Starting mcstransd: [ 30.589717] random: sshd: uninitialized urandom read (32 bytes read) [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 31.726898] random: sshd: uninitialized urandom read (32 bytes read) Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 31.955597] random: sshd: uninitialized urandom read (32 bytes read) [ 32.549154] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.57' (ECDSA) to the list of known hosts. [ 38.106229] random: sshd: uninitialized urandom read (32 bytes read) 2019/12/18 19:46:35 fuzzer started [ 38.280699] kauditd_printk_skb: 10 callbacks suppressed [ 38.280706] audit: type=1400 audit(1576698395.344:36): avc: denied { map } for pid=6944 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16480 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 39.068695] random: cc1: uninitialized urandom read (8 bytes read) 2019/12/18 19:46:37 dialing manager at 10.128.0.105:42031 2019/12/18 19:46:37 syscalls: 2653 2019/12/18 19:46:37 code coverage: enabled 2019/12/18 19:46:37 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/12/18 19:46:37 extra coverage: extra coverage is not supported by the kernel 2019/12/18 19:46:37 setuid sandbox: enabled 2019/12/18 19:46:37 namespace sandbox: enabled 2019/12/18 19:46:37 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/18 19:46:37 fault injection: enabled 2019/12/18 19:46:37 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/18 19:46:37 net packet injection: enabled 2019/12/18 19:46:37 net device setup: enabled 2019/12/18 19:46:37 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/12/18 19:46:37 devlink PCI setup: PCI device 0000:00:10.0 is not available [ 40.939703] random: crng init done 19:48:56 executing program 5: r0 = socket(0x5, 0x2, 0xa1) r1 = accept4$rose(r0, &(0x7f0000000000)=@short={0xb, @remote, @bcast, 0x1, @netrom}, &(0x7f0000000040)=0x1c, 0x40000) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000080)) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) write$FUSE_ENTRY(r2, &(0x7f0000000200)={0x90, 0x0, 0x3, {0x2, 0x2, 0xfffffffffffffff7, 0x9, 0xdf5, 0x456, {0x4, 0x80000000, 0x1, 0x3f, 0x0, 0x0, 0x5, 0xff, 0x8000, 0x0, 0x6e, r3, r5, 0x92}}}, 0x90) syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x7ff, 0x1) lsetxattr$security_selinux(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='security.selinux\x00', &(0x7f0000000380)='system_u:object_r:ksm_device_t:s0\x00', 0x22, 0x0) r6 = getuid() getgroups(0x5, &(0x7f00000003c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0, r4, r4]) write$FUSE_ENTRY(r2, &(0x7f0000000400)={0x90, 0x0, 0x8, {0x3, 0x2, 0x0, 0x80000000, 0x1f, 0x4000, {0x5, 0x6, 0x4, 0x3, 0x9, 0x3f, 0x5, 0x741, 0x6, 0x6, 0x2, r6, r7, 0x10001, 0x5}}}, 0x90) r8 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r8, 0x84, 0x7, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r9 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x9, 0x101000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000580)={0xffffffffffffffff}, 0x13f, 0x8be340934d533286}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r9, &(0x7f0000000600)={0xa, 0x4, 0xfa00, {r10}}, 0xc) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r2, 0xc4c85513, &(0x7f0000000640)={{0x8, 0x0, 0x8, 0x3f, '\x00', 0x3}, 0x0, [0x81, 0x200, 0x22, 0x3, 0xb8, 0x5, 0x6, 0x1ff, 0x1, 0x3, 0x1, 0x5, 0x80000000, 0x7, 0x10001, 0xffffffffffffff9a, 0x4, 0x0, 0x20, 0x7f, 0x10001, 0x3, 0x2, 0xffffffffffff0001, 0x80000000, 0x8eda, 0x7fff, 0x9, 0x6, 0xff, 0x80000001, 0x6, 0x5a, 0x486, 0x1, 0xfffffffffffffffe, 0x3, 0x8, 0xbee, 0x9, 0xd4, 0x100000001, 0xffffffff7fffffff, 0x5, 0x3ff, 0x14e, 0x7fffffff, 0x7, 0x8001, 0x2, 0x1ad, 0x0, 0x6, 0x5, 0x30000000000000, 0x1, 0x1, 0x2, 0x7a68, 0xb0, 0x23, 0xffffffff7fffffff, 0x8, 0x2, 0x7fff, 0x7, 0xffffffffffffff6b, 0x0, 0x1, 0x2, 0x8, 0xfff, 0x800, 0xd8, 0x5, 0xfffffffffffffffc, 0x2, 0x2a, 0x0, 0x4, 0x3f, 0x1f, 0x3, 0xffffffff, 0xd0e, 0x6, 0x7f, 0x8, 0x2455, 0x4, 0x9, 0x8, 0x8001, 0x4, 0x3, 0xffffffff, 0xde, 0x2, 0x9, 0x1, 0x43143f56, 0x5, 0x1, 0x7ff, 0x5, 0x6, 0x0, 0x400, 0x4, 0x100, 0xcaf0, 0x8, 0x8, 0x3, 0x80, 0x10000, 0x9, 0x81, 0x1, 0x6, 0x44, 0x2, 0x8, 0x1, 0x2e8, 0xfffffffffffffffe, 0x10000, 0x6]}) r11 = open(&(0x7f0000000b40)='./file0\x00', 0x400, 0x4) ioctl$sock_inet_udp_SIOCOUTQ(r11, 0x5411, &(0x7f0000000b80)) r12 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r12, 0x8982, &(0x7f0000000bc0)) r13 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/sequencer\x00', 0x20000, 0x0) stat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25DELUID(r13, 0x89e2, &(0x7f0000000d00)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r14}) mlockall(0x2) r15 = creat(&(0x7f0000000d40)='./file0\x00', 0x24) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r15, 0x80184153, &(0x7f0000001f40)={0x0, &(0x7f0000001f00)=[&(0x7f0000000d80)="70b27af0eae4d28b7778af63d1de486db83d89eb661a55168dea747572c127cdd60e1f5fc04b6351e82a805be8e5d04f4aa587358cf70970d2b31419508b96238869950290753a21781c869ed7d4edcf519601d76225aa94b7ebf51764ed46fb26b6567b958fe5d7da46350e951f69ba88fa1e0452429d0a34e8ee3e1e358f5f5d7e9e2f435ba040d7ea37a516992ee32f75071c6d7e59e3896723572a954003015ba6630269d0580613e62612478b430f67d96d176fd438", &(0x7f0000000e40)="9b7d385955e36ae39d877d6174381521da26f81f3a7d4a18e630f6cf173241c8c6365fef6d31d32dee23c821968843591f85451aa507f9c27387a030973a459e40dd6209f2f08f28ff905bf0cb807998a21e489996f86b7e952a06cefac9d0ced535e435ecb6d254c973561a302478f23088c4fe0ea42e4c517a5887452189c830b65ac74ae28093671aed554e91c78d8c9417abbbc07c4fbed71af8e07838858a64bc285f213195cbcc03eee85b78e184752bfd03ab9038b9420ad81520e1dd2c51979f2d9661f7dfeda3d3dda603117dba325051b2d3e6f54c2355fea85a6d0301ed24edeb4bad923ac7d768afc1ae9c899fc073ece2d19cf36f8dfc510c41513c14f68a19c2bc91478c4340a01cda3d3a22c30228ab7b254f0d4efec791e633d1fec4d155d0b07b6b0f5968a8935b765f22a01793b1dc07dd93cb248374cd1cae6cfa0bacefe5a725cb89d7b73beff239d6281b6f80a1d06b689ec19522b76e03fc6db33cee007d9b7569c19b7eeb955939f9c614ec9b94fb2f14171190f7c42a34d8e4d58c6d030511f1ae11806af6d76959cdfc5c7739ad5602f7b6aafd641f0acf1b6d3a6c39a2aaa56f58279b5668ad29e19daa1cfce6221a7cd3d0ee54469df8d412caf0f905a65bc13fa03cc61122e7e9d21d9683d6f614a690ba1d61095056d8bb48d6766b8745cd1a2ef945d8eebc7684ed220fb8e45c8e53a4d9128ad09ae72a425d672cd8466743861bd771a5cf7f8437c60fd4e49778298f5bf873c9822081c6dabf81f04e26e9fe36fcccffe1f4465dec1ef9c5f2e3cfcbea860c9f25a2733a15de70aeebd138699bdf6339af0a73855dfd16f9040d261ad66d2a922c0c86521d284eccdcd7d6b7fddd672237ebfd54d531736b8c9c03644522f449a62b9a41dbbf5d1dc69c5b6ab07c0944dadfde97fff4a436a82bf3b0c14758e05c4a5d245c07949e2282704f4d1bacb9a1c887ebd0974070a56e3f26fdd13a9d99e0b4f1748f5200523ff5c501771945ab9d025f1c6a518deb7d4a08d1f221d96cc9696685b1712c44a66d1e47b178b40b16540b06ad906367bd06a0b95d02014edea719b8ee13a7cdb80735294f3e87d3467862fca07204ee674821b36c6e10d365e07b17b3b2a7c23e7b3a0d152bc31b35f467bc27e2d6eef781560238eaf0edcd3ff3f027e5d02da2a47d687425cd13118545d7084efdaa3cde79bbd7f45ac3c9cc2f17a48a5a3aa52900571090ee9555b701786d369dcaa468bcebcedc2cf38cbbaed04041cdd4352f5edaa44595613adc7649b95228414a1128865ee8045086cfc43e25c02e0d6067e3a2fb1e80fbcbcafff5c76f335fb8a527be50181a6cddb688696c0ca93240ed2bbb570a3464adcd4f8670bf661863d0ec892babf12a802a6f63227c433bfdfeb4fea85c7ba66826e1a032087323fb506a8266bc48d07951c144a85736d3bfe5a2f6210b2be2eb89c3159f112e23a089f58970ec375be510685c0146cec52d0885e7c58e55faa68377ffedaac74e52f8989c1666819bd67dcadd27ae27a409257b9cda27a66672bb6103a80c425f81477e90f244c0b43d54e2ac04e19464edc3fa502c7dc3d94701923feb8921d2633484f8cada120e161b92c0f95d85c3b3a39fb9b7cebd203aeaa8ccc90634b0a3001ae4e7446a38d475f155b9673dfa79b4ac08ea97980ec30c2dc1551ec53b347b3e51cd8d4b8d811de82844944c0a3570a20525724f056a328cb9dcd8984535a4324eb0a0b15ffeefa80ee48d850374ce8069927086d108172a640758246f2eadbffc5688b8c5048d82e834d02af6934a9d862f1f5e10576422588419fda513e6e27431bfa40c97dcfd53689f636d18658b6da3b597d45e442dd3ae8f324b0f35d978099efb1f640d08287119ef6dbb70404915ca7198f0e184776e8a15e5aba9dfd99edb75850e8b7450174fdafa66b671cdce7a18062da050831f08cffcac0e7666bf3d5029b9c31846f2924b5f4e9e419a248df648027dd7b9a2d04b7c450aa5d7a3a8bc8b602ddad0b29a33d65421688e0ab4577cbd194df9a3b6117ad9f36f83fc445b62daf323d14bb0596a6534d24fe1bb22a0448295555fe15ff072f25b71e15266dbc01802cdfba9acce74937fd7934601ec3b743861600ccfd0149c55df5197c00ca1cc564f25366585d61150ba1ad7848390038249586830e39bbb09ee9e498c3cc7dfce8e642e4b3d923ea2397e652452d9e6636e12ceb8c73d05eeb71894df17ffcea74f4ff1ca2f49c43382d48445644645ad3a30e43debbe26f2a6065d9aeaeab2262ccfa45ed5ca4e9f01e4cabe600ed1a1136145737a845c40e1b905d6fe1695fc52caedcefc0432f63bf51537f7ac30c305f1b9e09d58e63a5700a529ccc6cd5bff68ca7554a2c0a67fff490f2e47c13182dcf4fab41dd2b25bd3ca6995d0a0c651db381bff3dd3449c00c01ea2636d320e5b6d82bc9ee92d9d29f4ca38bbd7428fb2e4a5139312ab123f9f72a0c569e5ccd32f5a50ce8f78661bfd7ed6622dcaf2c99e074984c0a53f76eaa58419ce8eac6eea72990015621d48656405a0792cc6dda47266533ec12e61ed4ef66e5399aa66fd7380e1c48c53da30c5224182f547fb98d22c95be6e81279e66e82f2932afa77460f8dc09c08a0b8d4a49f1c82ee20b5bdbd1365cac21c6646df24f0c0aab46cc4a71bcacc2d0c088d6553d0b250ab3c5b38ce00fc9e39750da34434468aae1fc39de32deaaffdaf1349b04b459341fe1279c0e98304f22713e1aae4a44c98a7daf20fd8199455b74cf1dbabb1248d2b6ef606a8fa081d5ebd096362124e65aaa34c80eb43a03da51e9d7667bb425a1a6ccd05ae083522b203ccdb69391e55ffe61ea1d38ea4ebbfb2bd2cea03997670605af72371e821a737a3bf0b0276da8db18e03cf343a284d14c7f773ca0d95cc754d7ced36444d86a05a98836ce8ba83c95e558afafa281c7c90f0f7020945413cbe814609b2099dc1d019779e45654cb68e6c8ea9dc018e7ab07b5867958e60df9370a2dc4db618f10db4d7412864a3b3f768d3f4a4b6b53a035d11d9a6fd9910adcb05ee64136e5dab03ca17a38d96b8cf191cfc6e2787668da03eb93b89cab2b82a266607f831f557ae0b2ef8a195dcce5c2013f37acbd5c28ccd576146ee852796f9d827e0f1ad5ddef5bcf748e463173bdab705986abe9e62b3273eed428a738fa04f03018114995082a81a5de824425b7943884f755ec029a1292f9afd55204abc4b8e998ca297294ff22158b61ba23822492f14c83084bdbb70102a5c4da56b380904462a274afedaa4bfb47df83f3c1fc718d39a2a3c180cbc580704d5028f704c2ee42f3678f78f43df3c4ae649a778cc6b61d17b37f2e616badf45b14eca66e2a14aabe6cc4d64333e74258a7fa4c6d4a0c40c695b154793bf02bbca193b54e6eab38b9490e886bc8016c4d12eba03db1c172fb081c3231e875d1ab9822afff50ee81de5f9804369a3b2cfda4088c63f16b0cce6947430e94fae5f42e02416f23069b1aafac34d780bce1b95a0e26316d4307e66f13e91466833941d21183878f08aa61e02d2b94dd55eb0d06da17a503ca214dad4d4a625ea187051e53bee8e45bf6366f9b4ddfdb1d775ef650854509145e67e7e32ea748f5cc7bc225b322a568dd1c193e6cff9d5cacd98ce80bee846a964c7adb2ba1cfeca214b0ded4454e9cae76705a5412b0257ed1386d61e1537dea6dc6352fb28ba4fac95dd6d1950fe1299853a32f56cf14880c3b50e0ea10afe6f73de301761d90ae973076ceb0b22277466f1de82205e32dc0a1fa4264f0ef7202c9597fa9001d153835274c3c5d4a9d8ffca09517873c403991610c4dbf69d62de6141f7d8e81492534af35503e53fb1da9b7bc5595de36256bbb428bba8e593b4f81cacf465a4eeb950a6d0c73a328e196acb4634d3fefc63263e04a69087f133be318bf4c79001790a940772487ea77c88e0039ec78fe53ebe154fe1f9018535e3c70c3f34a05c9d765ed08c3192e3345d73ffe1bd63bfdef7fd1237b2c13c7034571e0ee7185541287edfb1e9d7cdfe18305ac47ae6fe73968730cc946f29a790a6ce70b60fad1d5e33219cbeb4813df5b3552c81705b5ede0fb64865c6432e32f5b315874d96363efd1702f72525aa72b8d4c72646f328af1733f3eebc51b07efe9ada375317de999fe045232e3da91424dbc9dc4cb79d2acb413f37b62500f2b0101c57b97552638cf37616a2742f2bc585365d0daf120811d805d7f1990cffd31f845c19bd7b82009b037f348a34ad8ed93d1b2a761d635471fcee59f31fdc9dd9cd91eea87e8e2633138ebe7deac3f1ab3fa7877a51f1c0c31e3315554bf0b9d9433d26c2d562c507704bbabc7ff9213f180d40360d8fe975a4ccaff9d472eeca58154180d0f7206602c268ef4f42ed94f35d97f8b2e292cf1c640ea2a2d2ce5634dceb38e3af7505767bf7c6136c6e9480482bef0215b293c2d295330f70e027d479492c7daa002a1cc63787e70502ff98e054d654c6ede56dbc5becd36d2cc5d39147820115e37c2dcec6135755b0199d3224769ea4a7b51823ca0a910c1f4d960978e294fa441c3f41d13b5f43f81d1164e88d3a50723dfe647616525f33276e314670a67ee32cfa2d4c588aeb71f36db72823dd1fb84faa0aaf511fcca82edb0e6eadd882372a46a6b749bd193e165d91a587ce8f42f229b0e18cdf3cbbda834449eab54556d4b85de4efe0b7b60337369f7d8e899b80b055ef6fb48ca62594ccfc0996a460b0afe75ac964afb9139e4701b4b70efbd7069ab39c9d80cee26c936f010356ea15178b1b7b2b82d65d2dc4c229f6f8ef570e87f12db9ea78add930a4c96560e64ec555b5d9807360c1e5383928247acc47ecde02b7cc3e2301d6b135960ed396afcf357a4a0503b7f130ba8fcb288846b0008ce87da40e1430df9cef31d4c1d63463dca507f054513bcf1664c7c094b08c81f594ff6e45070d945efb1ebc37777525138a20990b340a5db5247f2fcda2e70ba68f0cc789765c3ac0df06bd6d0ffd72d838587534a861fb27b60bd893c366520ccbc84c6d395a6e1716f7fb5b72b918dc3510a894c1e22790e35bf2d71d6caca9e6f1efc3c74a6f40e41b0f9f24af0fe4e0141d3355d330cf43097ceb265d9f09da6aa5f27986a57cff7032dd320f65b5089e609f2bfe89e40db102c42a08482ce0576be56c199a4497979cbc006fa2b9447126db1990ab2966a2594ed69b1b755f9a4c7f3dc8d736c90a1f54d0df0a45cd51fab9d3166f6ea9f87891a2a303cdd81d2cc369fcde2bf3637aad9dcd2c08530bea1292a488fb8be15797559917091fa478e07c35b51842d271d0cecd52c98d8c0471349ffdf9355fe5aa1cd53181005d8db5d107aba53725851339d0a5d1c9e65287a3138e5f376dbb551228214cd2d95484724e7b741a5b061cb002b823381b1c347a4abf46a441586d89712d9ef2876febcc20236e1199cad5f40799f90261dd51b735019764b13ab7dedea9af45ffe0b56230d1af6d1b9ba4056cf446539783e418d7285b04be0f85df6bc05731d7cb2c69bf32d3dec30669a8d2563d1cd10f21e8934029c21621284cb0c58228f90dcd00ae5da7230d56b9ff7682763eb43a0592dc1fd8eb70190b2be769bde25ad2b99c3fa9ce7fad4f62a6ba3e2f4903aff32087b19045ea6c6a049c552d260ce652b07bd52dc4f1424dd62afedcd2a027e9a2617dee30675d4e28abab657", &(0x7f0000001e40)="7731b41238f34238c49ec0aabdb156135b711c22b606fbddbc34a6d9e5f7de476b872b06d910c3f819985f4c654d32db5c04154d03beaffb6a941f85d12a66013321e99ba656088cfe2be94b7bf8b92a3e629d547dd31677dcd0fbe18f5c9fb53bdf1f5d09e122e3ab551a6d1f7bb3499275d6897ab45bf6f1a6779c01e9ff4bd3e76ee3f42f009823ee837f567ea7c8d1e8140262fc19a23c6558c4d3efc94d66c5"]}) write$binfmt_script(r1, &(0x7f0000001f80)={'#! ', './file0', [{0x20, '\\user.em0@bdevcgroupcgroupwlan1:proc\xee%vboxnet1em0cgroup(-'}, {0x20, '\xe3@.em1eth1posix_acl_access-'}, {0x20, '/dev/sequencer\x00'}, {0x20, '/proc/sys/net/ipv4/vs/sync_ports\x00'}], 