00 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000dc0)=@in6={0xa, 0x0, 0x0, @local, 0x6}, 0x80, 0x0}, 0x20004040) 20:29:00 executing program 4: r0 = memfd_create(&(0x7f0000000080)='&l\x80(ritylo\x00\"\x86\xe6\xb1\xc2\xb2d\xfa\xd0\x84d\xff\xc5;K\xd0*\xa2\x7f\xd4\xb5\xbd\xbf\x19\x04:\xd1~\xddY\x92lN\xe7\xb9E^gM\xed^O\xea\xff\xa2\x1d\x19\x92\xfa\xef$f7i\xe6\x10v\x00\x00\x00\x04\xcc\xef\x19\x88\xd8/\xe44&\x9f-t\xec\x8f\xe0\xd1\x1a-r3\xbf\x84]\xfb\xd8\xb9\x0f\x990l4\x9fL_\"\xef\x8dY\xcd\xf6\xff\x84\xa2\\\xf7LTQ7\x8d=r}\xff\x0f\x17', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x2000400) fcntl$getflags(r0, 0x40a) 20:29:00 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x50c7ad0cc64da3c3, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r0, r1, 0x1, 0x2}, 0x10) r2 = socket$caif_stream(0x25, 0x1, 0x1) sendmsg$sock(r2, &(0x7f00000004c0)={&(0x7f00000001c0)=@sco={0x1f, {0x5, 0x81, 0x8, 0x9, 0x40, 0x1f}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)="0dbafd74599acf2dc6dbc72cbf922ab8c96d", 0x12}, {&(0x7f0000000280)="68997abea16f2557b16ccbf4487f019384f98a27d0e87148b9524b9ff9e2b07f7be07cc404a56a9d9d58059ff9656e29aa7c6710f0cc110b18bb43ad5bba19468a516fe3aba109d0667716dc787645751a28e01d3acebdb565692ba99981894873b6abc37676", 0x66}, {&(0x7f0000000300)="fe55de568622b4", 0x7}, {&(0x7f0000000340)="87078821db703d8e52c4ae9ec5fe2d496eeda3bfcef2a7e2bdd02bc06eb14658222d628a50bc72fd48ac07558112fe1879d53af9e1f62b08649ad552a74a0958a2233214d1a089d31f7947d7a5401921ce9515d5cae350c2bccf16e1b5124153", 0x60}], 0x4, &(0x7f0000000400)=[@timestamping={{0x14, 0x1, 0x25, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @timestamping={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0x501}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x9}}], 0xa8}, 0x4) r3 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0xfff, 0x4000) r4 = creat(&(0x7f0000000080)='./file1\x00', 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) fsetxattr$security_capability(r4, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [], r6}, 0x18, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(0x0, 0x0, &(0x7f0000001d40)=0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x8801) setregid(r7, 0xee00) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c80, 0x0) r9 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r9) fchownat(r3, &(0x7f00000005c0)='./file0\x00', r6, r7, 0x1000) [ 192.676690][ T9379] kobject: 'veth2' (0000000016970b80): kobject_cleanup, parent 000000008d654363 [ 192.685929][ T9379] kobject: 'veth2' (0000000016970b80): calling ktype release [ 192.693392][ T9379] kobject: 'veth2': free name [ 192.719876][ T3920] kobject: 'loop2' (000000000fa281cf): kobject_uevent_env [ 192.747180][ T3920] kobject: 'loop2' (000000000fa281cf): fill_kobj_path: path = '/devices/virtual/block/loop2' 20:29:00 executing program 4: r0 = memfd_create(&(0x7f0000000080)='&l\x80(ritylo\x00\"\x86\xe6\xb1\xc2\xb2d\xfa\xd0\x84d\xff\xc5;K\xd0*\xa2\x7f\xd4\xb5\xbd\xbf\x19\x04:\xd1~\xddY\x92lN\xe7\xb9E^gM\xed^O\xea\xff\xa2\x1d\x19\x92\xfa\xef$f7i\xe6\x10v\x00\x00\x00\x04\xcc\xef\x19\x88\xd8/\xe44&\x9f-t\xec\x8f\xe0\xd1\x1a-r3\xbf\x84]\xfb\xd8\xb9\x0f\x990l4\x9fL_\"\xef\x8dY\xcd\xf6\xff\x84\xa2\\\xf7LTQ7\x8d=r}\xff\x0f\x17', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x2000400) fcntl$getflags(r0, 0x40a) [ 192.770147][ T9424] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 20:29:00 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x50c7ad0cc64da3c3, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r0, r1, 0x1, 0x2}, 0x10) r2 = socket$caif_stream(0x25, 0x1, 0x1) sendmsg$sock(r2, &(0x7f00000004c0)={&(0x7f00000001c0)=@sco={0x1f, {0x5, 0x81, 0x8, 0x9, 0x40, 0x1f}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)="0dbafd74599acf2dc6dbc72cbf922ab8c96d", 0x12}, {&(0x7f0000000280)="68997abea16f2557b16ccbf4487f019384f98a27d0e87148b9524b9ff9e2b07f7be07cc404a56a9d9d58059ff9656e29aa7c6710f0cc110b18bb43ad5bba19468a516fe3aba109d0667716dc787645751a28e01d3acebdb565692ba99981894873b6abc37676", 0x66}, {&(0x7f0000000300)="fe55de568622b4", 0x7}, {&(0x7f0000000340)="87078821db703d8e52c4ae9ec5fe2d496eeda3bfcef2a7e2bdd02bc06eb14658222d628a50bc72fd48ac07558112fe1879d53af9e1f62b08649ad552a74a0958a2233214d1a089d31f7947d7a5401921ce9515d5cae350c2bccf16e1b5124153", 0x60}], 0x4, &(0x7f0000000400)=[@timestamping={{0x14, 0x1, 0x25, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @timestamping={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0x501}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x9}}], 