0xa, "b1c07c5c63f5db9e2c8f7e8db32853db59edb0d4b98ef42b09a3980771b317e3c5ef893951ab08f147addb3a9eb755997b2bdbbbe740c0b85d92717a4a33007cf0a4b0a95a5143f95154d3173bb81cf1c7d6244a14e62e187ff58419e674c412d3e49774052d6ae89bb5c4fb6d792c172f2a1626f61c28aa1eb2ac47ef7fdcd92809b5d92f36c772a8cd7c648bd31ff51cffaa79e3b505e8eaf1c5e5c0b7"}, 0x131) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000020c0)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000002100)=@assoc_value={0x0, 0x2}, &(0x7f0000002140)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r16, 0x84, 0x73, &(0x7f0000002180)={r17, 0x9986, 0x30, 0x0, 0xff}, &(0x7f00000021c0)=0x18) 19:48:56 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x224800, 0x0) write$P9_RRENAMEAT(r0, &(0x7f0000000040)={0x7, 0x4b, 0x2}, 0x7) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000080)={0x0, 0x101}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000100)={0xfffb, 0xb163a0c7c5fb6a2, 0x3ff, 0x7fffffff, r1}, 0x10) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x404c00, 0x0) setsockopt$inet_tcp_buf(r2, 0x6, 0x1c, &(0x7f0000000180)="df30", 0x2) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x18200, 0x0) ioctl$PPPIOCSMRRU(r3, 0x4004743b, &(0x7f0000000200)=0x5) socketpair(0x8, 0x4, 0x4, &(0x7f0000000240)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000280)={r1, 0xcd, "7f61945fee0bd0194ae15af7e8aaeef16d773f677789d71ecfe1192055a636b1a391ae5afac853180d21becfbe66204187bee728e872cb08c930bd4214fc84d12e95e4af594f3ec00a2614ecb3e72924f1cea9f647552e79361668588fdd43a88fb2681ff14ab25ad7b29683f0f79eec8554b61ad0c01c3a4653bc9c0fc3b94cbd9b976b896a682e6ee6d65a484b3af7776a6e8c0e40322d39d6ebf0871b40038639c6bd2334fe331f56546be5a27f67d2f76ceb71ad0ddc10729e51257bd016d655957bdc9e1f8ef0788fbf65"}, &(0x7f0000000380)=0xd5) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r4, 0x84, 0x17, &(0x7f00000003c0)={r5, 0x5, 0xdd, "5b9534becbf828248d8bfd6a3c7a0432ba7dbc4f7557e8e7b30e756bbf0563d9fae1345487ec17d9f66731b91ff68adb7726b5b9286d3b15ec84386c703e46a0fc85617fae6f12212643f45df8d35aa401e0ad4309e53053e8e7cc62762d0b47dcee8e635441b6155c568411fbc88a5872c100cea853a23a0fd21af335e8f14aef500207fdc318233bb5ef644d8558c545ac3fd041d75f4902eef95f10b78d30ef1ca61385b8d71a2b467bad99f93b11528892c3036141e1e0e445cdffd6af8051fa5ca4a2253c70504b9014eeab8edf7f502ab866724eedf0d456ce27"}, 0xe5) geteuid() ioctl$SIOCRSACCEPT(r4, 0x89e3) r6 = getuid() getresgid(&(0x7f00000004c0), &(0x7f0000000500)=0x0, &(0x7f0000000540)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@mcast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @initdev}}, 0x0, @in=@empty}}, &(0x7f0000000680)=0xe8) r9 = getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@multicast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@empty}}, &(0x7f00000007c0)=0xe8) r11 = getegid() write$FUSE_DIRENTPLUS(r2, &(0x7f0000000800)={0x210, 0xfffffffffffffff5, 0x5, [{{0x6, 0x3, 0x7, 0x81, 0x10000, 0x20, {0x5, 0x4, 0x8000, 0x4, 0x10000, 0x9, 0xffffffff, 0x0, 0x3, 0x3c6, 0x7, r6, r7, 0x8, 0x3}}, {0x0, 0xffffffff80000001, 0x11, 0xffff, '/dev/dlm-control\x00'}}, {{0x4, 0x0, 0x100000001, 0x100000001, 0x5, 0xa499, {0x6, 0xabe, 0x7ff, 0x2, 0x8001, 0x1, 0x7fffffff, 0x8, 0x3, 0xffffdadc, 0x1, r8, r9, 0x0, 0x7}}, {0x1, 0x0, 0xf, 0xfff, 'bdevppp1wlan0#['}}, {{0x6, 0x2, 0x6, 0x3, 0x9, 0x8, {0x2, 0xfffffffffffffffc, 0x800, 0x7ff, 0x7ff, 0x4, 0xff, 0x101, 0x9, 0x8000, 0x793, r10, r11, 0x7fffffff, 0x8}}, {0x5, 0x9, 0xa, 0x4, '/dev/zero\x00'}}]}, 0x210) r12 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/btrfs-control\x00', 0x60546, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000ac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000b40)=0x80) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000b80)={0x0, 0x0}) sendmsg$nl_route(r12, &(0x7f0000000cc0)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000bc0)=@newlink={0xb4, 0x10, 0x10, 0x70bd27, 0x25dfdbff, {0x0, 0x0, 0x0, r13, 0x1020, 0x204}, [@IFLA_ADDRESS={0xc, 0x1, @random="ad39c10c0353"}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_AF_SPEC={0x1c, 0x1a, [{0x4, 0x7}, {0x4, 0x2}, {0x4, 0x2}, {0x4, 0x1c}, {0x4, 0x11}, {0x4, 0xa}]}, @IFLA_VF_PORTS={0x20, 0x18, [{0x1c, 0x1, [@IFLA_PORT_PROFILE={0x8, 0x2, 'em1\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x5}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}]}]}, @IFLA_MAP={0x24, 0xe, {0x20, 0x2, 0x5, 0x596f, 0x0, 0x4}}, @IFLA_TXQLEN={0x8, 0xd, 0x8422}, @IFLA_MTU={0x8, 0xe, 0x2d5b}, @IFLA_NET_NS_PID={0x8, 0x13, r14}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x8}]}, 0xb4}, 0x1, 0x0, 0x0, 0x40825}, 0xc0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000d00)={r1, 0xb4, "2a458687b7acb505e0711afb53316eadf3a1cd8af520a59d7cb40753cb894715a3ba17554d2271bfa353b8190e04edf4600ac94464e6b06b1fb4ef124c4c119b0141449660dcebd59fb2069c93e50f9ef6ab0bbb2e8d17f87006d2c068894be0701cd89199856177b5c975ad21ec78cd652f34db577fb546f7d80257ab98c20431af8367eda0bc956fe5c713ad6566f5f3f0a325fbe7dc1b8a2958deddf217dbf8331b1f349965b9b7ee4d9ecb3f1773a38454b6"}, &(0x7f0000000dc0)=0xbc) r15 = shmget$private(0x0, 0x2000, 0x54000000, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_LOCK(r15, 0xb) r16 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/dlm_plock\x00', 0x82, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000ec0)={r14, r0, 0x0, 0x1, &(0x7f0000000e80)='\x00', 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000f00)={r14, r16, 0x0, 0xf, &(0x7f0000000e40)='bdevppp1wlan0#[', r17}, 0x30) 19:48:56 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/kcm\x00\b\x00') r2 = socket$kcm(0x29, 0x2, 0x0) sendfile(r2, r1, 0x0, 0xffff7ffc) 19:48:56 executing program 1: r0 = socket(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000480)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000800300002801000000000000000000000000000000000000e8020000e8020000e8020000e8020000e802000004000000", @ANYPTR, @ANYBLOB="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"], 0x3) 19:48:56 executing program 2: r0 = gettid() stat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="01e202df45f1f8eddb8ee3440f00"], 0xe) prctl$PR_SET_PTRACER(0x59616d61, r0) modify_ldt$read_default(0x2, &(0x7f0000000780)=""/206, 0xce) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 19:48:56 executing program 4: r0 = gettid() stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="01e202df45f1f8eddb8ee3440f00104c99ec0cc6297fa17a5f7ab9"], 0x1b) prctl$PR_SET_PTRACER(0x59616d61, r0) modify_ldt$read_default(0x2, &(0x7f0000000780)=""/206, 0xce) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 179.587427] audit: type=1400 audit(1576698536.644:37): avc: denied { map } for pid=6944 comm="syz-fuzzer" path="/root/syzkaller-shm321459662" dev="sda1" ino=2233 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 179.632003] audit: type=1400 audit(1576698536.664:38): avc: denied { map } for pid=6963 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=99 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 179.771841] IPVS: ftp: loaded support on port[0] = 21 [ 180.577607] chnl_net:caif_netlink_parms(): no params data found [ 180.591465] IPVS: ftp: loaded support on port[0] = 21 [ 180.609950] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.616573] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.623542] device bridge_slave_0 entered promiscuous mode [ 180.630426] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.636815] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.644279] device bridge_slave_1 entered promiscuous mode [ 180.663698] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 180.673925] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 180.697717] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 180.704874] team0: Port device team_slave_0 added [ 180.712184] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 180.719139] team0: Port device team_slave_1 added [ 180.726120] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 180.735051] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 180.746868] IPVS: ftp: loaded support on port[0] = 21 [ 180.802435] device hsr_slave_0 entered promiscuous mode [ 180.841092] device hsr_slave_1 entered promiscuous mode [ 180.890903] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 180.904388] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 180.959304] chnl_net:caif_netlink_parms(): no params data found [ 180.983125] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.989522] bridge0: port 2(bridge_slave_1) entered forwarding state [ 180.996260] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.002610] bridge0: port 1(bridge_slave_0) entered forwarding state [ 181.052178] IPVS: ftp: loaded support on port[0] = 21 [ 181.081588] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.088012] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.095453] device bridge_slave_0 entered promiscuous mode [ 181.104916] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.111557] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.118686] device bridge_slave_1 entered promiscuous mode [ 181.124995] chnl_net:caif_netlink_parms(): no params data found [ 181.154753] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 181.166932] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 181.216279] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.223583] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.230677] device bridge_slave_0 entered promiscuous mode [ 181.237718] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 181.244123] 8021q: adding VLAN 0 to HW filter on device bond0 [ 181.252951] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 181.260091] team0: Port device team_slave_0 added [ 181.265158] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.273570] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.280807] device bridge_slave_1 entered promiscuous mode [ 181.288036] IPVS: ftp: loaded support on port[0] = 21 [ 181.288396] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 181.304246] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 181.311543] team0: Port device team_slave_1 added [ 181.329023] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 181.341959] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 181.357215] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 181.363571] 8021q: adding VLAN 0 to HW filter on device team0 [ 181.370529] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 181.378253] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 181.391854] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 181.399518] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.416671] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.482426] device hsr_slave_0 entered promiscuous mode [ 181.520245] device hsr_slave_1 entered promiscuous mode [ 181.561052] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 181.580558] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 181.587584] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 181.595259] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.601614] bridge0: port 1(bridge_slave_0) entered forwarding state [ 181.608510] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 181.616726] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.623107] bridge0: port 2(bridge_slave_1) entered forwarding state [ 181.630759] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 181.638187] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 181.645754] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 181.658199] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 181.666413] team0: Port device team_slave_0 added [ 181.671697] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 181.678535] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 181.685715] team0: Port device team_slave_1 added [ 181.692583] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 181.700227] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 181.707127] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 181.772605] device hsr_slave_0 entered promiscuous mode [ 181.810378] device hsr_slave_1 entered promiscuous mode [ 181.886475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 181.893876] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 181.903581] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 181.914116] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 181.914858] IPVS: ftp: loaded support on port[0] = 21 [ 181.921740] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 181.957238] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 181.964720] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 181.974020] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 181.981001] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 181.995507] chnl_net:caif_netlink_parms(): no params data found [ 182.005797] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 182.032995] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 182.063907] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 182.075177] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 182.127440] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 182.134207] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 182.147443] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 182.168575] chnl_net:caif_netlink_parms(): no params data found [ 182.226592] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.233721] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.240927] device bridge_slave_0 entered promiscuous mode [ 182.258499] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.265699] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.273273] device bridge_slave_0 entered promiscuous mode [ 182.280389] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.286719] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.293853] device bridge_slave_1 entered promiscuous mode [ 182.299841] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.306381] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.313519] device bridge_slave_1 entered promiscuous mode [ 182.339802] 8021q: adding VLAN 0 to HW filter on device bond0 [ 182.422947] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 182.433210] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 182.442797] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 182.451666] chnl_net:caif_netlink_parms(): no params data found [ 182.465555] audit: type=1400 audit(1576698539.524:39): avc: denied { relabelto } for pid=6998 comm="syz-executor.5" name="file0" dev="sda1" ino=16519 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ksm_device_t:s0 tclass=file permissive=1 [ 182.494294] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 182.501897] audit: type=1400 audit(1576698539.524:40): avc: denied { read append } for pid=6998 comm="syz-executor.5" name="file0" dev="sda1" ino=16519 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ksm_device_t:s0 tclass=file permissive=1 [ 182.501914] audit: type=1400 audit(1576698539.524:41): avc: denied { open } for pid=6998 comm="syz-executor.5" path="/root/syzkaller-testdir737525962/syzkaller.6q65im/0/file0" dev="sda1" ino=16519 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ksm_device_t:s0 tclass=file permissive=1 [ 182.501932] audit: type=1400 audit(1576698539.524:42): avc: denied { ioctl } for pid=6998 comm="syz-executor.5" path="/root/syzkaller-testdir737525962/syzkaller.6q65im/0/file0" dev="sda1" ino=16519 ioctlcmd=0x5411 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ksm_device_t:s0 tclass=file permissive=1 [ 182.501950] audit: type=1400 audit(1576698539.524:43): avc: denied { getattr } for pid=6998 comm="syz-executor.5" path="/root/syzkaller-testdir737525962/syzkaller.6q65im/0/file0" dev="sda1" ino=16519 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ksm_device_t:s0 tclass=file permissive=1 [ 182.501967] audit: type=1400 audit(1576698539.534:44): avc: denied { write } for pid=6998 comm="syz-executor.5" name="file0" dev="sda1" ino=16519 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ksm_device_t:s0 tclass=file permissive=1 [ 182.501992] audit: type=1804 audit(1576698539.534:45): pid=7005 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir737525962/syzkaller.6q65im/0/file0" dev="sda1" ino=16519 res=1 19:48:59 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) [ 182.668556] 8021q: adding VLAN 0 to HW filter on device bond0 [ 182.675732] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 182.687565] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 182.697296] audit: type=1400 audit(1576698539.754:46): avc: denied { unlink } for pid=6968 comm="syz-executor.5" name="file0" dev="sda1" ino=16519 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ksm_device_t:s0 tclass=file permissive=1 [ 182.736019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.744321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.757844] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 19:48:59 executing program 5: r0 = socket(0x2, 0x8001, 0x0) close(r0) r1 = socket(0x2, 0x400000000002, 0x0) setsockopt(r1, 0x0, 0x22, &(0x7f0000000000)="caf5b415", 0x4) sendmsg$unix(r0, &(0x7f0000000840)={&(0x7f0000000040)=@abs={0x0, 0x0, 0x1}, 0x8, 0x0}, 0x0) 19:48:59 executing program 5: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20284}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f0000000200)=@tipc=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x3, 0x3}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000280)="68d96ed4fabf2c8d46b11d19405be194a4358b4a3454a0caa310968272b986db582359e10d8d58e7dc1974cb5bc996226cb11535b2e13142fd18ceebb4d46fa27a9d361b57a7d40ac3d9eda37ab862b35b1fd52dee4816d1111e3c4bcba5b7bfc1d12e62933bec2db6cc944b6e2a809f60ceb67c825a819f4a5a7e1c55bf92159aa4ddc662972535c321dcff4c68fd43969546bc83b63c050b3d0c9141dcffe39b300a32", 0xa4}], 0x1, &(0x7f0000000640)=ANY=[@ANYBLOB="d0000000000000001701000007000000411e562d7d8fd33cb6bcff8a83d4456b6415db5d0f5de877a2b2ccc3a70be75e6ce88434dcb73d858561b68ccfae9b9b71f441fe8f24919d0e62135ec35aca2ba48197e38dac8299e839b839b00fc044302331f6055ae6764f8960cee42820c17f00300b44e7a2bba75d4b7ffccb9e4351c6d0029d3b2452ce1e9cd9aea939b33a7dde6e82484add9abb01a95f3f3e2dd9313e03b4369e3148b1772a3a113699910854ba742d14c3ad5a4f88561c0491634fb5cdddf6820498a2504ccb810000e8000000000000000801000006000000bc0792777c58d5d6c475b73f75e6194bf128348ae124b421b62bb5e5deaf569f1878b41abf120826cc6adef9752e2d0291416f0ab562a9f3e819a2d39cdffd0a8ae8c3206c8b91da775f1878ffb9704edd98185cfca3b5de7b8c9014a6cdf6c881c152ed57d3a31f2cade7d808772c1ac664f0c418eb74b8365c53ad87ee7c128a1bd3974a3327d3a2380ef04b79e94f123786e57d34605b20cf01d58152bb49c59dcd49470b7fb2d820c58d977b96f637b1de8b1152503b45ea713a05bb836f4f059f7bc1cc37796ca177ff4d6a1b20fc53e54c5d000000d000000000000000ff000000040000004e6b0884ebe2df7a1007650214e70174c6e0c69bab6aebc0391dae84096da89a929a1b140ad3a7d90c95b318df13ce4ceb4a88635b0e9fc587ecf9279870b7e3311adddd08fa839f5157d2835dbae9722f8dbcf26c7d726e27fcfa58260f473f4c3fdc0d14c175237b224aacddbfca95c99fd556eea00beb6090f3e273f99e04cbccf9eed8ef113e5abc41ee2739dc9017a5810ebaea9a6a3865e8309d140d826a2658a6ccc4fc86a5c369cd88e482e5f5b56d78fd3f21f169000000000000002000000000000000040100001f000000b9c3a0c470fb2c103200000000000000eb9b5d54a245d5001c58ee3eae39adedc23086e8005e975991d2626463d58cf8dcfb038504abcf04035ab58c965c1e"], 0x2a8}, 0x1) socket$kcm(0x11, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3b, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904044865160b005b0010000000000004140e000a0002000000dc2976d153b4", 0x235}], 0x1}, 0x0) [ 182.786041] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 182.796504] 8021q: adding VLAN 0 to HW filter on device team0 [ 182.827635] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 182.835172] team0: Port device team_slave_0 added [ 182.840369] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 182.847399] team0: Port device team_slave_0 added [ 182.853280] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 182.860374] team0: Port device team_slave_1 added [ 182.871785] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 182.880522] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 182.887645] team0: Port device team_slave_1 added [ 182.894062] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 182.901930] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.909407] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.915773] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.922658] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.929078] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.936471] device bridge_slave_0 entered promiscuous mode [ 182.944141] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 182.951428] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 182.958977] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 182.971619] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 182.980729] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 182.987736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.998645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 183.005572] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.012245] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.019160] device bridge_slave_1 entered promiscuous mode [ 183.038125] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 183.047188] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 183.058726] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 183.075237] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 183.081799] 8021q: adding VLAN 0 to HW filter on device team0 19:49:00 executing program 5: 19:49:00 executing program 5: [ 183.088832] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 183.100515] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready 19:49:00 executing program 5: 19:49:00 executing program 5: [ 183.143334] device hsr_slave_0 entered promiscuous mode [ 183.180560] device hsr_slave_1 entered promiscuous mode [ 183.225179] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 183.236398] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 183.244547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 183.252312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.259800] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.266189] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.273261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 183.283158] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 183.292106] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 183.304429] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 183.314041] team0: Port device team_slave_0 added [ 183.361817] device hsr_slave_0 entered promiscuous mode [ 183.400429] device hsr_slave_1 entered promiscuous mode [ 183.440602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 183.448168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 183.455880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 183.463487] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.469843] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.477002] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 183.485305] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 183.493232] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 183.500514] team0: Port device team_slave_1 added [ 183.506064] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 183.514616] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 183.523825] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 183.531469] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 183.539081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.546887] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.553271] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.560104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 183.567591] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 183.575355] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 183.583787] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 183.594423] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 183.602630] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 183.611487] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 183.626269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 183.634210] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 183.641926] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 183.652682] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 183.662693] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 183.712217] device hsr_slave_0 entered promiscuous mode [ 183.760340] device hsr_slave_1 entered promiscuous mode [ 183.803373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 183.811228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 183.818577] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 183.829450] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 183.839079] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 183.847183] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 183.857912] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 183.864544] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 183.874810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 183.882327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 183.889639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 183.897481] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 183.905033] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 183.914146] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 183.922833] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 183.935869] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 183.942238] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 183.949016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 183.956692] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 183.967022] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 183.985474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 183.993070] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 184.002105] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 184.017533] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 184.024089] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 184.031744] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 184.041158] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 184.047146] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 184.058877] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 184.076285] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 184.085621] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 184.095313] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 184.102477] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 184.109120] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 184.115805] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 184.122713] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 184.132545] 8021q: adding VLAN 0 to HW filter on device bond0 [ 184.141384] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 184.154154] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 184.169123] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 184.181548] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 184.196964] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 184.204616] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 184.222858] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 184.228919] 8021q: adding VLAN 0 to HW filter on device team0 [ 184.244176] 8021q: adding VLAN 0 to HW filter on device bond0 [ 184.253780] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 184.262518] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 184.269326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 184.281338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 184.292160] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 184.298229] 8021q: adding VLAN 0 to HW filter on device team0 [ 