0xa8}, 0x4) r3 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0xfff, 0x4000) r4 = creat(&(0x7f0000000080)='./file1\x00', 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) fsetxattr$security_capability(r4, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [], r6}, 0x18, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(0x0, 0x0, &(0x7f0000001d40)=0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x8801) setregid(r7, 0xee00) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c80, 0x0) r9 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r9) fchownat(r3, &(0x7f00000005c0)='./file0\x00', r6, r7, 0x1000) 20:29:00 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000dc0)=@in6={0xa, 0x0, 0x0, @local, 0x6}, 0x80, 0x0}, 0x20004040) [ 192.818198][ T3920] kobject: 'loop4' (00000000bc15ec9a): kobject_uevent_env [ 192.829136][ T9419] kobject: 'integrity' (00000000301ecc1a): kobject_uevent_env [ 192.845997][ T3920] kobject: 'loop4' (00000000bc15ec9a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 192.855726][ T9424] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. 20:29:00 executing program 0: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x50c7ad0cc64da3c3, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r0, r1, 0x1, 0x2}, 0x10) r2 = socket$caif_stream(0x25, 0x1, 0x1) sendmsg$sock(r2, &(0x7f00000004c0)={&(0x7f00000001c0)=@sco={0x1f, {0x5, 0x81, 0x8, 0x9, 0x40, 0x1f}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)="0dbafd74599acf2dc6dbc72cbf922ab8c96d", 0x12}, {&(0x7f0000000280)="68997abea16f2557b16ccbf4487f019384f98a27d0e87148b9524b9ff9e2b07f7be07cc404a56a9d9d58059ff9656e29aa7c6710f0cc110b18bb43ad5bba19468a516fe3aba109d0667716dc787645751a28e01d3acebdb565692ba99981894873b6abc37676", 0x66}, {&(0x7f0000000300)="fe55de568622b4", 0x7}, {&(0x7f0000000340)="87078821db703d8e52c4ae9ec5fe2d496eeda3bfcef2a7e2bdd02bc06eb14658222d628a50bc72fd48ac07558112fe1879d53af9e1f62b08649ad552a74a0958a2233214d1a089d31f7947d7a5401921ce9515d5cae350c2bccf16e1b5124153", 0x60}], 0x4, &(0x7f0000000400)=[@timestamping={{0x14, 0x1, 0x25, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @timestamping={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0x501}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x9}}], 0xa8}, 0x4) r3 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0xfff, 0x4000) r4 = creat(&(0x7f0000000080)='./file1\x00', 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) fsetxattr$security_capability(r4, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [], r6}, 0x18, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(0x0, 0x0, &(0x7f0000001d40)=0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x8801) setregid(r7, 0xee00) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c80, 0x0) r9 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r9) fchownat(r3, &(0x7f00000005c0)='./file0\x00', r6, r7, 0x1000) [ 192.859834][ T9419] kobject: 'integrity' (00000000301ecc1a): kobject_uevent_env: filter function caused the event to drop! [ 192.881862][ T3920] kobject: 'loop1' (0000000000371cf4): kobject_uevent_env [ 192.889283][ T3920] kobject: 'loop1' (0000000000371cf4): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 192.901136][ T9419] kobject: 'integrity' (00000000301ecc1a): kobject_cleanup, parent 000000008d654363 [ 192.912903][ T3920] kobject: 'loop0' (00000000f792355f): kobject_uevent_env [ 192.921361][ T9419] kobject: 'integrity' (00000000301ecc1a): does not have a release() function, it is broken and must be fixed. See Documentation/kobject.txt. [ 192.936278][ T3920] kobject: 'loop0' (00000000f792355f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 192.943549][ T9424] kobject: 'veth2' (00000000ab5dbdfa): kobject_add_internal: parent: 'net', set: 'devices' [ 192.963217][ T9419] kobject: 'integrity': free name [ 192.985962][ T9424] kobject: 'veth2' (00000000ab5dbdfa): kobject_uevent_env [ 192.986813][ T9419] kobject: '7:0' (00000000365aad67): kobject_uevent_env [ 192.996483][ T9424] kobject: 'veth2' (00000000ab5dbdfa): fill_kobj_path: path = '/devices/virtual/net/veth2' [ 193.010252][ T9419] kobject: '7:0' (00000000365aad67): fill_kobj_path: path = '/devices/virtual/bdi/7:0' [ 193.010625][ T9424] kobject: 'queues' (000000001384ec82): kobject_add_internal: parent: 'veth2', set: '' [ 193.025892][ T9419] kobject: '7:0' (00000000365aad67): kobject_cleanup, parent 000000008d654363 [ 193.033745][ T9424] kobject: 'queues' (000000001384ec82): kobject_uevent_env [ 193.040398][ T9419] kobject: '7:0' (00000000365aad67): calling ktype release [ 193.047078][ T9424] kobject: 'queues' (000000001384ec82): kobject_uevent_env: filter function caused the event to drop! [ 193.047108][ T9424] kobject: 'rx-0' (000000005f90d394): kobject_add_internal: parent: 'queues', set: 'queues' [ 193.047176][ T9424] kobject: 'rx-0' (000000005f90d394): kobject_uevent_env [ 193.047209][ T9424] kobject: 'rx-0' (000000005f90d394): fill_kobj_path: path = '/devices/virtual/net/veth2/queues/rx-0' [ 193.047302][ T9424] kobject: 'tx-0' (000000002a2ef2b4): kobject_add_internal: parent: 'queues', set: 'queues' [ 193.047430][ T9424] kobject: 'tx-0' (000000002a2ef2b4): kobject_uevent_env [ 193.057363][ T9419] kobject: '7:0': free name [ 193.065890][ T9424] kobject: 'tx-0' (000000002a2ef2b4): fill_kobj_path: path = '/devices/virtual/net/veth2/queues/tx-0' [ 193.079916][ T9419] kobject: 'mq' (000000005ebf3c76): kobject_uevent_env [ 193.085907][ T9424] kobject: 'batman_adv' (000000009492e2a9): kobject_add_internal: parent: 'veth2', set: '' [ 193.095452][ T9419] kobject: 'mq' (000000005ebf3c76): kobject_uevent_env: filter function caused the event to drop! [ 193.105203][ T9424] kobject: 'veth3' (00000000f4077c42): kobject_add_internal: parent: 'net', set: 'devices' [ 193.115031][ T9419] kobject: 'queue' (000000004d2ddc08): kobject_uevent_env [ 193.117010][ T9424] kobject: 'veth3' (00000000f4077c42): kobject_uevent_env [ 193.130208][ T9419] kobject: 'queue' (000000004d2ddc08): kobject_uevent_env: filter function caused the event to drop! [ 193.135180][ T9424] kobject: 'veth3' (00000000f4077c42): fill_kobj_path: path = '/devices/virtual/net/veth3' [ 193.154989][ T9419] kobject: 'iosched' (0000000099ce93c0): kobject_uevent_env [ 193.155932][ T9424] kobject: 'queues' (00000000fffb9589): kobject_add_internal: parent: 'veth3', set: '' [ 193.168221][ T9419] kobject: 'iosched' (0000000099ce93c0): kobject_uevent_env: attempted to send uevent without kset! [ 193.172997][ T9424] kobject: 'queues' (00000000fffb9589): kobject_uevent_env [ 193.180815][ T9419] kobject: 'holders' (00000000fb828214): kobject_cleanup, parent 00000000f792355f [ 193.191282][ T9424] kobject: 'queues' (00000000fffb9589): kobject_uevent_env: filter function caused the event to drop! [ 193.191314][ T9424] kobject: 'rx-0' (0000000041f7f8cf): kobject_add_internal: parent: 'queues', set: 'queues' [ 193.191386][ T9424] kobject: 'rx-0' (0000000041f7f8cf): kobject_uevent_env [ 193.204075][ T9419] kobject: 'holders' (00000000fb828214): auto cleanup kobject_del [ 193.209212][ T9424] kobject: 'rx-0' (0000000041f7f8cf): fill_kobj_path: path = '/devices/virtual/net/veth3/queues/rx-0' [ 193.219447][ T9419] kobject: 'holders' (00000000fb828214): calling ktype release [ 193.230481][ T9424] kobject: 'tx-0' (00000000e05a383c): kobject_add_internal: parent: 'queues', set: 'queues' [ 193.239852][ T9419] kobject: (00000000fb828214): dynamic_kobj_release [ 193.248680][ T9424] kobject: 'tx-0' (00000000e05a383c): kobject_uevent_env [ 193.259801][ T9419] kobject: 'holders': free name [ 193.270068][ T9424] kobject: 'tx-0' (00000000e05a383c): fill_kobj_path: path = '/devices/virtual/net/veth3/queues/tx-0' [ 193.279501][ T9419] kobject: 'slaves' (00000000cf0528c5): kobject_cleanup, parent 00000000f792355f [ 193.285773][ T9424] kobject: 'batman_adv' (0000000015b84dc7): kobject_add_internal: parent: 'veth3', set: '' [ 193.296319][ T9419] kobject: 'slaves' (00000000cf0528c5): auto cleanup kobject_del [ 193.372399][ T9419] kobject: 'slaves' (00000000cf0528c5): calling ktype release [ 193.373639][ T9424] kobject: 'batman_adv' (0000000015b84dc7): kobject_uevent_env [ 193.381135][ T9419] kobject: (00000000cf0528c5): dynamic_kobj_release [ 193.381310][ T9419] kobject: 'slaves': free name [ 193.391829][ T9424] kobject: 'batman_adv' (0000000015b84dc7): kobject_uevent_env: filter function caused the event to drop! [ 193.403151][ T9419] kobject: 'loop0' (00000000f792355f): kobject_uevent_env [ 193.414890][ T9424] kobject: 'batman_adv' (0000000015b84dc7): kobject_cleanup, parent 000000008d654363 [ 193.419582][ T9419] kobject: 'loop0' (00000000f792355f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 193.431457][ T9424] kobject: 'batman_adv' (0000000015b84dc7): calling ktype release [ 193.449698][ T9424] kobject: (0000000015b84dc7): dynamic_kobj_release [ 193.456316][ T9424] kobject: 'batman_adv': free name [ 193.461775][ T9424] kobject: 'rx-0' (0000000041f7f8cf): kobject_cleanup, parent 