184.305459] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 184.318651] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 184.326180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 184.334468] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 184.342131] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.348454] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.355285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 184.363252] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 184.371000] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.377359] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.387369] 8021q: adding VLAN 0 to HW filter on device bond0 [ 184.396523] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 184.404878] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 184.415831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 184.423004] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 184.430733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 184.438327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 184.445888] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.452269] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.461477] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 184.469285] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 184.479778] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 184.488873] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 184.496810] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.503193] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.510775] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 184.517645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 184.526451] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 184.533418] 8021q: adding VLAN 0 to HW filter on device team0 [ 184.543573] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready 19:49:01 executing program 0: [ 184.576550] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 184.584092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 184.597022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 184.607621] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 184.619730] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 184.641030] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 184.655243] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 184.666738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 184.676338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 184.684451] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.690819] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.697687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 184.705336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 184.713280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 184.720879] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 184.729293] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 184.737667] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 184.746865] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 184.754936] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 184.764445] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 184.771572] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 184.779062] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 184.787023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 184.794994] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 184.802608] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.808971] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.815751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 184.825372] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 184.838981] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 184.847983] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 184.855575] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 184.863650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 184.871517] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 184.878826] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 184.886639] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 184.894729] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 184.904680] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 184.911977] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 184.919648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 184.927763] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 184.935218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 184.942989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 184.952593] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 184.962777] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 184.971027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 184.978611] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 184.986143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 184.993498] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 185.002171] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 185.014063] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 185.020903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 185.028339] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 185.037771] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 185.046123] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 185.052163] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 185.059787] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 185.070779] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 185.078325] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 185.088307] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 185.098755] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 185.105144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 185.115548] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 185.122851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 185.130456] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 185.137773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 185.145613] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 185.154888] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 185.161210] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 185.172076] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 185.183235] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 185.190761] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 185.201579] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 185.208948] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 185.217873] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 185.225101] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 185.232152] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 185.238767] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 185.247704] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 185.256308] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 185.267326] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 185.275549] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 185.283612] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 185.294559] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 185.306001] 8021q: adding VLAN 0 to HW filter on device batadv0 19:49:03 executing program 3: 19:49:03 executing program 5: 19:49:06 executing program 2: 19:49:06 executing program 1: 19:49:06 executing program 0: 19:49:06 executing program 3: 19:49:06 executing program 5: 19:49:06 executing program 4: r0 = gettid() stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="01e202df45f1f8eddb8ee3440f00104c99ec0cc6297fa17a5f7ab9"], 0x1b) prctl$PR_SET_PTRACER(0x59616d61, r0) modify_ldt$read_default(0x2, &(0x7f0000000780)=""/206, 0xce) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 19:49:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) socket$inet(0x10, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 19:49:06 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) connect$netlink(0xffffffffffffffff, 0x0, 0x0) [ 189.541792] hrtimer: interrupt took 46066 ns 19:49:06 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000080)='.\x00', 0x840000ee) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000000)='.\x00', 0x80000000) open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) creat(&(0x7f00000002c0)='./bus\x00', 0x0) 19:49:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) waitid(0x0, 0x0, 0x0, 0x0, 0x0) [ 189.618865] kauditd_printk_skb: 2 callbacks suppressed [ 189.618873] audit: type=1326 audit(1576698546.674:49): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7109 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d75a code=0xffff0000 19:49:06 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) mkdir(0x0, 0x0) syz_open_dev$dri(0x0, 0x0, 0x101102) pipe(0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000140), 0x4) 19:49:06 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f00000003c0)) 19:49:06 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) pipe2(&(0x7f0000000040), 0x0) 19:49:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semtimedop(0x0, 0x0, 0x0, 0x0) [ 189.655122] audit: type=1326 audit(1576698546.674:50): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7111 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d75a code=0xffff0000 19:49:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) dup(0xffffffffffffffff) [ 189.732101] audit: type=1326 audit(1576698546.794:51): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7133 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d75a code=0xffff0000 [ 189.784455] audit: type=1326 audit(1576698546.844:52): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7140 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d75a code=0xffff0000 19:49:06 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) setxattr$smack_xattr_label(0x0, 0x0, 0x0, 0x0, 0x0) [ 189.876952] audit: type=1326 audit(1576698546.934:53): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7145 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d75a code=0xffff0000 19:49:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) write$P9_RLOPEN(r2, 0x0, 0x0) [ 190.372795] audit: type=1326 audit(1576698547.434:54): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7109 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d75a code=0xffff0000 [ 190.397918] audit: type=1326 audit(1576698547.464:55): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7111 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d75a code=0xffff0000 [ 190.453005] audit: type=1326 audit(1576698547.514:56): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7152 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d75a code=0xffff0000 [ 190.531525] audit: type=1326 audit(1576698547.594:57): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7133 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d75a code=0xffff0000 [ 190.582959] audit: type=1326 audit(1576698547.644:58): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7140 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d75a code=0xffff0000 19:49:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) utimensat(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:49:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0) recvmmsg(r2, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0xe8099786613109a0, 0x0) 19:49:09 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getresuid(&(0x7f00000002c0), &(0x7f00000000c0), 0x0) 19:49:09 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:49:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_TIMERSLACK(0x1e) 19:49:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) write$P9_RLOPEN(r2, 0x0, 0x0) 19:49:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001180)={0xe0, 0x0, 0x0, 0x0}) 19:49:09 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) shmget(0x3, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) 19:49:09 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getresuid(&(0x7f00000002c0), &(0x7f00000000c0), 0x0) 19:49:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sync() [ 192.585382] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 19:49:09 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getresuid(&(0x7f00000002c0), &(0x7f00000000c0), 0x0) 19:49:09 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getresuid(&(0x7f00000002c0), &(0x7f00000000c0), 0x0) 19:49:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sync() 19:49:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) 19:49:09 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) getresuid(&(0x7f00000002c0), &(0x7f00000000c0), 0x0) 19:49:10 executing program 1: getitimer(0x2, &(0x7f0000000100)) 19:49:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockname$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000240)=0x1c) 19:49:10 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) getresuid(&(0x7f00000002c0), &(0x7f00000000c0), 0x0) 19:49:10 executing program 2: sendmsg$inet6(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x2, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c, 0x0}, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(0x0) dup(0xffffffffffffffff) getpid() sched_setattr(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000b80)=ANY=[]) syz_open_procfs(0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) 19:49:10 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) pipe(&(0x7f0000000040)) 19:49:10 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000004e80)) 19:49:10 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) getresuid(&(0x7f00000002c0), &(0x7f00000000c0), 0x0) 19:49:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semtimedop(0x0, &(0x7f0000000000)=[{}], 0x1, &(0x7f0000000040)={0x0, 0x989680}) 19:49:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) set_robust_list(&(0x7f00000000c0), 0x18) 19:49:10 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getresuid(&(0x7f00000002c0), &(0x7f00000000c0), 0x0) 19:49:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:49:10 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) recvmmsg(r1, &(0x7f00000018c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/gro<#\xfbW\xdd.