00000000fffb9589 [ 193.470818][ T9424] kobject: 'rx-0' (0000000041f7f8cf): auto cleanup 'remove' event [ 193.478776][ T9424] kobject: 'rx-0' (0000000041f7f8cf): kobject_uevent_env [ 193.485840][ T9424] kobject: 'rx-0' (0000000041f7f8cf): fill_kobj_path: path = '/devices/virtual/net/veth3/queues/rx-0' [ 193.496895][ T9424] kobject: 'rx-0' (0000000041f7f8cf): auto cleanup kobject_del [ 193.504567][ T9424] kobject: 'rx-0' (0000000041f7f8cf): calling ktype release [ 193.511989][ T9424] kobject: 'rx-0': free name [ 193.516677][ T9424] kobject: 'tx-0' (00000000e05a383c): kobject_cleanup, parent 00000000fffb9589 [ 193.518757][ T9419] kobject: 'loop0' (00000000f792355f): kobject_cleanup, parent 000000008d654363 [ 193.525713][ T9424] kobject: 'tx-0' (00000000e05a383c): auto cleanup 'remove' event [ 193.525722][ T9424] kobject: 'tx-0' (00000000e05a383c): kobject_uevent_env [ 193.525783][ T9424] kobject: 'tx-0' (00000000e05a383c): fill_kobj_path: path = '/devices/virtual/net/veth3/queues/tx-0' [ 193.525866][ T9424] kobject: 'tx-0' (00000000e05a383c): auto cleanup kobject_del [ 193.551105][ T9415] caif:caif_disconnect_client(): nothing to disconnect [ 193.562306][ T9424] kobject: 'tx-0' (00000000e05a383c): calling ktype release [ 193.581567][ T9419] kobject: 'loop0' (00000000f792355f): calling ktype release [ 193.584574][ T9424] kobject: 'tx-0': free name [ 193.596905][ T9424] kobject: 'queues' (00000000fffb9589): kobject_cleanup, parent 000000008d654363 [ 193.597946][ T9419] kobject: 'queue' (000000004d2ddc08): kobject_cleanup, parent 000000008d654363 [ 193.606233][ T9424] kobject: 'queues' (00000000fffb9589): calling ktype release [ 193.618398][ T9419] kobject: 'queue' (000000004d2ddc08): calling ktype release [ 193.623021][ T9424] kobject: 'queues' (00000000fffb9589): kset_release [ 193.633825][ T9047] kobject: 'iosched' (0000000099ce93c0): kobject_cleanup, parent 000000008d654363 [ 193.637302][ T9424] kobject: 'queues': free name [ 193.646766][ T9047] kobject: 'iosched' (0000000099ce93c0): calling ktype release [ 193.652302][ T9424] kobject: 'veth3' (00000000f4077c42): kobject_uevent_env [ 193.661381][ T9419] kobject: 'queue': free name [ 193.666152][ T9424] kobject: 'veth3' (00000000f4077c42): fill_kobj_path: path = '/devices/virtual/net/veth3' [ 193.673471][ T9047] kobject: 'iosched': free name [ 193.686816][ T9428] caif:caif_disconnect_client(): nothing to disconnect [ 193.690851][ T9419] kobject: 'loop0': free name [ 193.707594][ T3920] kobject: 'loop5' (00000000188dff4a): kobject_uevent_env [ 193.714796][ T3920] kobject: 'loop5' (00000000188dff4a): fill_kobj_path: path = '/devices/virtual/block/loop5' 20:29:01 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x50c7ad0cc64da3c3, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r0, r1, 0x1, 0x2}, 0x10) r2 = socket$caif_stream(0x25, 0x1, 0x1) sendmsg$sock(r2, &(0x7f00000004c0)={&(0x7f00000001c0)=@sco={0x1f, {0x5, 0x81, 0x8, 0x9, 0x40, 0x1f}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)="0dbafd74599acf2dc6dbc72cbf922ab8c96d", 0x12}, {&(0x7f0000000280)="68997abea16f2557b16ccbf4487f019384f98a27d0e87148b9524b9ff9e2b07f7be07cc404a56a9d9d58059ff9656e29aa7c6710f0cc110b18bb43ad5bba19468a516fe3aba109d0667716dc787645751a28e01d3acebdb565692ba99981894873b6abc37676", 0x66}, {&(0x7f0000000300)="fe55de568622b4", 0x7}, {&(0x7f0000000340)="87078821db703d8e52c4ae9ec5fe2d496eeda3bfcef2a7e2bdd02bc06eb14658222d628a50bc72fd48ac07558112fe1879d53af9e1f62b08649ad552a74a0958a2233214d1a089d31f7947d7a5401921ce9515d5cae350c2bccf16e1b5124153", 0x60}], 0x4, &(0x7f0000000400)=[@timestamping={{0x14, 0x1, 0x25, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @timestamping={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0x501}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x9}}], 0xa8}, 0x4) r3 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0xfff, 0x4000) r4 = creat(&(0x7f0000000080)='./file1\x00', 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) fsetxattr$security_capability(r4, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [], r6}, 0x18, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(0x0, 0x0, &(0x7f0000001d40)=0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x8801) setregid(r7, 0xee00) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c80, 0x0) r9 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r9) fchownat(r3, &(0x7f00000005c0)='./file0\x00', r6, r7, 0x1000) [ 193.734381][ T9424] kobject: 'batman_adv' (000000009492e2a9): kobject_uevent_env [ 193.736319][ T9047] kobject: '0' (00000000dabfedae): kobject_cleanup, parent 000000008d654363 [ 193.742172][ T9424] kobject: 'batman_adv' (000000009492e2a9): kobject_uevent_env: filter function caused the event to drop! [ 193.763503][ T9424] kobject: 'batman_adv' (000000009492e2a9): kobject_cleanup, parent 000000008d654363 [ 193.770571][ T9047] kobject: '0' (00000000dabfedae): calling ktype release [ 193.777241][ T9430] caif:caif_disconnect_client(): nothing to disconnect [ 193.781867][ T9047] kobject: '0': free name [ 193.791492][ T9429] kobject: '7:0' (0000000018cd1fe0): kobject_add_internal: parent: 'bdi', set: 'devices' [ 193.799131][ T9047] kobject: 'cpu0' (00000000ca2ffd52): kobject_cleanup, parent 000000008d654363 [ 193.818219][ T9424] kobject: 'batman_adv' (000000009492e2a9): calling ktype release [ 193.821648][ T9047] kobject: 'cpu0' (00000000ca2ffd52): calling ktype release [ 193.826087][ T9424] kobject: (000000009492e2a9): dynamic_kobj_release [ 193.826111][ T9424] kobject: 'batman_adv': free name [ 193.826304][ T9424] kobject: 'rx-0' (000000005f90d394): kobject_cleanup, parent 000000001384ec82 [ 193.833906][ T9047] kobject: 'cpu0': free name [ 193.846977][ T9429] kobject: '7:0' (0000000018cd1fe0): kobject_uevent_env [ 193.855153][ T9047] kobject: 'cpu1' (00000000ea89264b): kobject_cleanup, parent 000000008d654363 [ 193.875529][ T9047] kobject: 'cpu1' (00000000ea89264b): calling ktype release [ 193.883141][ T9047] kobject: 'cpu1': free name 20:29:01 executing program 0: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x50c7ad0cc64da3c3, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r0, r1, 0x1, 0x2}, 0x10) r2 = socket$caif_stream(0x25, 0x1, 0x1) sendmsg$sock(r2, &(0x7f00000004c0)={&(0x7f00000001c0)=@sco={0x1f, {0x5, 0x81, 0x8, 0x9, 0x40, 0x1f}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)="0dbafd74599acf2dc6dbc72cbf922ab8c96d", 0x12}, {&(0x7f0000000280)="68997abea16f2557b16ccbf4487f019384f98a27d0e87148b9524b9ff9e2b07f7be07cc404a56a9d9d58059ff9656e29aa7c6710f0cc110b18bb43ad5bba19468a516fe3aba109d0667716dc787645751a28e01d3acebdb565692ba99981894873b6abc37676", 0x66}, {&(0x7f0000000300)="fe55de568622b4", 0x7}, {&(0x7f0000000340)="87078821db703d8e52c4ae9ec5fe2d496eeda3bfcef2a7e2bdd02bc06eb14658222d628a50bc72fd48ac07558112fe1879d53af9e1f62b08649ad552a74a0958a2233214d1a089d31f7947d7a5401921ce9515d5cae350c2bccf16e1b5124153", 0x60}], 0x4, &(0x7f0000000400)=[@timestamping={{0x14, 0x1, 0x25, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @timestamping={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0x501}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x9}}], 0xa8}, 0x4) r3 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0xfff, 0x4000) r4 = creat(&(0x7f0000000080)='./file1\x00', 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) fsetxattr$security_capability(r4, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [], r6}, 0x18, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(0x0, 0x0, &(0x7f0000001d40)=0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x8801) setregid(r7, 0xee00) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c80, 0x0) r9 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r9) fchownat(r3, &(0x7f00000005c0)='./file0\x00', r6, r7, 0x1000) [ 193.888025][ T9047] kobject: 'mq' (000000005ebf3c76): kobject_cleanup, parent 000000008d654363 [ 193.888908][ T9429] kobject: '7:0' (0000000018cd1fe0): fill_kobj_path: path = '/devices/virtual/bdi/7:0' [ 193.897122][ T9047] kobject: 'mq' (000000005ebf3c76): calling ktype release [ 193.915257][ T9047] kobject: 'mq': free name [ 193.918832][ T9424] kobject: 'rx-0' (000000005f90d394): auto cleanup 'remove' event [ 193.929508][ T9424] kobject: 'rx-0' (000000005f90d394): kobject_uevent_env [ 193.947583][ T9429] kobject: 'loop0' (000000003dae96e3): kobject_add_internal: parent: 'block', set: 'devices' [ 193.960254][ T9424] kobject: 'rx-0' (000000005f90d394): fill_kobj_path: path = '/devices/virtual/net/veth2/queues/rx-0' [ 193.974312][ T9424] kobject: 'rx-0' (000000005f90d394): auto cleanup kobject_del [ 193.982357][ T9429] kobject: 'loop0' (000000003dae96e3): kobject_uevent_env [ 193.991585][ T9429] kobject: 'loop0' (000000003dae96e3): kobject_uevent_env: uevent_suppress caused the event to drop! [ 193.996836][ T9424] kobject: 'rx-0' (000000005f90d394): calling ktype release [ 194.002865][ T9429] kobject: 'holders' (000000004d79fa3e): kobject_add_internal: parent: 'loop0', set: '' [ 194.010982][ T9424] kobject: 'rx-0': free name [ 194.023399][ T9429] kobject: 'slaves' (00000000998e5ecb): kobject_add_internal: parent: 'loop0', set: '' [ 194.026064][ T9424] kobject: 'tx-0' (000000002a2ef2b4): kobject_cleanup, parent 000000001384ec82 [ 194.035930][ T9429] kobject: 'loop0' (000000003dae96e3): kobject_uevent_env [ 194.045848][ T9424] kobject: 'tx-0' (000000002a2ef2b4): auto cleanup 'remove' event [ 194.054797][ T9429] kobject: 'loop0' (000000003dae96e3): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 194.060824][ T9424] kobject: 'tx-0' (000000002a2ef2b4): kobject_uevent_env [ 194.070809][ T9429] kobject: 'queue' (00000000240878b3): kobject_add_internal: parent: 'loop0', set: '' [ 194.088982][ T9429] kobject: 'mq' (0000000017be8c0d): kobject_add_internal: parent: 'loop0', set: '' [ 194.089887][ T9424] kobject: 'tx-0' (000000002a2ef2b4): fill_kobj_path: path = '/devices/virtual/net/veth2/queues/tx-0' [ 194.099087][ T9429] kobject: 'mq' (0000000017be8c0d): kobject_uevent_env [ 194.113820][ T9424] kobject: 'tx-0' (000000002a2ef2b4): auto cleanup kobject_del [ 194.119609][ T9429] kobject: 'mq' (0000000017be8c0d): kobject_uevent_env: filter function caused the event to drop! [ 194.125139][ T9424] kobject: 'tx-0' (000000002a2ef2b4): calling ktype release [ 194.135520][ T9429] kobject: '0' (00000000c6760194): kobject_add_internal: parent: 'mq', set: '' [ 194.135596][ T9429] kobject: 'cpu0' (000000006fea40be): kobject_add_internal: parent: '0', set: '' [ 194.145747][ T9424] kobject: 'tx-0': free name [ 194.152893][ T9429] kobject: 'cpu1' (00000000a0846e60): kobject_add_internal: parent: '0', set: '' [ 194.163489][ T9424] kobject: 'queues' (000000001384ec82): kobject_cleanup, parent 000000008d654363 [ 194.168580][ T9429] kobject: 'iosched' (00000000fd83e2e4): kobject_add_internal: parent: 'queue', set: '' [ 194.198294][ T9424] kobject: 'queues' (000000001384ec82): calling ktype release [ 194.205851][ T9424] kobject: 'queues' (000000001384ec82): kset_release [ 194.212745][ T9424] kobject: 'queues': free name [ 194.217852][ T9424] kobject: 'veth2' (00000000ab5dbdfa): kobject_uevent_env [ 194.224984][ T9424] kobject: 'veth2' (00000000ab5dbdfa): fill_kobj_path: path = '/devices/virtual/net/veth2' [ 194.235460][ T9429] kobject: 'queue' (00000000240878b3): kobject_uevent_env [ 194.242667][ T9429] kobject: 'queue' (00000000240878b3): kobject_uevent_env: filter function caused the event to drop! [ 194.253592][ T9429] kobject: 'iosched' (00000000fd83e2e4): kobject_uevent_env [ 194.266753][ T9429] kobject: 'iosched' (00000000fd83e2e4): kobject_uevent_env: filter function caused the event to drop! [ 194.278685][ T9429] kobject: 'integrity' (0000000084505ae8): kobject_add_internal: parent: 'loop0', set: '' [ 194.289562][ T9429] kobject: 'integrity' (0000000084505ae8): kobject_uevent_env [ 194.297080][ T9429] kobject: 'integrity' (0000000084505ae8): kobject_uevent_env: filter function caused the event to drop! [ 194.315059][ T3920] kobject: 'loop3' (000000006ac884db): kobject_uevent_env [ 194.330815][ T9451] kobject: 'integrity' (0000000084505ae8): kobject_uevent_env [ 194.344352][ T3920] kobject: 'loop3' (000000006ac884db): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 194.346804][ T9451] kobject: 'integrity' (0000000084505ae8): kobject_uevent_env: filter function caused the event to drop! [ 194.368855][ T9451] kobject: 'integrity' (0000000084505ae8): kobject_cleanup, parent 000000008d654363 [ 194.379443][ T9451] kobject: 'integrity' (0000000084505ae8): does not have a release() function, it is broken and must be fixed. See Documentation/kobject.txt. [ 194.394656][ T9451] kobject: 'integrity': free name [ 194.401166][ T9451] kobject: '7:0' (0000000018cd1fe0): kobject_uevent_env [ 194.408213][ T9451] kobject: '7:0' (0000000018cd1fe0): fill_kobj_path: path = '/devices/virtual/bdi/7:0' [ 194.419131][ T9451] kobject: '7:0' (0000000018cd1fe0): kobject_cleanup, parent 000000008d654363 [ 194.428170][ T9451] kobject: '7:0' (0000000018cd1fe0): calling ktype release [ 194.435517][ T9451] kobject: '7:0': free name [ 194.440270][ T9451] kobject: 'mq' (0000000017be8c0d): kobject_uevent_env [ 194.448029][ T9451] kobject: 'mq' (0000000017be8c0d): kobject_uevent_env: filter function caused the event to drop! [ 194.458720][ T9451] kobject: 'queue' (00000000240878b3): kobject_uevent_env [ 194.465847][ T9451] kobject: 'queue' (00000000240878b3): kobject_uevent_env: filter function caused the event to drop! [ 194.466755][ T9424] kobject: 