\xa5\xd4\xa3\x10\x1f3\x9dhc\xaf\xa4\x1b\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5', 0x2761, 0x0) write$cgroup_pid(r5, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) 19:49:10 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x2e, 0x0, &(0x7f0000000400)) 19:49:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x21, &(0x7f0000000380)=[{&(0x7f00000003c0)="219a", 0x2d05}], 0x1}, 0x0) 19:49:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) r1 = inotify_add_watch(r0, &(0x7f00000000c0)='.\x00', 0xa0000000) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000100)=""/191, 0xbf}], 0x1) inotify_rm_watch(r0, r1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) getpid() 19:49:10 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getresuid(&(0x7f00000002c0), &(0x7f00000000c0), 0x0) 19:49:11 executing program 2: close(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="38000000240007050000000000a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002000000000056061c2f2fa057242fed2e85582938fc24841a0ba5eceaab8d0aac7c301158c53a"], 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="500000002800210400"/20, @ANYRES32=r4, @ANYBLOB="ac08000000000000000000000c0080eb6367726f75700000200002001c0003000000000000090000000000000000040002000400060000ff156569735843de8b4c1ef779b8d8e7bf7afb33e23753792aafb467d6e5e5f83bc5b1d2c1df41944400193870e465324b63063fc06b6d0e583c75ba0a6d8da2ca131e39aeef0f"], 0x50}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x114, 0x0, 0x0, &(0x7f00000000c0)) 19:49:11 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getresuid(&(0x7f00000002c0), &(0x7f00000000c0), 0x0) 19:49:11 executing program 4: add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$revoke(0x3, r0) 19:49:11 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) pipe(&(0x7f0000000040)) 19:49:11 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getresuid(&(0x7f00000002c0), &(0x7f00000000c0), &(0x7f0000000100)) 19:49:11 executing program 1: ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0x840000ee) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000080)='.\x00', 0x840000ee) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000000)='.\x00', 0x80000000) inotify_init() 19:49:11 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000180)=""/230, 0xe6) 19:49:11 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getresuid(&(0x7f00000002c0), &(0x7f00000000c0), 0x0) 19:49:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_UNIMAP(r2, 0x560a, &(0x7f0000000100)={0x4cd}) 19:49:11 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r0, 0x104, 0x5, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getresuid(&(0x7f00000002c0), &(0x7f00000000c0), 0x0) 19:49:12 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r0, 0x104, 0x5, &(0x7f0000000180), 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getresuid(&(0x7f00000002c0), &(0x7f00000000c0), 0x0) 19:49:12 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r0, 0x104, 0x5, &(0x7f0000000180), 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getresuid(&(0x7f00000002c0), &(0x7f00000000c0), 0x0) 19:49:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) umount2(0x0, 0x0) 19:49:13 executing program 1: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) r2 = open(&(0x7f0000000200)='./bus\x00', 0x4000000000141042, 0x0) write$evdev(r2, &(0x7f00000000c0), 0xffffffed) creat(&(0x7f00000000c0)='./bus\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) 19:49:13 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) getresuid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)) 19:49:13 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getresuid(&(0x7f00000002c0), &(0x7f00000000c0), 0x0) [ 196.032769] kauditd_printk_skb: 10 callbacks suppressed [ 196.032776] audit: type=1326 audit(1576698553.094:69): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7453 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d75a code=0xffff0000 19:49:13 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getresuid(&(0x7f00000002c0), &(0x7f00000000c0), 0x0) 19:49:13 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getresuid(&(0x7f00000002c0), &(0x7f00000000c0), 0x0) [ 196.105920] audit: type=1326 audit(1576698553.134:70): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7463 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d75a code=0xffff0000 19:49:13 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getresuid(&(0x7f00000002c0), &(0x7f00000000c0), 0x0) [ 196.187115] audit: type=1326 audit(1576698553.244:71): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7477 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d75a code=0xffff0000 [ 196.383887] [ 196.385553] ====================================================== [ 196.391859] WARNING: possible circular locking dependency detected [ 196.398204] 4.14.159-syzkaller #0 Not tainted [ 196.402680] ------------------------------------------------------ [ 196.408984] syz-executor.1/7458 is trying to acquire lock: [ 196.414588] (event_mutex){+.+.}, at: [] perf_trace_destroy+0x28/0x100 [ 196.422871] [ 196.422871] but task is already holding lock: [ 196.428829] (&event->child_mutex){+.+.}, at: [] perf_event_release_kernel+0x207/0x880 [ 196.438562] [ 196.438562] which lock already depends on the new lock. [ 196.438562] [ 196.446883] [ 196.446883] the existing dependency chain (in reverse order) is: [ 196.454506] [ 196.454506] -> #5 (&event->child_mutex){+.+.}: [ 196.460575] lock_acquire+0x16f/0x430 [ 196.464974] __mutex_lock+0xe8/0x1470 [ 196.469430] mutex_lock_nested+0x16/0x20 [ 196.474075] perf_event_for_each_child+0x8a/0x150 [ 196.479428] perf_ioctl+0x1d9/0xdf0 [ 196.483640] do_vfs_ioctl+0x7ae/0x1060 [ 196.488045] SyS_ioctl+0x8f/0xc0 [ 196.491932] do_syscall_64+0x1e8/0x640 [ 196.496326] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 196.502014] [ 196.502014] -> #4 (&cpuctx_mutex){+.+.}: [ 196.507544] lock_acquire+0x16f/0x430 [ 196.511917] __mutex_lock+0xe8/0x1470 [ 196.516316] mutex_lock_nested+0x16/0x20 [ 196.521055] perf_event_init_cpu+0xc2/0x170 [ 196.525886] perf_event_init+0x2d8/0x31a [ 196.530462] start_kernel+0x3b6/0x6fd [ 196.534772] x86_64_start_reservations+0x29/0x2b [ 196.540061] x86_64_start_kernel+0x77/0x7b [ 196.544858] secondary_startup_64+0xa5/0xb0 [ 196.549696] [ 196.549696] -> #3 (pmus_lock){+.+.}: [ 196.554889] lock_acquire+0x16f/0x430 [ 196.559193] __mutex_lock+0xe8/0x1470 [ 196.563518] mutex_lock_nested+0x16/0x20 [ 196.568083] perf_event_init_cpu+0x2f/0x170 [ 196.572909] cpuhp_invoke_callback+0x1ea/0x1ab0 [ 196.578082] _cpu_up+0x228/0x530 [ 196.581954] do_cpu_up+0xa6/0x160 [ 196.585918] cpu_up+0x1b/0x20 [ 196.589531] smp_init+0x157/0x170 [ 196.593494] kernel_init_freeable+0x30b/0x532 [ 196.598516] kernel_init+0x12/0x162 [ 196.602665] ret_from_fork+0x24/0x30 [ 196.606880] [ 196.606880] -> #2 (cpu_hotplug_lock.rw_sem){++++}: [ 196.613363] lock_acquire+0x16f/0x430 [ 196.617667] cpus_read_lock+0x3d/0xc0 [ 196.622010] static_key_slow_inc+0x13/0x30 [ 196.626752] tracepoint_probe_register_prio+0x4d6/0x6d0 [ 196.632662] tracepoint_probe_register+0x2b/0x40 [ 196.637958] trace_event_reg+0x277/0x330 [ 196.642525] perf_trace_init+0x449/0xaa0 [ 196.647100] perf_tp_event_init+0x7d/0xf0 [ 196.651845] perf_try_init_event+0x164/0x200 [ 196.656765] perf_event_alloc.part.0+0xd92/0x25c0 [ 196.662123] SYSC_perf_event_open+0xad1/0x2690 [ 196.667240] SyS_perf_event_open+0x34/0x40 [ 196.672009] do_syscall_64+0x1e8/0x640 [ 196.676436] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 196.682127] [ 196.682127] -> #1 (tracepoints_mutex){+.+.}: [ 196.688005] lock_acquire+0x16f/0x430 [ 196.692309] __mutex_lock+0xe8/0x1470 [ 196.696611] mutex_lock_nested+0x16/0x20 [ 196.701179] tracepoint_probe_register_prio+0x36/0x6d0 [ 196.706964] tracepoint_probe_register+0x2b/0x40 [ 196.712259] trace_event_reg+0x277/0x330 [ 196.716828] perf_trace_init+0x449/0xaa0 [ 196.721400] perf_tp_event_init+0x7d/0xf0 [ 196.726084] perf_try_init_event+0x164/0x200 [ 196.731036] perf_event_alloc.part.0+0xd92/0x25c0 [ 196.736396] SYSC_perf_event_open+0xad1/0x2690 [ 196.741484] SyS_perf_event_open+0x34/0x40 [ 196.746226] do_syscall_64+0x1e8/0x640 [ 196.750620] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 196.756311] [ 196.756311] -> #0 (event_mutex){+.+.}: [ 196.761667] __lock_acquire+0x2cb3/0x4620 [ 196.766322] lock_acquire+0x16f/0x430 [ 196.770629] __mutex_lock+0xe8/0x1470 [ 196.775021] mutex_lock_nested+0x16/0x20 [ 196.779587] perf_trace_destroy+0x28/0x100 [ 196.784329] tp_perf_event_destroy+0x16/0x20 [ 196.789251] _free_event+0x330/0xe70 [ 196.793498] free_event+0x38/0x50 [ 196.797500] perf_event_release_kernel+0x364/0x880 [ 196.802978] perf_release+0x37/0x50 [ 196.807115] __fput+0x275/0x7a0 [ 196.810940] ____fput+0x16/0x20 [ 196.814928] task_work_run+0x114/0x190 [ 196.819327] exit_to_usermode_loop+0x1da/0x220 [ 196.824419] do_syscall_64+0x4bc/0x640 [ 196.828816] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 196.834507] [ 196.834507] other info that might help us debug this: [ 196.834507] [ 196.842654] Chain exists of: [ 196.842654] event_mutex --> &cpuctx_mutex --> &event->child_mutex [ 196.842654] [ 196.853396] Possible unsafe locking scenario: [ 196.853396] [ 196.859567] CPU0 CPU1 [ 196.864220] ---- ---- [ 196.868872] lock(&event->child_mutex); [ 196.872919] lock(&cpuctx_mutex); [ 196.878966] lock(&event->child_mutex); [ 196.885531] lock(event_mutex); [ 196.888882] [ 196.888882] *** DEADLOCK *** [ 196.888882] [ 196.894933] 2 locks held by syz-executor.1/7458: [ 196.899673] #0: (&ctx->mutex){+.+.}, at: [] perf_event_release_kernel+0x1fd/0x880 [ 196.909031] #1: (&event->child_mutex){+.+.}, at: [] perf_event_release_kernel+0x207/0x880 [ 196.919074] [ 196.919074] stack backtrace: [ 196.923563] CPU: 1 PID: 7458 Comm: syz-executor.1 Not tainted 4.14.159-syzkaller #0 [ 196.931342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.940689] Call Trace: [ 196.943269] dump_stack+0x142/0x197 [ 196.946931] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 196.952287] __lock_acquire+0x2cb3/0x4620 [ 196.956420] ? find_held_lock+0x35/0x130 [ 196.960482] ? trace_hardirqs_on+0x10/0x10 [ 196.964714] lock_acquire+0x16f/0x430 [ 196.968527] ? perf_trace_destroy+0x28/0x100 [ 196.972921] ? perf_trace_destroy+0x28/0x100 [ 196.977348] __mutex_lock+0xe8/0x1470 [ 196.981135] ? perf_trace_destroy+0x28/0x100 [ 196.985526] ? find_held_lock+0x35/0x130 [ 196.989577] ? event_function_call+0x302/0x3f0 [ 196.994237] ? perf_trace_destroy+0x28/0x100 [ 196.998782] ? mutex_trylock+0x1c0/0x1c0 [ 197.002839] ? _raw_spin_unlock_irq+0x28/0x90 [ 197.007326] ? save_trace+0x290/0x290 [ 197.011130] ? trace_hardirqs_on_caller+0x400/0x590 [ 197.016139] ? __lock_is_held+0xb6/0x140 [ 197.020277] ? check_preemption_disabled+0x3c/0x250 [ 197.025301] mutex_lock_nested+0x16/0x20 [ 197.029351] ? mutex_lock_nested+0x16/0x20 [ 197.033576] perf_trace_destroy+0x28/0x100 [ 197.037803] tp_perf_event_destroy+0x16/0x20 [ 197.042199] ? perf_tp_event_init+0xf0/0xf0 [ 197.046509] _free_event+0x330/0xe70 [ 197.050211] free_event+0x38/0x50 [ 197.053663] perf_event_release_kernel+0x364/0x880 [ 197.058592] ? perf_event_release_kernel+0x880/0x880 [ 197.063683] perf_release+0x37/0x50 [ 197.067298] __fput+0x275/0x7a0 [ 197.070565] ____fput+0x16/0x20 [ 197.073831] task_work_run+0x114/0x190 [ 197.077705] exit_to_usermode_loop+0x1da/0x220 [ 197.082273] do_syscall_64+0x4bc/0x640 [ 197.086239] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 197.091073] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 197.096251] RIP: 0033:0x4144b1 [ 197.099429] RSP: 002b:00007ffda7e893c0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 197.107135] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00000000004144b1 [ 197.114389] RDX: 0000001b2f220000 RSI: 0000000000000000 RDI: 0000000000000003 [ 197.121692] RBP: 0000000000000001 R08: 000000008cf3f7fe R09: 000000008cf3f802 [ 197.128991] R10: 00007ffda7e894a0 R11: 0000000000000293 R12: 000000000075c9a0 [ 197.136246] R13: 000000000075c9a0 R14: 0000000000760c58 R15: 000000000075c07c [ 197.147225] audit: type=1326 audit(1576698554.204:72): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7453 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d75a code=0xffff0000 [ 197.179578] audit: type=1326 audit(1576698554.204:73): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7463 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d75a code=0xffff0000 [ 197.207355] kobject: 'loop0' (ffff8880a4030320): kobject_uevent_env [ 197.213970] audit: type=1326 audit(1576698554.204:74): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7477 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d75a code=0xffff0000 [ 197.215446] kobject: 'loop0' (ffff8880a4030320): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 197.266849] kobject: 'loop5' (ffff8880a41cc560): kobject_uevent_env [ 197.274016] kobject: 'loop5' (ffff8880a41cc560): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 197.290974] kobject: 'loop2' (ffff8880a4109520): kobject_uevent_env [ 197.297937] kobject: 'loop2' (ffff8880a4109520): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 197.372104] kobject: 'loop1' (ffff8880a408ec20): kobject_uevent_env [ 197.378586] kobject: 'loop1' (ffff8880a408ec20): fill_kobj_path: path = '/devices/virtual/block/loop1' 19:49:15 executing program 4: setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={0x0, 0x1ff}, 0x8) getrusage(0xffffffffffffffff, &(0x7f0000000180)) sendmsg(0xffffffffffffffff, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x80, &(0x7f0000007f80)}, 0x2000) socket$packet(0x11, 0x2, 0x300) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::],0,:6:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:49:15 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getresuid(&(0x7f00000002c0), &(0x7f00000000c0), 0x0) 19:49:15 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="f87ccfd922cdb4d490564a54f537eeeab79d25d07a64c2eaa6736effc90056e04d1292d31655d0c0ff9ab41f654ee74bcfaa89c242b9fede7e6cf53e2ec63290bdcbbff9d815b9ec08465937c27641394913b61460aa5c0f2fbd62ad75935490d5814918f8a48cba1a481e4c5cf2d3bd64b41c50a887ab24d65f51a6b94482feaab55d7269fcf2b6706ffcaa05ad0e9a42682d685cddb737d72eae96fcebb085430752d63c3dfc2f9e919c9d022a7a399c7d6b552450218a0601d366d4d802dd1224faf3df8d49e04f273914c993075cfdabc931fb13a647b86fae62baef5425", 0xe0}, {&(0x7f0000000180)="9ef846390f3274c76f761ead6bbfb813d40ff0558e29476933523f966fa120ad52b880fcbbb97b1599823e86e428332992466c22cb347a60fd1303b3a572395d19351470739393cf82605e20ef739504a2c72c6a50f89d27c5061204738b4e0ea0085e1019d8084bc150c1a144cf4b23d27c894c20b1ed9f263cbc712f5060e6c588f06ba874ec47aa0e5892860ae7b06d1bc6e6591b139bc7eca9b4670f7c6c32021b", 0xa3}, {&(0x7f0000000240)="bab3ce86be975b2306a2443f3c646271d38e2c49de7e7a6526fc5027976d7ac17afb31e29a7cf5099d6aed67f10acf33f99c0cb525eee5f6d680362127728b6d34204873b7b0b1b81fce3a116e51c3b96b856de0647c8ebfe6424e1561e5fe589a5df4fab5882a6619b66448ac65ad47e7f62df9c950e1ff5b237ee9516ebe13db693468d4a93410c85266bdaa6a38c3", 0x90}, {&(0x7f0000000400)="8e72627130d201c83181e7d10fe46c87437759a93bfca3cf0aaa12260d2993ba25af814c93baeccd8ed0c456676316f3208bc13e83ee9c1aa8893682260166f86c047824a299c09e25c2e15e6a9a69630800315ddd76fc41945d2ba628cd7631612a4bdb111ce2ec11ab6438e0999c330115d3f400f9284585f8e295b94f5527e3ff7a59f8296ca8ca0b51a28a18c88d1b3b5cfa84a69c38232771c4372a517752b6639273ac25175145f8fe89e35299122729becc4c49eabfdad98df5b55a67159238360425c133b5158b1beffebff7ed4f9e0000000000000000bc590bbb32f3078aba5ffd3d026c96cf601dfa03fcdcd8c99f41be462776989d5a7cdf9b9bf04b353f9e5b2a9bce2fb85373ffa19ec1c8477156802772cb57ad240f496c610a333edf7d7b91ef42ff09cacde9316cb2c2fc9257d7f9549711d019612a8f66759abe6e759e3f82f32e3b7f831b953913194680d12139470cfc19d230984649a336fd1ea04ab57c04a618da5a47f1470d13ba682973e1c44c652d1b887fce35c957be343828c0d229784dc739b31832a2b2f0f2cf05452945", 0x199}], 0x4) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_map={0xc7}}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) socket$inet_udp(0x2, 0x2, 0x0) 19:49:15 executing program 5: r0 = socket(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e000000040000004003000000000000a0010000a001000000000000d0000000a8020000a8020000a802000500000000a8020000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000d0000000000000000000000000000000000000000000600053"], 0x1) 19:49:15 executing program 2: socket$packet(0x11, 0x0, 0x300) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::],0,:6:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:49:15 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) shmat(0x0, &(0x7f0000002000/0x4000)=nil, 0x0) 19:49:15 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getresuid(&(0x7f00000002c0), &(0x7f00000000c0), 0x0) 19:49:15 executing program 2: socket$packet(0x11, 0x0, 0x300) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::],0,:6:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 198.582197] kobject: 'loop4' (ffff8880a4185620): kobject_uevent_env [ 198.587615] libceph: resolve '0' (ret=-3): failed [ 198.588664] kobject: 'loop4' (ffff8880a4185620): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 198.601772] libceph: parse_ips bad ip '[d::],0,:6' [ 198.608562] libceph: resolve '0' (ret=-3): failed [ 198.615628] libceph: parse_ips bad ip '[d::],0,:6' 19:49:15 executing program 5: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) timerfd_settime(r2, 0x0, &(0x7f0000000100)={{0x77359400}, {0x0, r3+30000000}}, 0x0) dup3(r2, r1, 0x0) splice(r1, 0x0, r0, 0x0, 0x8ec0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{}, {0x0, 0x1c9c380}}, 0x0) r4 = gettid() tkill(r4, 0x14) 19:49:15 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getresuid(&(0x7f00000002c0), &(0x7f00000000c0), 0x0) 19:49:15 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="f87ccfd922cdb4d490564a54f537eeeab79d25d07a64c2eaa6736effc90056e04d1292d31655d0c0ff9ab41f654ee74bcfaa89c242b9fede7e6cf53e2ec63290bdcbbff9d815b9ec08465937c27641394913b61460aa5c0f2fbd62ad75935490d5814918f8a48cba1a481e4c5cf2d3bd64b41c50a887ab24d65f51a6b94482feaab55d7269fcf2b6706ffcaa05ad0e9a42682d685cddb737d72eae96fcebb085430752d63c3dfc2f9e919c9d022a7a399c7d6b552450218a0601d366d4d802dd1224faf3df8d49e04f273914c993075cfdabc931fb13a647b86fae62baef5425", 0xe0}, {&(0x7f0000000180)="9ef846390f3274c76f761ead6bbfb813d40ff0558e29476933523f966fa120ad52b880fcbbb97b1599823e86e428332992466c22cb347a60fd1303b3a572395d19351470739393cf82605e20ef739504a2c72c6a50f89d27c5061204738b4e0ea0085e1019d8084bc150c1a144cf4b23d27c894c20b1ed9f263cbc712f5060e6c588f06ba874ec47aa0e5892860ae7b06d1bc6e6591b139bc7eca9b4670f7c6c32021b", 0xa3}, {&(0x7f0000000240)="bab3ce86be975b2306a2443f3c646271d38e2c49de7e7a6526fc5027976d7ac17afb31e29a7cf5099d6aed67f10acf33f99c0cb525eee5f6d680362127728b6d34204873b7b0b1b81fce3a116e51c3b96b856de0647c8ebfe6424e1561e5fe589a5df4fab5882a6619b66448ac65ad47e7f62df9c950e1ff5b237ee9516ebe13db693468d4a93410c85266bdaa6a38c3", 0x90}, {&(0x7f0000000400)="8e72627130d201c83181e7d10fe46c87437759a93bfca3cf0aaa12260d2993ba25af814c93baeccd8ed0c456676316f3208bc13e83ee9c1aa8893682260166f86c047824a299c09e25c2e15e6a9a69630800315ddd76fc41945d2ba628cd7631612a4bdb111ce2ec11ab6438e0999c330115d3f400f9284585f8e295b94f5527e3ff7a59f8296ca8ca0b51a28a18c88d1b3b5cfa84a69c38232771c4372a517752b6639273ac25175145f8fe89e35299122729becc4c49eabfdad98df5b55a67159238360425c133b5158b1beffebff7ed4f9e0000000000000000bc590bbb32f3078aba5ffd3d026c96cf601dfa03fcdcd8c99f41be462776989d5a7cdf9b9bf04b353f9e5b2a9bce2fb85373ffa19ec1c8477156802772cb57ad240f496c610a333edf7d7b91ef42ff09cacde9316cb2c2fc9257d7f9549711d019612a8f66759abe6e759e3f82f32e3b7f831b953913194680d12139470cfc19d230984649a336fd1ea04ab57c04a618da5a47f1470d13ba682973e1c44c652d1b887fce35c957be343828c0d229784dc739b31832a2b2f0f2cf05452945", 0x199}], 0x4) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_map={0xc7}}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) socket$inet_udp(0x2, 0x2, 0x0) [ 198.631740] libceph: resolve '0' (ret=-3): failed [ 198.642883] libceph: parse_ips bad ip '[d::],0,:6' [ 198.648823] libceph: resolve '0' (ret=-3): failed [ 198.652906] kobject: 'loop3' (ffff8880a41715a0): kobject_uevent_env 19:49:15 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000940)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000001f000000060000009004000038030000e8000000e8000000e8000000e8000000f8030000f8030000f8030000f8030000f803000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000280069636d70000000000000000000000000000000000000000000000000000000000000000000002800434845434b53554d00000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000002800727066696c7465720000000000000000000000000000000000000000000000000000000000002800727066696c7465720000000000000000000000000000000000000000000000000000000000002800434845434b53554d000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000a000000000000000000000000000000000000000000030005450524f58590000000000000000000000000000000000000000000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c80000000000000000000000000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000030005450524f58590000000000000000000000000000000000000000000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c00000000000"], 0x1) 19:49:15 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) shmat(0x0, &(0x7f0000002000/0x4000)=nil, 0x0) 19:49:15 executing program 2: socket$packet(0x11, 0x0, 0x300) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::],0,:6:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 198.677834] kobject: 'loop3' (ffff8880a41715a0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 198.678078] libceph: parse_ips bad ip '[d::],0,:6' [ 198.706408] kobject: 'loop2' (ffff8880a4109520): kobject_uevent_env 19:49:15 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="f87ccfd922cdb4d490564a54f537eeeab79d25d07a64c2eaa6736effc90056e04d1292d31655d0c0ff9ab41f654ee74bcfaa89c242b9fede7e6cf53e2ec63290bdcbbff9d815b9ec08465937c27641394913b61460aa5c0f2fbd62ad75935490d5814918f8a48cba1a481e4c5cf2d3bd64b41c50a887ab24d65f51a6b94482feaab55d7269fcf2b6706ffcaa05ad0e9a42682d685cddb737d72eae96fcebb085430752d63c3dfc2f9e919c9d022a7a399c7d6b552450218a0601d366d4d802dd1224faf3df8d49e04f273914c993075cfdabc931fb13a647b86fae62baef5425", 0xe0}, {&(0x7f0000000180)="9ef846390f3274c76f761ead6bbfb813d40ff0558e29476933523f966fa120ad52b880fcbbb97b1599823e86e428332992466c22cb347a60fd1303b3a572395d19351470739393cf82605e20ef739504a2c72c6a50f89d27c5061204738b4e0ea0085e1019d8084bc150c1a144cf4b23d27c894c20b1ed9f263cbc712f5060e6c588f06ba874ec47aa0e5892860ae7b06d1bc6e6591b139bc7eca9b4670f7c6c32021b", 0xa3}, {&(0x7f0000000240)="bab3ce86be975b2306a2443f3c646271d38e2c49de7e7a6526fc5027976d7ac17afb31e29a7cf5099d6aed67f10acf33f99c0cb525eee5f6d680362127728b6d34204873b7b0b1b81fce3a116e51c3b96b856de0647c8ebfe6424e1561e5fe589a5df4fab5882a6619b66448ac65ad47e7f62df9c950e1ff5b237ee9516ebe13db693468d4a93410c85266bdaa6a38c3", 0x90}, {&(0x7f0000000400)="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", 0x199}], 0x4) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_map={0xc7}}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) socket$inet_udp(0x2, 0x2, 0x0) 19:49:15 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) shmat(0x0, &(0x7f0000002000/0x4000)=nil, 0x0) 19:49:15 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getresuid(&(0x7f00000002c0), &(0x7f00000000c0), 0x0) 19:49:15 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getresuid(&(0x7f00000002c0), &(0x7f00000000c0), 0x0) 19:49:15 executing program 2: socket$packet(0x11, 0x0, 0x300) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::],0,:6:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 198.725651] kobject: 'loop2' (ffff8880a4109520): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 198.735294] libceph: resolve '0' (ret=-3): failed [ 198.744408] libceph: parse_ips bad ip '[d::],0,:6' [ 198.759947] kobject: 'loop5' (ffff8880a41cc560): kobject_uevent_env 19:49:15 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="f87ccfd922cdb4d490564a54f537eeeab79d25d07a64c2eaa6736effc90056e04d1292d31655d0c0ff9ab41f654ee74bcfaa89c242b9fede7e6cf53e2ec63290bdcbbff9d815b9ec08465937c27641394913b61460aa5c0f2fbd62ad75935490d5814918f8a48cba1a481e4c5cf2d3bd64b41c50a887ab24d65f51a6b94482feaab55d7269fcf2b6706ffcaa05ad0e9a42682d685cddb737d72eae96fcebb085430752d63c3dfc2f9e919c9d022a7a399c7d6b552450218a0601d366d4d802dd1224faf3df8d49e04f273914c993075cfdabc931fb13a647b86fae62baef5425", 0xe0}, {&(0x7f0000000180)="9ef846390f3274c76f761ead6bbfb813d40ff0558e29476933523f966fa120ad52b880fcbbb97b1599823e86e428332992466c22cb347a60fd1303b3a572395d19351470739393cf82605e20ef739504a2c72c6a50f89d27c5061204738b4e0ea0085e1019d8084bc150c1a144cf4b23d27c894c20b1ed9f263cbc712f5060e6c588f06ba874ec47aa0e5892860ae7b06d1bc6e6591b139bc7eca9b4670f7c6c32021b", 0xa3}, {&(0x7f0000000240)="bab3ce86be975b2306a2443f3c646271d38e2c49de7e7a6526fc5027976d7ac17afb31e29a7cf5099d6aed67f10acf33f99c0cb525eee5f6d680362127728b6d34204873b7b0b1b81fce3a116e51c3b96b856de0647c8ebfe6424e1561e5fe589a5df4fab5882a6619b66448ac65ad47e7f62df9c950e1ff5b237ee9516ebe13db693468d4a93410c85266bdaa6a38c3", 0x90}, {&(0x7f0000000400)="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", 0x199}], 0x4) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_map={0xc7}}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) socket$inet_udp(0x2, 0x2, 0x0) [ 198.780255] kobject: 'loop5' (ffff8880a41cc560): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 198.807289] libceph: resolve '0' (ret=-3): failed [ 198.811266] kobject: 'loop3' (ffff8880a41715a0): kobject_uevent_env [ 198.819200] libceph: parse_ips bad ip '[d::],0,:6' [ 198.838354] kobject: 'loop3' (ffff8880a41715a0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 198.848854] kobject: 'loop0' (ffff8880a4030320): kobject_uevent_env [ 198.857923] kobject: 'loop0' (ffff8880a4030320): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 198.867957] kobject: 'loop4' (ffff8880a4185620): kobject_uevent_env [ 198.875408] kobject: 'loop4' (ffff8880a4185620): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 198.885920] kobject: 'loop2' (ffff8880a4109520): kobject_uevent_env [ 198.892751] kobject: 'loop2' (ffff8880a4109520): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 198.902546] kobject: 'loop1' (ffff8880a408ec20): kobject_uevent_env [ 198.908956] kobject: 'loop1' (ffff8880a408ec20): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 198.918788] kobject: 'loop0' (ffff8880a4030320): kobject_uevent_env [ 198.925216] kobject: 'loop0' (ffff8880a4030320): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 198.935026] kobject: 'loop4' (ffff8880a4185620): kobject_uevent_env [ 198.941502] kobject: 'loop4' (ffff8880a4185620): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 198.951329] kobject: 'loop2' (ffff8880a4109520): kobject_uevent_env [ 198.957731] kobject: 'loop2' (ffff8880a4109520): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 198.967508] kobject: 'loop0' (ffff8880a4030320): kobject_uevent_env [ 198.973944] kobject: 'loop0' (ffff8880a4030320): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 198.983806] kobject: 'loop0' (ffff8880a4030320): kobject_uevent_env [ 198.990249] kobject: 'loop0' (ffff8880a4030320): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 199.001820] kobject: 'loop1' (ffff8880a408ec20): kobject_uevent_env [ 199.008308] kobject: 'loop1' (ffff8880a408ec20): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 199.018350] kobject: 'loop4' (ffff8880a4185620): kobject_uevent_env [ 199.024824] kobject: 'loop4' (ffff8880a4185620): fill_kobj_path: path = '/devices/virtual/block/loop4' 19:49:16 executing program 