'veth3' (00000000f4077c42): kobject_cleanup, parent 000000008d654363 [ 194.477351][ T9451] kobject: 'iosched' (00000000fd83e2e4): kobject_uevent_env [ 194.489212][ T9424] kobject: 'veth3' (00000000f4077c42): calling ktype release [ 194.493881][ T9451] kobject: 'iosched' (00000000fd83e2e4): kobject_uevent_env: attempted to send uevent without kset! [ 194.503673][ T9424] kobject: 'veth3': free name [ 194.511782][ T9451] kobject: 'holders' (000000004d79fa3e): kobject_cleanup, parent 000000003dae96e3 [ 194.525652][ T9451] kobject: 'holders' (000000004d79fa3e): auto cleanup kobject_del [ 194.533728][ T9451] kobject: 'holders' (000000004d79fa3e): calling ktype release [ 194.541345][ T9451] kobject: (000000004d79fa3e): dynamic_kobj_release [ 194.548010][ T9451] kobject: 'holders': free name [ 194.552883][ T9451] kobject: 'slaves' (00000000998e5ecb): kobject_cleanup, parent 000000003dae96e3 [ 194.562432][ T9451] kobject: 'slaves' (00000000998e5ecb): auto cleanup kobject_del [ 194.570290][ T9451] kobject: 'slaves' (00000000998e5ecb): calling ktype release [ 194.578191][ T9451] kobject: (00000000998e5ecb): dynamic_kobj_release [ 194.584927][ T9451] kobject: 'slaves': free name [ 194.590179][ T9451] kobject: 'loop0' (000000003dae96e3): kobject_uevent_env [ 194.597617][ T9451] kobject: 'loop0' (000000003dae96e3): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 194.657376][ T9450] kobject: 'loop0' (000000003dae96e3): kobject_cleanup, parent 000000008d654363 [ 194.668812][ T3920] kobject: 'loop4' (00000000bc15ec9a): kobject_uevent_env [ 194.670049][ T9450] kobject: 'loop0' (000000003dae96e3): calling ktype release [ 194.676092][ T3920] kobject: 'loop4' (00000000bc15ec9a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 194.691125][ T9447] caif:caif_disconnect_client(): nothing to disconnect [ 194.700993][ T9450] kobject: 'queue' (00000000240878b3): kobject_cleanup, parent 000000008d654363 [ 194.710350][ T9450] kobject: 'queue' (00000000240878b3): calling ktype release [ 194.718215][ T9450] kobject: 'queue': free name [ 194.723279][ T9047] kobject: 'iosched' (00000000fd83e2e4): kobject_cleanup, parent 000000008d654363 [ 194.723936][ T9450] kobject: 'loop0': free name [ 194.732508][ T9047] kobject: 'iosched' (00000000fd83e2e4): calling ktype release [ 194.732524][ T9047] kobject: 'iosched': free name [ 194.732597][ T9047] kobject: '0' (00000000c6760194): kobject_cleanup, parent 000000008d654363 [ 194.732603][ T9047] kobject: '0' (00000000c6760194): calling ktype release [ 194.732630][ T9047] kobject: '0': free name [ 194.732646][ T9047] kobject: 'cpu0' (000000006fea40be): kobject_cleanup, parent 000000008d654363 [ 194.732653][ T9047] kobject: 'cpu0' (000000006fea40be): calling ktype release [ 194.732657][ T9047] kobject: 'cpu0': free name [ 194.732673][ T9047] kobject: 'cpu1' (00000000a0846e60): kobject_cleanup, parent 000000008d654363 [ 194.748677][ T9454] kobject: '7:0' (00000000183aab24): kobject_add_internal: parent: 'bdi', set: 'devices' [ 194.750229][ T9047] kobject: 'cpu1' (00000000a0846e60): calling ktype release [ 194.750235][ T9047] kobject: 'cpu1': free name [ 194.750250][ T9047] kobject: 'mq' (0000000017be8c0d): kobject_cleanup, parent 000000008d654363 20:29:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@newlink={0x50, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x12, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0xa, 0x1, {0x2}}}}}]}, 0x50}}, 0x0) 20:29:02 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000dc0)=@in6={0xa, 0x0, 0x0, @local, 0x6}, 0x80, 0x0}, 0x20004040) 20:29:02 executing program 4: r0 = memfd_create(&(0x7f0000000080)='&l\x80(ritylo\x00\"\x86\xe6\xb1\xc2\xb2d\xfa\xd0\x84d\xff\xc5;K\xd0*\xa2\x7f\xd4\xb5\xbd\xbf\x19\x04:\xd1~\xddY\x92lN\xe7\xb9E^gM\xed^O\xea\xff\xa2\x1d\x19\x92\xfa\xef$f7i\xe6\x10v\x00\x00\x00\x04\xcc\xef\x19\x88\xd8/\xe44&\x9f-t\xec\x8f\xe0\xd1\x1a-r3\xbf\x84]\xfb\xd8\xb9\x0f\x990l4\x9fL_\"\xef\x8dY\xcd\xf6\xff\x84\xa2\\\xf7LTQ7\x8d=r}\xff\x0f\x17', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x2000400) fcntl$getflags(r0, 0x40a) 20:29:02 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x50c7ad0cc64da3c3, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r0, r1, 0x1, 0x2}, 0x10) r2 = socket$caif_stream(0x25, 0x1, 0x1) sendmsg$sock(r2, &(0x7f00000004c0)={&(0x7f00000001c0)=@sco={0x1f, {0x5, 0x81, 0x8, 0x9, 0x40, 0x1f}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)="0dbafd74599acf2dc6dbc72cbf922ab8c96d", 0x12}, {&(0x7f0000000280)="68997abea16f2557b16ccbf4487f019384f98a27d0e87148b9524b9ff9e2b07f7be07cc404a56a9d9d58059ff9656e29aa7c6710f0cc110b18bb43ad5bba19468a516fe3aba109d0667716dc787645751a28e01d3acebdb565692ba99981894873b6abc37676", 0x66}, {&(0x7f0000000300)="fe55de568622b4", 0x7}, {&(0x7f0000000340)="87078821db703d8e52c4ae9ec5fe2d496eeda3bfcef2a7e2bdd02bc06eb14658222d628a50bc72fd48ac07558112fe1879d53af9e1f62b08649ad552a74a0958a2233214d1a089d31f7947d7a5401921ce9515d5cae350c2bccf16e1b5124153", 0x60}], 0x4, &(0x7f0000000400)=[@timestamping={{0x14, 0x1, 0x25, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @timestamping={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0x501}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x9}}], 0xa8}, 0x4) r3 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0xfff, 0x4000) r4 = creat(&(0x7f0000000080)='./file1\x00', 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) fsetxattr$security_capability(r4, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [], r6}, 0x18, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(0x0, 0x0, &(0x7f0000001d40)=0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x8801) setregid(r7, 0xee00) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c80, 0x0) r9 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r9) fchownat(r3, &(0x7f00000005c0)='./file0\x00', r6, r7, 0x1000) 20:29:02 executing program 0: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x50c7ad0cc64da3c3, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r0, r1, 0x1, 0x2}, 0x10) r2 = socket$caif_stream(0x25, 0x1, 0x1) sendmsg$sock(r2, &(0x7f00000004c0)={&(0x7f00000001c0)=@sco={0x1f, {0x5, 0x81, 0x8, 0x9, 0x40, 0x1f}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)="0dbafd74599acf2dc6dbc72cbf922ab8c96d", 0x12}, {&(0x7f0000000280)="68997abea16f2557b16ccbf4487f019384f98a27d0e87148b9524b9ff9e2b07f7be07cc404a56a9d9d58059ff9656e29aa7c6710f0cc110b18bb43ad5bba19468a516fe3aba109d0667716dc787645751a28e01d3acebdb565692ba99981894873b6abc37676", 0x66}, {&(0x7f0000000300)="fe55de568622b4", 0x7}, {&(0x7f0000000340)="87078821db703d8e52c4ae9ec5fe2d496eeda3bfcef2a7e2bdd02bc06eb14658222d628a50bc72fd48ac07558112fe1879d53af9e1f62b08649ad552a74a0958a2233214d1a089d31f7947d7a5401921ce9515d5cae350c2bccf16e1b5124153", 0x60}], 0x4, &(0x7f0000000400)=[@timestamping={{0x14, 0x1, 0x25, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @timestamping={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0x501}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x9}}], 0xa8}, 0x4) r3 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0xfff, 0x4000) r4 = creat(&(0x7f0000000080)='./file1\x00', 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) fsetxattr$security_capability(r4, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [], r6}, 0x18, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(0x0, 0x0, &(0x7f0000001d40)=0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x8801) setregid(r7, 0xee00) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c80, 0x0) r9 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r9) fchownat(r3, &(0x7f00000005c0)='./file0\x00', r6, r7, 0x1000) [ 194.750256][ T9047] kobject: 'mq' (0000000017be8c0d): calling ktype release [ 194.750272][ T9047] kobject: 'mq': free name [ 194.766748][ T9424] kobject: 'veth2' (00000000ab5dbdfa): kobject_cleanup, parent 000000008d654363 [ 194.788504][ T9454] kobject: '7:0' (00000000183aab24): kobject_uevent_env [ 194.796159][ T9424] kobject: 'veth2' (00000000ab5dbdfa): calling ktype release [ 194.815026][ T9454] kobject: '7:0' (00000000183aab24): fill_kobj_path: path = '/devices/virtual/bdi/7:0' [ 194.833937][ T9424] kobject: 'veth2': free name 20:29:02 executing program 4: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x50c7ad0cc64da3c3, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r0, r1, 0x1, 0x2}, 0x10) r2 = socket$caif_stream(0x25, 0x1, 0x1) sendmsg$sock(r2, &(0x7f00000004c0)={&(0x7f00000001c0)=@sco={0x1f, {0x5, 0x81, 0x8, 0x9, 0x40, 0x1f}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)="0dbafd74599acf2dc6dbc72cbf922ab8c96d", 0x12}, {&(0x7f0000000280)="68997abea16f2557b16ccbf4487f019384f98a27d0e87148b9524b9ff9e2b07f7be07cc404a56a9d9d58059ff9656e29aa7c6710f0cc110b18bb43ad5bba19468a516fe3aba109d0667716dc787645751a28e01d3acebdb565692ba99981894873b6abc37676", 0x66}, {&(0x7f0000000300)="fe55de568622b4", 0x7}, {&(0x7f0000000340)="87078821db703d8e52c4ae9ec5fe2d496eeda3bfcef2a7e2bdd02bc06eb14658222d628a50bc72fd48ac07558112fe1879d53af9e1f62b08649ad552a74a0958a2233214d1a089d31