5: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) timerfd_settime(r2, 0x0, &(0x7f0000000100)={{0x77359400}, {0x0, r3+30000000}}, 0x0) dup3(r2, r1, 0x0) splice(r1, 0x0, r0, 0x0, 0x8ec0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{}, {0x0, 0x1c9c380}}, 0x0) r4 = gettid() tkill(r4, 0x14) 19:49:16 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getresuid(&(0x7f00000002c0), &(0x7f00000000c0), 0x0) 19:49:16 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="f87ccfd922cdb4d490564a54f537eeeab79d25d07a64c2eaa6736effc90056e04d1292d31655d0c0ff9ab41f654ee74bcfaa89c242b9fede7e6cf53e2ec63290bdcbbff9d815b9ec08465937c27641394913b61460aa5c0f2fbd62ad75935490d5814918f8a48cba1a481e4c5cf2d3bd64b41c50a887ab24d65f51a6b94482feaab55d7269fcf2b6706ffcaa05ad0e9a42682d685cddb737d72eae96fcebb085430752d63c3dfc2f9e919c9d022a7a399c7d6b552450218a0601d366d4d802dd1224faf3df8d49e04f273914c993075cfdabc931fb13a647b86fae62baef5425", 0xe0}, {&(0x7f0000000180)="9ef846390f3274c76f761ead6bbfb813d40ff0558e29476933523f966fa120ad52b880fcbbb97b1599823e86e428332992466c22cb347a60fd1303b3a572395d19351470739393cf82605e20ef739504a2c72c6a50f89d27c5061204738b4e0ea0085e1019d8084bc150c1a144cf4b23d27c894c20b1ed9f263cbc712f5060e6c588f06ba874ec47aa0e5892860ae7b06d1bc6e6591b139bc7eca9b4670f7c6c32021b", 0xa3}, {&(0x7f0000000240)="bab3ce86be975b2306a2443f3c646271d38e2c49de7e7a6526fc5027976d7ac17afb31e29a7cf5099d6aed67f10acf33f99c0cb525eee5f6d680362127728b6d34204873b7b0b1b81fce3a116e51c3b96b856de0647c8ebfe6424e1561e5fe589a5df4fab5882a6619b66448ac65ad47e7f62df9c950e1ff5b237ee9516ebe13db693468d4a93410c85266bdaa6a38c3", 0x90}, {&(0x7f0000000400)="8e72627130d201c83181e7d10fe46c87437759a93bfca3cf0aaa12260d2993ba25af814c93baeccd8ed0c456676316f3208bc13e83ee9c1aa8893682260166f86c047824a299c09e25c2e15e6a9a69630800315ddd76fc41945d2ba628cd7631612a4bdb111ce2ec11ab6438e0999c330115d3f400f9284585f8e295b94f5527e3ff7a59f8296ca8ca0b51a28a18c88d1b3b5cfa84a69c38232771c4372a517752b6639273ac25175145f8fe89e35299122729becc4c49eabfdad98df5b55a67159238360425c133b5158b1beffebff7ed4f9e0000000000000000bc590bbb32f3078aba5ffd3d026c96cf601dfa03fcdcd8c99f41be462776989d5a7cdf9b9bf04b353f9e5b2a9bce2fb85373ffa19ec1c8477156802772cb57ad240f496c610a333edf7d7b91ef42ff09cacde9316cb2c2fc9257d7f9549711d019612a8f66759abe6e759e3f82f32e3b7f831b953913194680d12139470cfc19d230984649a336fd1ea04ab57c04a618da5a47f1470d13ba682973e1c44c652d1b887fce35c957be343828c0d229784dc739b31832a2b2f0f2cf05452945", 0x199}], 0x4) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_map={0xc7}}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) 19:49:16 executing program 2: socket$packet(0x11, 0x0, 0x300) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::],0,:6:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:49:16 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) shmat(0x0, &(0x7f0000002000/0x4000)=nil, 0x0) 19:49:16 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) shmat(0x0, &(0x7f0000002000/0x4000)=nil, 0x0) 19:49:16 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="f87ccfd922cdb4d490564a54f537eeeab79d25d07a64c2eaa6736effc90056e04d1292d31655d0c0ff9ab41f654ee74bcfaa89c242b9fede7e6cf53e2ec63290bdcbbff9d815b9ec08465937c27641394913b61460aa5c0f2fbd62ad75935490d5814918f8a48cba1a481e4c5cf2d3bd64b41c50a887ab24d65f51a6b94482feaab55d7269fcf2b6706ffcaa05ad0e9a42682d685cddb737d72eae96fcebb085430752d63c3dfc2f9e919c9d022a7a399c7d6b552450218a0601d366d4d802dd1224faf3df8d49e04f273914c993075cfdabc931fb13a647b86fae62baef5425", 0xe0}, {&(0x7f0000000180)="9ef846390f3274c76f761ead6bbfb813d40ff0558e29476933523f966fa120ad52b880fcbbb97b1599823e86e428332992466c22cb347a60fd1303b3a572395d19351470739393cf82605e20ef739504a2c72c6a50f89d27c5061204738b4e0ea0085e1019d8084bc150c1a144cf4b23d27c894c20b1ed9f263cbc712f5060e6c588f06ba874ec47aa0e5892860ae7b06d1bc6e6591b139bc7eca9b4670f7c6c32021b", 0xa3}, {&(0x7f0000000240)="bab3ce86be975b2306a2443f3c646271d38e2c49de7e7a6526fc5027976d7ac17afb31e29a7cf5099d6aed67f10acf33f99c0cb525eee5f6d680362127728b6d34204873b7b0b1b81fce3a116e51c3b96b856de0647c8ebfe6424e1561e5fe589a5df4fab5882a6619b66448ac65ad47e7f62df9c950e1ff5b237ee9516ebe13db693468d4a93410c85266bdaa6a38c3", 0x90}, {&(0x7f0000000400)="8e72627130d201c83181e7d10fe46c87437759a93bfca3cf0aaa12260d2993ba25af814c93baeccd8ed0c456676316f3208bc13e83ee9c1aa8893682260166f86c047824a299c09e25c2e15e6a9a69630800315ddd76fc41945d2ba628cd7631612a4bdb111ce2ec11ab6438e0999c330115d3f400f9284585f8e295b94f5527e3ff7a59f8296ca8ca0b51a28a18c88d1b3b5cfa84a69c38232771c4372a517752b6639273ac25175145f8fe89e35299122729becc4c49eabfdad98df5b55a67159238360425c133b5158b1beffebff7ed4f9e0000000000000000bc590bbb32f3078aba5ffd3d026c96cf601dfa03fcdcd8c99f41be462776989d5a7cdf9b9bf04b353f9e5b2a9bce2fb85373ffa19ec1c8477156802772cb57ad240f496c610a333edf7d7b91ef42ff09cacde9316cb2c2fc9257d7f9549711d019612a8f66759abe6e759e3f82f32e3b7f831b953913194680d12139470cfc19d230984649a336fd1ea04ab57c04a618da5a47f1470d13ba682973e1c44c652d1b887fce35c957be343828c0d229784dc739b31832a2b2f0f2cf05452945", 0x199}], 0x4) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_map={0xc7}}) socket$inet6_tcp(0xa, 0x1, 0x0) 19:49:16 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getresuid(&(0x7f00000002c0), &(0x7f00000000c0), 0x0) 19:49:16 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="f87ccfd922cdb4d490564a54f537eeeab79d25d07a64c2eaa6736effc90056e04d1292d31655d0c0ff9ab41f654ee74bcfaa89c242b9fede7e6cf53e2ec63290bdcbbff9d815b9ec08465937c27641394913b61460aa5c0f2fbd62ad75935490d5814918f8a48cba1a481e4c5cf2d3bd64b41c50a887ab24d65f51a6b94482feaab55d7269fcf2b6706ffcaa05ad0e9a42682d685cddb737d72eae96fcebb085430752d63c3dfc2f9e919c9d022a7a399c7d6b552450218a0601d366d4d802dd1224faf3df8d49e04f273914c993075cfdabc931fb13a647b86fae62baef5425", 0xe0}, {&(0x7f0000000180)="9ef846390f3274c76f761ead6bbfb813d40ff0558e29476933523f966fa120ad52b880fcbbb97b1599823e86e428332992466c22cb347a60fd1303b3a572395d19351470739393cf82605e20ef739504a2c72c6a50f89d27c5061204738b4e0ea0085e1019d8084bc150c1a144cf4b23d27c894c20b1ed9f263cbc712f5060e6c588f06ba874ec47aa0e5892860ae7b06d1bc6e6591b139bc7eca9b4670f7c6c32021b", 0xa3}, {&(0x7f0000000240)="bab3ce86be975b2306a2443f3c646271d38e2c49de7e7a6526fc5027976d7ac17afb31e29a7cf5099d6aed67f10acf33f99c0cb525eee5f6d680362127728b6d34204873b7b0b1b81fce3a116e51c3b96b856de0647c8ebfe6424e1561e5fe589a5df4fab5882a6619b66448ac65ad47e7f62df9c950e1ff5b237ee9516ebe13db693468d4a93410c85266bdaa6a38c3", 0x90}, {&(0x7f0000000400)="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", 0x199}], 0x4) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_map={0xc7}}) 19:49:16 executing program 2: socket$packet(0x11, 0x0, 0x300) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::],0,:6:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 199.538346] kobject: 'loop5' (ffff8880a41cc560): kobject_uevent_env [ 199.544945] kobject: 'loop5' (ffff8880a41cc560): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 199.569852] libceph: resolve '0' (ret=-3): failed [ 199.576328] kobject: 'loop0' (ffff8880a4030320): kobject_uevent_env [ 199.580898] libceph: parse_ips bad ip '[d::],0,:6' 19:49:16 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getresuid(&(0x7f00000002c0), &(0x7f00000000c0), 0x0) 19:49:16 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) shmat(0x0, &(0x7f0000002000/0x4000)=nil, 0x0) [ 199.619287] kobject: 'loop0' (ffff8880a4030320): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 199.646376] libceph: resolve '0' (ret=-3): failed [ 199.655561] libceph: parse_ips bad ip '[d::],0,:6' [ 199.664825] kobject: 'loop3' (ffff8880a41715a0): kobject_uevent_env [ 199.687305] kobject: 'loop3' (ffff8880a41715a0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 199.697485] kobject: 'loop2' (ffff8880a4109520): kobject_uevent_env [ 199.703974] kobject: 'loop2' (ffff8880a4109520): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 199.713940] kobject: 'loop3' (ffff8880a41715a0): kobject_uevent_env [ 199.720441] kobject: 'loop3' (ffff8880a41715a0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 199.731213] kobject: 'loop1' (ffff8880a408ec20): kobject_uevent_env [ 199.737627] kobject: 'loop1' (ffff8880a408ec20): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 199.747845] kobject: 'loop2' (ffff8880a4109520): kobject_uevent_env [ 199.754345] kobject: 'loop2' (ffff8880a4109520): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 199.764262] kobject: 'loop4' (ffff8880a4185620): kobject_uevent_env [ 199.770702] kobject: 'loop4' (ffff8880a4185620): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 199.780709] kobject: 'loop1' (ffff8880a408ec20): kobject_uevent_env [ 199.787120] kobject: 'loop1' (ffff8880a408ec20): fill_kobj_path: path = '/devices/virtual/block/loop1' 19:49:17 executing program 5: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) timerfd_settime(r2, 0x0, &(0x7f0000000100)={{0x77359400}, {0x0, r3+30000000}}, 0x0) dup3(r2, r1, 0x0) splice(r1, 0x0, r0, 0x0, 0x8ec0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{}, {0x0, 0x1c9c380}}, 0x0) r4 = gettid() tkill(r4, 0x14) 19:49:17 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_map={0xc7}}) 19:49:17 executing program 2: socket$packet(0x11, 0x0, 0x300) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::],0,:6:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:49:17 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) getresuid(&(0x7f00000002c0), &(0x7f00000000c0), 0x0) 19:49:17 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) shmat(0x0, &(0x7f0000002000/0x4000)=nil, 0x0) 19:49:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000002000/0x4000)=nil, 0x0) 19:49:17 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) getresuid(&(0x7f00000002c0), &(0x7f00000000c0), 0x0) 19:49:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) shmat(0x0, &(0x7f0000002000/0x4000)=nil, 0x0) 19:49:17 executing program 0: ioctl$sock_ifreq(0xffffffffffffffff, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_map={0xc7}}) [ 200.208864] kobject: 'loop5' (ffff8880a41cc560): kobject_uevent_env [ 200.217081] kobject: 'loop5' (ffff8880a41cc560): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 200.230695] libceph: resolve '0' (ret=-3): failed [ 200.236077] libceph: parse_ips bad ip '[d::],0,:6' 19:49:17 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) getresuid(&(0x7f00000002c0), &(0x7f00000000c0), 0x0) 19:49:17 executing program 2: socket$packet(0x11, 0x0, 0x300) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::],0,:6:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:49:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) shmat(0x0, &(0x7f0000002000/0x4000)=nil, 0x0) [ 200.262197] kobject: 'loop3' (ffff8880a41715a0): kobject_uevent_env [ 200.274457] kobject: 'loop3' (ffff8880a41715a0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 200.323328] kobject: 'loop1' (ffff8880a408ec20): kobject_uevent_env [ 200.329824] kobject: 'loop1' (ffff8880a408ec20): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 200.339750] kobject: 'loop0' (ffff8880a4030320): kobject_uevent_env [ 200.346336] kobject: 'loop0' (ffff8880a4030320): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 200.356138] kobject: 'loop3' (ffff8880a41715a0): kobject_uevent_env [ 200.363612] kobject: 'loop3' (ffff8880a41715a0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 200.373945] kobject: 'loop2' (ffff8880a4109520): kobject_uevent_env [ 200.380730] kobject: 'loop2' (ffff8880a4109520): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 200.390651] kobject: 'loop1' (ffff8880a408ec20): kobject_uevent_env [ 200.397087] kobject: 'loop1' (ffff8880a408ec20): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 200.406901] kobject: 'loop4' (ffff8880a4185620): kobject_uevent_env [ 200.413353] kobject: 'loop4' (ffff8880a4185620): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 200.423128] kobject: 'loop2' (ffff8880a4109520): kobject_uevent_env [ 200.429583] kobject: 'loop2' (ffff8880a4109520): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 200.439441] kobject: 'loop0' (ffff8880a4030320): kobject_uevent_env [ 200.445895] kobject: 'loop0' (ffff8880a4030320): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 200.455711] kobject: 'loop1' (ffff8880a408ec20): kobject_uevent_env [ 200.462148] kobject: 'loop1' (ffff8880a408ec20): fill_kobj_path: path = '/devices/virtual/block/loop1' 19:49:17 executing program 5: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) timerfd_settime(r2, 0x0, &(0x7f0000000100)={{0x77359400}, {0x0, r3+30000000}}, 0x0) dup3(r2, r1, 0x0) splice(r1, 0x0, r0, 0x0, 0x8ec0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{}, {0x0, 0x1c9c380}}, 0x0) r4 = gettid() tkill(r4, 0x14) 19:49:17 executing program 2: socket$packet(0x11, 0x0, 0x300) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::],0,:6:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:49:17 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) 19:49:17 executing program 0: ioctl$sock_ifreq(0xffffffffffffffff, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_map={0xc7}}) 19:49:17 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getresuid(0x0, &(0x7f00000000c0), 0x0) 19:49:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getresuid(0x0, &(0x7f00000000c0), 0x0) 19:49:17 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::],0,:6:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:49:17 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getresuid(0x0, &(0x7f00000000c0), 0x0) [ 200.658135] kobject: 'loop2' (ffff8880a4109520): kobject_uevent_env [ 200.682263] kobject: 'loop2' (ffff8880a4109520): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 200.712008] libceph: resolve '0' (ret=-3): failed [ 200.722854] kobject: 'loop0' (ffff8880a4030320): kobject_uevent_env [ 200.729691] libceph: parse_ips bad ip '[d::],0,:6' [ 200.735120] kobject: 'loop0' (ffff8880a4030320): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 200.747921] kobject: 'loop1' (ffff8880a408ec20): kobject_uevent_env [ 200.754392] kobject: 'loop1' (ffff8880a408ec20): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 200.764154] kobject: 'loop3' (ffff8880a41715a0): kobject_uevent_env [ 200.770599] kobject: 'loop3' (ffff8880a41715a0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 200.780583] kobject: 'loop3' (ffff8880a41715a0): kobject_uevent_env [ 200.786997] kobject: 'loop3' (ffff8880a41715a0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 200.797103] kobject: 'loop1' (ffff8880a408ec20): kobject_uevent_env [ 200.803559] kobject: 'loop1' (ffff8880a408ec20): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 200.813329] kobject: 'loop0' (ffff8880a4030320): kobject_uevent_env [ 200.819749] kobject: 'loop0' (ffff8880a4030320): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 200.831154] kobject: 'loop4' (ffff8880a4185620): kobject_uevent_env [ 200.837595] kobject: 'loop4' (ffff8880a4185620): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 200.847430] kobject: 'loop2' (ffff8880a4109520): kobject_uevent_env [ 200.853859] kobject: 'loop2' (ffff8880a4109520): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 200.863740] kobject: 'loop3' (ffff8880a41715a0): kobject_uevent_env [ 200.870224] kobject: 'loop3' (ffff8880a41715a0): fill_kobj_path: path = '/devices/virtual/block/loop3' 19:49:18 executing program 5: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) timerfd_settime(r2, 0x0, &(0x7f0000000100)={{0x77359400}, {0x0, r3+30000000}}, 0x0) dup3(r2, r1, 0x0) splice(r1, 0x0, r0, 0x0, 0x8ec0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{}, {0x0, 0x1c9c380}}, 0x0) gettid() 19:49:18 executing program 1: shmat(0x0, &(0x7f0000002000/0x4000)=nil, 0x0) 19:49:18 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_map={0xc7}}) 19:49:18 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:49:18 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getresuid(&(0x7f00000002c0), 0x0, 0x0) 19:49:18 executing program 2: mknod$loop(0x0, 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::],0,:6:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:49:18 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getresuid(&(0x7f00000002c0), 0x0, 0x0) 19:49:18 executing program 2: mknod$loop(0x0, 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::],0,:6:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:49:18 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getresuid(&(0x7f00000002c0), 0x0, 0x0) 19:49:18 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_map={0xc7}}) 19:49:18 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) shmat(0x0, &(0x7f0000002000/0x4000)=nil, 0x0) 19:49:18 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) [ 201.401146] kobject: 'loop5' (ffff8880a41cc560): kobject_uevent_env [ 201.407904] kobject: 'loop5' (ffff8880a41cc560): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 201.460383] kobject: 'loop3' (ffff8880a41715a0): kobject_uevent_env [ 201.478813] kobject: 'loop3' (ffff8880a41715a0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 201.494092] kobject: 'loop2' (ffff8880a4109520): kobject_uevent_env [ 201.500747] kobject: 'loop2' (ffff8880a4109520): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 201.513183] kobject: 'loop3' (ffff8880a41715a0): kobject_uevent_env [ 201.519682] kobject: 'loop3' (ffff8880a41715a0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 201.529644] kobject: 'loop0' (ffff8880a4030320): kobject_uevent_env [ 201.536160] kobject: 'loop0' (ffff8880a4030320): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 201.545983] kobject: 'loop1' (ffff8880a408ec20): kobject_uevent_env [ 201.552519] kobject: 'loop1' (ffff8880a408ec20): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 201.562335] kobject: 'loop4' (ffff8880a4185620): kobject_uevent_env [ 201.568741] kobject: 'loop4' (ffff8880a4185620): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 201.578545] kobject: 'loop2' (ffff8880a4109520): kobject_uevent_env [ 201.584994] kobject: 'loop2' (ffff8880a4109520): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 201.595244] kobject: 'loop3' (ffff8880a41715a0): kobject_uevent_env [ 201.601707] kobject: 'loop3' (ffff8880a41715a0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 201.611585] kobject: 'loop0' (ffff8880a4030320): kobject_uevent_env [ 201.617991] kobject: 'loop0' (ffff8880a4030320): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 201.627740] kobject: 'loop4' (ffff8880a4185620): kobject_uevent_env [ 201.634190] kobject: 'loop4' (ffff8880a4185620): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 201.643948] kobject: 'loop1' (ffff8880a408ec20): kobject_uevent_env [ 201.650705] kobject: 'loop1' (ffff8880a408ec20): fill_kobj_path: path = '/devices/virtual/block/loop1' 19:49:19 executing program 5: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) timerfd_settime(r2, 0x0, &(0x7f0000000100)={{0x77359400}, {0x0, r3+30000000}}, 0x0) dup3(r2, r1, 0x0) splice(r1, 0x0, r0, 0x0, 0x8ec0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{}, {0x0, 0x1c9c380}}, 0x0) 19:49:19 executing program 2: mknod$loop(0x0, 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::],0,:6:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:49:19 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[]}}, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 19:49:19 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_map={0xc7}}) 19:49:19 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) 19:49:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) shmat(0x0, &(0x7f0000002000/0x4000)=nil, 0x0) 19:49:19 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::],0,:6:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:49:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_map={0xc7}}) [ 202.031057] kobject: 'loop5' (ffff8880a41cc560): kobject_uevent_env [ 202.042990] kobject: 'loop5' (ffff8880a41cc560): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 202.043926] kobject: 'kvm' (ffff888219481210): kobject_uevent_env 19:49:19 executing program 4: syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) 19:49:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_map={0xc7}}) [ 202.074086] kobject: 'kvm' (ffff888219481210): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 202.083176] kobject: 'loop0' (ffff8880a4030320): kobject_uevent_env [ 202.083199] kobject: 'loop0' (ffff8880a4030320): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 202.083596] kobject: 'loop2' (ffff8880a4109520): kobject_uevent_env [ 202.099320] libceph: resolve '0' (ret=-3): failed 19:49:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_map={0xc7}}) 19:49:19 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::],0,:6:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 202.125995] kobject: 'kvm' (ffff888219481210): kobject_uevent_env [ 202.132332] libceph: parse_ips bad ip '[d::],0,:6' [ 202.136727] kobject: 'kvm' (ffff888219481210): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 202.180385] libceph: resolve '0' (ret=-3): failed [ 202.185346] libceph: parse_ips bad ip '[d::],0,:6' [ 202.186480] kobject: 'loop2' (ffff8880a4109520): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 202.208094] kobject: 'loop4' (ffff8880a4185620): kobject_uevent_env [ 202.215218] kobject: 'loop4' (ffff8880a4185620): fill_kobj_path: path = '/devices/virtual/block/loop4' 19:49:19 executing program 5: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) timerfd_settime(r2, 0x0, &(0x7f0000000100)={{0x77359400}, {0x0, r3+30000000}}, 0x0) dup3(r2, r1, 0x0) splice(r1, 0x0, r0, 0x0, 0x8ec0, 0x0) 19:49:19 executing program 4: syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) 19:49:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8922, 0x0) 19:49:19 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{&(0x7f00000004c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, 0x0}}], 0x1, 0xc00030c2, 0x0) tkill(0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_tables_targets\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) 19:49:19 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::],0,:6:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:49:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) shmat(0x0, &(0x7f0000002000/0x4000)=nil, 0x0) [ 202.225114] kobject: 'loop2' (ffff8880a4109520): kobject_uevent_env [ 202.231741] kobject: 'loop2' (ffff8880a4109520): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 202.241556] kobject: 'loop4' (ffff8880a4185620): kobject_uevent_env [ 202.247988] kobject: 'loop4' (ffff8880a4185620): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 202.269495] kobject: 'loop3' (ffff8880a41715a0): kobject_uevent_env 19:49:19 executing program 4: syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) 19:49:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8922, 0x0) 19:49:19 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:49:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8922, 0x0) [ 202.286044] kobject: 'loop3' (ffff8880a41715a0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 202.299247] libceph: resolve '0' (ret=-3): failed [ 202.307380] libceph: parse_ips bad ip '[d::],0,:6' [ 202.313306] kobject: 'loop2' (ffff8880a4109520): kobject_uevent_env 19:49:19 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:49:19 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) [ 202.345003] kobject: 'loop2' (ffff8880a4109520): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 202.371742] kobject: 'loop1' (ffff8880a408ec20): kobject_uevent_env [ 202.378181] kobject: 'loop1' (ffff8880a408ec20): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 202.398842] kobject: 'loop5' (ffff8880a41cc560): kobject_uevent_env [ 202.405453] kobject: 'loop5' (ffff8880a41cc560): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 202.415629] kobject: 'loop4' (ffff8880a4185620): kobject_uevent_env [ 202.422266] kobject: 'loop4' (ffff8880a4185620): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 202.432069] kobject: 'loop0' (ffff8880a4030320): kobject_uevent_env [ 202.438635] kobject: 'loop0' (ffff8880a4030320): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 202.448534] kobject: 'loop2' (ffff8880a4109520): kobject_uevent_env [ 202.454979] kobject: 'loop2' (ffff8880a4109520): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 202.464737] kobject: 'loop0' (ffff8880a4030320): kobject_uevent_env [ 202.471321] kobject: 'loop0' (ffff8880a4030320): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 202.481175] kobject: 'loop2' (ffff8880a4109520): kobject_uevent_env [ 202.487585] kobject: 'loop2' (ffff8880a4109520): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 202.498234] kobject: 'loop4' (ffff8880a4185620): kobject_uevent_env [ 202.504653] kobject: 'loop4' (ffff8880a4185620): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 202.514369] kobject: 'loop0' (ffff8880a4030320): kobject_uevent_env [ 202.520799] kobject: 'loop0' (ffff8880a4030320): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 202.531175] kobject: 'loop1' (ffff8880a408ec20): kobject_uevent_env [ 202.537620] kobject: 'loop1' (ffff8880a408ec20): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 202.547370] kobject: 'loop2' (ffff8880a4109520): kobject_uevent_env [ 202.553813] kobject: 'loop2' (ffff8880a4109520): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 202.563537] kobject: 'loop3' (ffff8880a41715a0): kobject_uevent_env [ 202.569945] kobject: 'loop3' (ffff8880a41715a0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 202.579728] kobject: 'loop4' (ffff8880a4185620): kobject_uevent_env [ 202.586179] kobject: 'loop4' (ffff8880a4185620): fill_kobj_path: path = '/devices/virtual/block/loop4' 19:49:19 executing program 5: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) pipe(&(0x7f0000000280)) r0 = epoll_create1(0x0) r1 = timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) timerfd_settime(r1, 0x0, &(0x7f0000000100)={{0x77359400}, {0x0, r2+30000000}}, 0x0) dup3(r1, r0, 0x0) 19:49:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_map}) 19:49:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) 19:49:19 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:49:19 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{&(0x7f00000004c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, 0x0}}], 0x1, 0xc00030c2, 0x0) tkill(0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_tables_targets\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) 19:49:19 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) 19:49:19 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::],0,:6:\x00', 0x0, &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:49:19 executing program 5: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) pipe(&(0x7f0000000280)) r0 = epoll_create1(0x0) r1 = timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) dup3(r1, r0, 0x0) 19:49:19 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) [ 202.724212] kobject: 'loop5' (ffff8880a41cc560): kobject_uevent_env [ 202.733707] kobject: 'loop5' (ffff8880a41cc560): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 202.759715] bridge_slave_0: Invalid MTU 0 requested, hw min 68 19:49:19 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::],0,:6:\x00', 0x0, &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:49:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc018ae85, &(0x7f0000000000)={0x0, 0x2}) 19:49:19 executing program 5: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) pipe(&(0x7f0000000280)) r0 = epoll_create1(0x0) r1 = timerfd_create(0x0, 0x0) dup3(r1, r0, 0x0) 19:49:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_map}) [ 202.774149] kobject: 'loop2' (ffff8880a4109520): kobject_uevent_env [ 202.792767] kobject: 'loop2' (ffff8880a4109520): fill_kobj_path: path = '/devices/virtual/block/loop2' 19:49:19 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::],0,:6:\x00', 0x0, &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 19:49:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed