[ 35.272797] audit: type=1800 audit(1551705182.807:27): pid=7488 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 35.294076] audit: type=1800 audit(1551705182.807:28): pid=7488 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 36.084429] audit: type=1800 audit(1551705183.667:29): pid=7488 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 36.104080] audit: type=1800 audit(1551705183.667:30): pid=7488 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.203' (ECDSA) to the list of known hosts. 2019/03/04 13:13:15 fuzzer started 2019/03/04 13:13:17 dialing manager at 10.128.0.26:46031 2019/03/04 13:13:18 syscalls: 1 2019/03/04 13:13:18 code coverage: enabled 2019/03/04 13:13:18 comparison tracing: enabled 2019/03/04 13:13:18 extra coverage: extra coverage is not supported by the kernel 2019/03/04 13:13:18 setuid sandbox: enabled 2019/03/04 13:13:18 namespace sandbox: enabled 2019/03/04 13:13:18 Android sandbox: /sys/fs/selinux/policy does not exist 2019/03/04 13:13:18 fault injection: enabled 2019/03/04 13:13:18 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/03/04 13:13:18 net packet injection: enabled 2019/03/04 13:13:18 net device setup: enabled 13:15:53 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xb1a, 0x40) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000000c0)={0x0, 0x91, "3e3c72d70974a6719349565906ce3319c3ddc6dcb5b66e46fa614602b0e2fa95ec6ff615106cfced6cbf657156fb2ffca99333a23f30338d5cb4a71ce46074ee6d7ddb8204a10bfe9a165b203fc6ae05700e51591aa8cc88ee2d07f959451fe2a745f10c67f9e718496ac44be0d8ecb14b4a5d8e8d509d8eefecb8b1432a5c4a04a30238b8d325c734049ff0f291370d0f"}, &(0x7f0000000180)=0x99) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000001c0)={r1, 0x7, 0x1}, &(0x7f0000000200)=0x8) write$apparmor_current(r0, &(0x7f0000000240)=@profile={'stack ', 'ppp0\x00'}, 0xb) read(r0, &(0x7f0000000280)=""/247, 0xf7) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000380)) r3 = semget(0x0, 0x7, 0x80) semctl$GETZCNT(r3, 0x3, 0xf, &(0x7f00000003c0)=""/147) r4 = open(&(0x7f0000000480)='./file0\x00', 0x2000, 0x40) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f00000006c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000680)={&(0x7f0000000540)={0x120, r5, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xb000000000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8000}]}, @TIPC_NLA_BEARER={0x3c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @empty}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x6, @local, 0x6}}}}]}, @TIPC_NLA_LINK={0x6c, 0x4, [@TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x19}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x401}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x120}, 0x1, 0x0, 0x0, 0x45}, 0xc001) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000700)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000740)=0x11, 0x4) syz_open_dev$evdev(&(0x7f0000000780)='/dev/input/event#\x00', 0x8001, 0x2) shmget$private(0x0, 0x3000, 0x8, &(0x7f0000ffc000/0x3000)=nil) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000007c0)={r2, 0x24, 0x80, 0xda4, 0x7fff, 0x9}, &(0x7f0000000800)=0x14) ioctl$KVM_GET_NESTED_STATE(r4, 0xc080aebe, &(0x7f0000000840)={0x0, 0x0, 0x2080}) r6 = request_key(&(0x7f00000028c0)='cifs.spnego\x00', &(0x7f0000002900)={'syz', 0x2}, &(0x7f0000002940)='self]\x00', 0xfffffffffffffffb) r7 = add_key$keyring(&(0x7f0000002980)='keyring\x00', &(0x7f00000029c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$negate(0xd, r6, 0x4, r7) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000002a00)={0x2, 0x5, 0x7, 0x3, 0x80000000, 0xfff}) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000002a40)={0x8, 0x2, 0x3000}, 0x4) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000002a80)) getsockopt$XDP_STATISTICS(r4, 0x11b, 0x7, &(0x7f0000002ac0), &(0x7f0000002b00)=0x18) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000002b40)={r2, 0x3, 0x0, 0x800, 0x5, 0x1}, 0x14) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000002b80)={r1, 0xffffffffffffffff}, 0x8) ftruncate(r4, 0x1000) keyctl$invalidate(0x15, r6) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000002bc0)=0x3ff, 0x4) syzkaller login: [ 206.484706] IPVS: ftp: loaded support on port[0] = 21 13:15:54 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x100, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x2, 0x3}, 0x10) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000080)=0x99) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f00000000c0)=0x5, 0x4) fsetxattr$security_smack_entry(r0, &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000140)='\x00', 0x1, 0x1) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000180)) ioctl$KVM_SET_SIGNAL_MASK(r0, 0x4004ae8b, &(0x7f00000001c0)={0xab, "cd5b70a7bd85f234961e13e295103553aee22027ff2fdbf0326e875f8deb89177be81662d07e297b423e829ecfd3b3e4d24f35593c293543b626369ede174500cd02d3fbbd9270afa92cacb9ad36ab370f2614917b4f50442573b2e1236dd37cdfbdf6b36ef24b9dbe9639ebc12e100f1a88eeddf9c5db4b9ec63b98732652b38a99e9b832fc60c5e4b9ac8371c68220322e2a8f80447227d6a22c0db60c09e5faf2424ec9b20b3f203d4a"}) getpeername$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @empty}, &(0x7f00000002c0)=0x1c) ioctl$VIDIOC_QUERYSTD(r0, 0x8008563f, &(0x7f0000000300)) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000340)={0x0, 0x2}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000003c0)={r1, 0x3ff}, 0x8) ioctl$sock_netdev_private(r0, 0x89fb, &(0x7f0000000400)="0f72fc029b1082a314647ab17d0730abf18da35fa7a0") r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uhid\x00', 0x802, 0x0) sendfile(r2, r2, &(0x7f0000000480), 0xffffffffffffffff) openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r3 = mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000000, 0x1010, r0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000500)={r3}) ioctl$FS_IOC_SETVERSION(r2, 0x40087602, &(0x7f0000000540)=0xfffffffffffffffc) get_thread_area(&(0x7f0000000580)={0x34e, 0x20101000, 0x0, 0x0, 0x4, 0x9, 0x7, 0xfffffffffffff5e3, 0x1f, 0x8}) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f00000005c0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000600), 0x4) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000740)={0x14, 0xe4, &(0x7f0000000640)="025d03f85ffca09cecc750f725e33561b0ede0352c30ce42bc712c3a1056e27a04e4523484b4f61c814299cb2f6f7641c843785a9680fcd74cccf9c5104d3e1ba085e87c43dfbb565b32d6448b9fc2f887fe8b14afa8b97002e7aafe8e5c1c20aedbdcca9a514e653a3115325f7f821a084733bedc3ff6212b70a87ed63c8c2cfc907d31481fb4b7291b6b1798cef9644e0558b9855ed19542be7e6fbb3fa3f8154ecb3566d56814c3170b15a086aa2507df7d7d31eb09eee1280bd3880c6a5fff90cb6232b3e2035e42cf2ef8e866829936f0b67112397be6571c97f6162122e4c614fd"}) r4 = syz_open_dev$vcsn(&(0x7f0000000780)='/dev/vcs#\x00', 0x8, 0x80000) sendto$inet6(r4, &(0x7f00000007c0)="5e29dae5eacc311550f4e49c7ced8cd9dc1cbf0aa9f412778b", 0x19, 0x8000, &(0x7f0000000800)={0xa, 0x4e20, 0x7f5, @ipv4={[], [], @multicast2}, 0x9}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000840)={{{@in6=@local, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000940)=0xe8) bind$packet(r4, &(0x7f0000000980)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f00000009c0)) ioctl$SG_GET_KEEP_ORPHAN(r2, 0x2288, &(0x7f0000000a00)) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x80) [ 206.580673] chnl_net:caif_netlink_parms(): no params data found [ 206.667319] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.689379] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.696826] device bridge_slave_0 entered promiscuous mode [ 206.697396] IPVS: ftp: loaded support on port[0] = 21 [ 206.714616] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.721508] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.728762] device bridge_slave_1 entered promiscuous mode [ 206.774872] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 206.794668] bond0: Enslaving bond_slave_1 as an active interface with an up link 13:15:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8000, 0x1) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000040)={0x0, 0x2d, "b14f0c6087a38fbb546a179a5b1dcd2ea3c40336aba3e1358bb3a5d8ed3a9a13f9d545e605d2fb3e931f9c917d"}, &(0x7f0000000080)=0x35) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={r1, 0x1}, 0x8) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0xfffffffffffff800, 0x5, 0x20, 0x4000}, {0x4, 0x2, 0xfffffffffffffffb, 0x3}]}) r2 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) close(r0) setns(r0, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f00000001c0)={0x3, 0x4, 0x6, 0x7, 0xb, 0x80000001}) fallocate(r2, 0x40, 0x1ff, 0x6) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000200), &(0x7f0000000240)=0xc) write$FUSE_BMAP(r0, &(0x7f0000000280)={0x18, 0x0, 0x5, {0x81}}, 0x18) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000002c0)=[@window={0x3, 0x5867, 0x3ff}, @timestamp, @sack_perm, @timestamp, @mss={0x2, 0x3f}, @mss={0x2, 0xf9f5}], 0x6) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20\x00', 0x280041, 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64TRANSMUTE\x00', &(0x7f00000003c0)='TRUE', 0x4, 0x3) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x450, 0x1) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f0000000440)) setsockopt$RDS_RECVERR(r3, 0x114, 0x5, &(0x7f0000000480)=0x1, 0x4) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x20000, 0x0) ioctl$SCSI_IOCTL_SYNC(r3, 0x4) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) write$P9_RFLUSH(r5, &(0x7f0000000500)={0x7, 0x6d, 0x1}, 0x7) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000540)={0x5, 0x6, 0x0, 0x80, 0x9}) ioctl$NBD_SET_BLKSIZE(r3, 0xab01, 0x800) ioctl$PPPOEIOCDFWD(r4, 0xb101, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) pread64(r3, &(0x7f0000000580)=""/148, 0x94, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000640)={0x3, r4}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r4, 0x84, 0x15, &(0x7f0000000680)={0x7}, 0x1) ioctl$GIO_FONT(r3, 0x4b60, &(0x7f00000006c0)=""/215) [ 206.854148] team0: Port device team_slave_0 added [ 206.892536] team0: Port device team_slave_1 added [ 206.913479] chnl_net:caif_netlink_parms(): no params data found [ 206.972042] device hsr_slave_0 entered promiscuous mode [ 206.984404] IPVS: ftp: loaded support on port[0] = 21 [ 207.009839] device hsr_slave_1 entered promiscuous mode 13:15:54 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f00000015c0)='/dev/vcsa#\x00', 0x101, 0x40) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000001600)={0x0, @in6={{0xa, 0x4e22, 0x1000, @local, 0x9}}, [0x20, 0x400, 0x3, 0x2, 0x1, 0x8, 0x84, 0x6, 0x6, 0x20, 0x5, 0x100000001, 0x1, 0x8001, 0x2]}, &(0x7f0000001700)=0x100) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000001740)={r1, 0x2}, 0x8) r2 = getpgid(0xffffffffffffffff) ptrace$setregs(0xd, r2, 0x563a129a, &(0x7f0000001780)="6c68528ebb573673cf596cb33a5430d462fa2fa2e5ee321804295b3669bcc626328a912d34cb7ba63121870c4be6e778e397f72f13fe48b505bbb8e489dc76189b7d54ac096a985d8809f74c0ac50a337b2cce60c027e845b8557dd2fc8628b7c2a4b5398479dfad9a73e2e0735cc028cd33f846a9b0a99fe05e04230d941018a4ff8ca85382169a8d9eb014f6b4d88dfb2c7631585998ebf3e6ce32d3d71c643780099238301bbe5afb992c6298a186b8a8b950d75b") getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000001840)={r1, 0x600000000, 0x20, 0x2, 0x7}, &(0x7f0000001880)=0x18) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f00000018c0)=0x228000, 0x4) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000001900)={0x8, 0x7ff, 0x401}) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000001940)) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000001980)={r1, 0x4, 0x9}, 0x8) sendmsg$nl_route(r0, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001a40)={&(0x7f0000001a00)=@mpls_delroute={0x38, 0x19, 0x100, 0x70bd2d, 0x25dfdbfd, {0x1c, 0x14, 0x14, 0x3, 0xfd, 0x2, 0xff, 0xe}, [@RTA_DST={0x8, 0x1, [{0x2, 0x6, 0x2, 0x2}]}, @RTA_DST={0xc, 0x1, [{0x394, 0x81, 0x0, 0x4}, {0x7ff, 0x0, 0x8, 0x9}]}, @RTA_TTL_PROPAGATE={0x8, 0x1a, 0x7}]}, 0x38}, 0x1, 0x0, 0x0, 0x40}, 0x40) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000001ac0)={0x800000000, 0x9, 0x8}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000001b00)={0x100000000, 0x7, 0x8}) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000001b40)={0x0, 0x8, 0x2, 0x800}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000001b80)={0x1, 0x7fffffff, 0x6}) r4 = syz_open_dev$mouse(&(0x7f0000001bc0)='/dev/input/mouse#\x00', 0x4000, 0x402000) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r4, 0x84, 0x4, &(0x7f0000001c00)=0x101, 0x4) fanotify_mark(r4, 0x80, 0x40000001, r0, &(0x7f0000001c40)='./file0\x00') openat$cgroup(r0, &(0x7f0000001c80)='syz1\x00', 0x200002, 0x0) lsetxattr$security_evm(&(0x7f0000001cc0)='./file0\x00', &(0x7f0000001d00)='security.evm\x00', &(0x7f0000001d40)=@sha1={0x1, "caf51f8cfdaa73b76b748c5efcb3a50e02fd6a2b"}, 0x15, 0x1) renameat(r0, &(0x7f0000001d80)='.\x00', r0, &(0x7f0000001dc0)='./file0\x00') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000001e00)={@empty, 0x637, 0x0, 0x1, 0x0, 0x1, 0xfffffffffffffffa}, 0x20) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000001e40), &(0x7f0000001e80)=0x4) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002040)={0x0, @local}, &(0x7f0000002080)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000020c0)={@dev={0xfe, 0x80, [], 0x1e}, 0x20, r5}) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002180)={&(0x7f0000002100)=""/112, 0x8000, 0x800}, 0x18) ptrace$setregset(0x4205, r2, 0x200, &(0x7f00000022c0)={&(0x7f00000021c0)="e7bf4c655e3d46240f4dcc373cfeda60f6f5254889e1381e69a6a5e4985611a9fd02a8f006cc4e4b8b58006a170db46a49555de9618cb3fdec2a79c23993050b4754f0fb17b62548201666e8f0ea90d9423e0b263b6a6ed8ea9cc64be19a1038bf1ba7a10b8fb9bdbf226637d14b5de551c60ae0a08f957006fbdfdd0cc15dd09f3bd988204dcaa5a8847fdc4ba2421ce60b37b39275e8faffaca1c56921ad4e900f6bbb368bb6af37f198388ecb3dbcd39d2f79448fb5038fee9a7193dbfa0b2defde855ba75c6ef91e95863bd3da5561af9c8789475f70d31a42bed06210014a4247dc8c83b04e9568d1710a836a529aa4b7b317ec28", 0xf7}) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000002300)={r3, 0x9, 0x30}, 0xc) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000002340)={r1, 0xe6, "068f3b17707ab9bbb26b67cb81c1b9ebac3f862e815b9f3fd96f67cb7f4fcb6e0c60107acab1f2a7d615bc6a5c1387caa89a3fbb6c9e028e682537d15f3b4be10ffda02ecee9c517a2d36b1792f0d3f768a2c4bd05ab409a8e7be4ceaba9af55edeedf4c4d0a97d87b1fcb80069405cea8ac4a74195feff369a99ef5c2f40d341dbd90a36d3e86a46bd07a5b65aaf0f410efab9950133b272f29d3c3719e498772ed93f900edea17df2872311c1b0853fdd08e51550406898a90a324fc952b31bc54709cd83d200435d68972b44f8694650747abe691b3cc9be2e4c9dd559574fa7e174b74b8"}, &(0x7f0000002440)=0xee) [ 207.155998] IPVS: ftp: loaded support on port[0] = 21 [ 207.238971] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.245852] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.253186] device bridge_slave_0 entered promiscuous mode [ 207.266785] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.273254] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.282403] device bridge_slave_1 entered promiscuous mode 13:15:54 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x8100, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x12}}}, [0xffff, 0x0, 0x4, 0x2, 0x4, 0x0, 0x3, 0x5, 0x864c, 0x8001, 0x20, 0x9, 0xfffffffffffffffe, 0x0, 0x4]}, &(0x7f0000000340)=0x100) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000380)=@assoc_id=r1, &(0x7f00000003c0)=0x4) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000400)={r2, 0x100000000, 0x30}, &(0x7f0000000440)=0xc) mkdirat$cgroup(r0, &(0x7f0000000480)='syz0\x00', 0x1ff) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000004c0)={r3, 0x1}, &(0x7f0000000500)=0x8) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000540)) write$UHID_INPUT2(r0, &(0x7f0000000580)={0xc, 0xc0, "e46cab48bfdae9581dd0b23983f692583337934788932204b7b0186f0bca5f851c831741995910593dde916195b44b3909eaa41b9102c058da8f47ca1413cc9bdfd244942703367f330cdbe42b63a124cf8cf0988a58e734c33418253d2828d659fe6eba880f1cdf8af001ecd1abe31535990cde1b291ae61ab062d77a0793fa1b05167e63756626ca6e43ad135a7f7117812f1ef207332193e2b5a357ce90cb159b8720121f1b11efc3652914730b9f76d362ee460e4610994c80ca633f6a8c"}, 0xc6) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000680)={r3, 0x9, 0x0, 0x6, 0x8, 0x3}, 0x14) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f00000006c0)={0x1ff, 0x10000, 0x5, 0x0, 0x3, 0x100000001, 0x0, 0x7, 0x7fff, 0x0, 0x4, 0x2, 0x0, 0x7ff, 0xc2c6, 0x3f, 0xffff, 0xc3, 0x3}) r4 = creat(&(0x7f0000000700)='./file0\x00', 0x10) connect(r4, &(0x7f0000000740)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e22, @multicast1}, 0x4, 0x3, 0x4, 0x3}}, 0x80) r5 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x6, 0x1) setsockopt$inet_sctp_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000800)=@assoc_id=r2, 0x4) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r4, 0xc058534f, &(0x7f0000000840)={{0xd0, 0x5}, 0x1, 0x6, 0x401, {0x6, 0x40}, 0x5, 0x329}) ioctl$KVM_SET_BOOT_CPU_ID(r4, 0xae78, &(0x7f00000008c0)) prctl$PR_SET_DUMPABLE(0x4, 0x3) ioctl$TCSETA(r5, 0x5406, &(0x7f0000000900)={0xe946, 0x8, 0x6, 0x1, 0x1, 0xfffffffffffffffe, 0x0, 0x4, 0x8, 0x3c}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000940)={r1, 0xb59}, &(0x7f0000000980)=0x8) openat$cgroup_ro(r5, &(0x7f00000009c0)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$VT_OPENQRY(r4, 0x5600, &(0x7f0000000a00)) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000a40)=""/60) ioctl$VIDIOC_DBG_S_REGISTER(r5, 0x4038564f, &(0x7f0000000a80)={{0x2, @addr=0x9}, 0x8, 0x3, 0x1}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(r5, 0x4030ae7b, &(0x7f0000000ac0)={0x101, 0x8}) msync(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1) r6 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r5, 0x4c80, r6) r7 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/capi/capi20ncci\x00', 0x400, 0x0) ioctl$RTC_UIE_ON(r7, 0x7003) [ 207.297180] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.303684] bridge0: port 2(bridge_slave_1) entered forwarding state [ 207.310709] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.317075] bridge0: port 1(bridge_slave_0) entered forwarding state [ 207.422181] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 207.461957] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 207.506161] team0: Port device team_slave_0 added [ 207.516355] IPVS: ftp: loaded support on port[0] = 21 [ 207.535144] chnl_net:caif_netlink_parms(): no params data found [ 207.548419] team0: Port device team_slave_1 added 13:15:55 executing program 5: r0 = socket$inet6(0xa, 0xe, 0x7ff) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e24, @loopback}}, 0x6, 0x7f}, &(0x7f00000000c0)=0x90) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000100)=r1, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000140)={'filter\x00', 0x99, "3f723879585ff2f7578d6eb179f5987a43fba1737a227c5f89c8afa0249445c5446173758c40fbf38eecc752a87c67638e1a49094ae5e221b929b295d29adc7398b9d3bffd7f6c912b3e83d1924a2da75bada776d984c6052c0673cd5cb54f25982aedba009228bf759884467c37879732c0a848f39323a3e1055b507a2df59ea74e85b72a937c54f735c1ec105588d8a9f02de0fc8db087cc"}, &(0x7f0000000200)=0xbd) fsetxattr$security_smack_entry(r0, &(0x7f0000000240)='security.SMACK64IPOUT\x00', &(0x7f0000000280)='{posix_acl_accesseth1\x00', 0x16, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)=0x3ff, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={r1, @in6={{0xa, 0x4e20, 0x7f, @ipv4={[], [], @local}, 0x1f}}, 0x4, 0x9, 0x7, 0x100}, &(0x7f00000003c0)=0x98) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000400)='/dev/audio\x00', 0x8001, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r2, 0xc0305615, &(0x7f0000000440)={0x0, {0x1ff, 0x6}}) setsockopt$inet6_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000480), 0x4) write$P9_RUNLINKAT(r2, &(0x7f00000004c0)={0x7, 0x4d, 0x2}, 0x7) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast1, @in6=@initdev}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x4) getsockopt$TIPC_DEST_DROPPABLE(r2, 0x10f, 0x81, &(0x7f0000000640), &(0x7f0000000680)=0x4) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f00000006c0), 0x4) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000700)={0x3f, 0x6, 0x0, {0x2, 0x1, 0x16, 0x0, '{posix_acl_accesseth1\x00'}}, 0x3f) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000740)=0x6) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000780)='/dev/vfio/vfio\x00', 0x8000, 0x0) write$FUSE_NOTIFY_STORE(r2, &(0x7f00000007c0)={0x2c, 0x4, 0x0, {0x4, 0x0, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x2c) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000800)=""/40, &(0x7f0000000840)=0x28) r4 = syz_open_dev$sndpcmp(&(0x7f0000000880)='/dev/snd/pcmC#D#p\x00', 0x7, 0x400081) r5 = mmap$binder(&(0x7f0000fef000/0xf000)=nil, 0xf000, 0x3000004, 0x80110, r4, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000a00)={0x48, 0x0, &(0x7f00000008c0)=[@request_death={0x400c630e, 0x4}, @acquire_done={0x40106309, r5, 0x3}, @dead_binder_done={0x40086310, 0x3}, @release={0x40046306, 0x1}, @request_death={0x400c630e, 0x0, 0x2}], 0xbd, 0x0, &(0x7f0000000940)="abbea877c5b71573fd1e02daf50180c6c6404c17bf1a553d18634134f033a7badb9c01744a9a4b444e58a623e112234c74f77f61c103e581a81b5d1e98484192f7d9bd50c18dc6d7be76e9516b9473961518950d3f8716b35efb7a1a92e8df0a067dc59a357268df35931b6d5948c0c4c6ddfc02ce64602001ab0f36e2de7cdad20b7926bc352fa9d387730a0d561fd6d0343a2f5243b0f9985e0c2269957c7468ef89c394b8a0676f11b6f2917032ae43236943db5ac0bda0fc929ff4"}) connect$pptp(r4, &(0x7f0000000a40)={0x18, 0x2, {0x3, @multicast2}}, 0x1e) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r0, 0x4010ae74, &(0x7f0000000a80)={0xd8, 0xfff, 0x1}) getsockopt$inet6_tcp_buf(r3, 0x6, 0x0, &(0x7f0000000ac0)=""/115, &(0x7f0000000b40)=0x73) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000b80), 0x4) ppoll(&(0x7f0000000bc0)=[{r0, 0x20}, {r2, 0x80}, {r4, 0x400}, {r4, 0x151}], 0x4, &(0x7f0000000c00)={0x77359400}, &(0x7f0000000c40)={0x3ff}, 0x8) clone(0x8800000, &(0x7f0000000c80)="4ded8237f95c9ce33a5114e2d0f8f2232adda18603cb3581ca9da2b7e31ce586428417cd41aaf75fce42d82f9fdcee1e6d425fe434a7a75ae15a028888c9147cd362da75a56d7d25e35381fedf2dc31c31f6ab2be38032593e4f02f74b8d66e72b92af5421034202c15861e800f765f98277132ad960a266798ad982a9", &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)="9ff3ab35b904791018df2e5d88cb6b761e89efffdeb941b91812ce7ffe0e9a61ca2c7fd283ad26876a0b561f4c9f0b3348db6c41615c4da383a2fc8ffee3ab2e19bf7977ac508e94ec2cf32e24d668bf5fd4d4a44f7e129bffeff0f241707c0990debac4834875cf34908486142a13864441e2992ccff017d61acab28ddf3c17be4701a6338f32a13445c0f619cf1e0b9941") [ 207.722516] device hsr_slave_0 entered promiscuous mode [ 207.752670] device hsr_slave_1 entered promiscuous mode [ 207.768340] IPVS: ftp: loaded support on port[0] = 21 [ 207.816503] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.823860] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.853974] 8021q: adding VLAN 0 to HW filter on device bond0 [ 207.869519] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.876186] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.883403] device bridge_slave_0 entered promiscuous mode [ 207.892276] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.898599] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.905880] device bridge_slave_1 entered promiscuous mode [ 207.919247] chnl_net:caif_netlink_parms(): no params data found [ 207.952205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 207.960590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 207.970760] 8021q: adding VLAN 0 to HW filter on device team0 [ 207.986806] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 208.001829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 208.009794] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 208.017309] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.023691] bridge0: port 1(bridge_slave_0) entered forwarding state [ 208.040293] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 208.110840] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.117222] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.124276] device bridge_slave_0 entered promiscuous mode [ 208.131866] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.138222] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.145386] device bridge_slave_1 entered promiscuous mode [ 208.160465] team0: Port device team_slave_0 added [ 208.169708] team0: Port device team_slave_1 added [ 208.190060] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 208.197942] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 208.205669] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.212044] bridge0: port 2(bridge_slave_1) entered forwarding state [ 208.247912] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 208.255995] chnl_net:caif_netlink_parms(): no params data found [ 208.291100] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 208.298989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 208.307240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 208.315280] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 208.323492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 208.331399] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 208.340154] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 208.411919] device hsr_slave_0 entered promiscuous mode [ 208.459720] device hsr_slave_1 entered promiscuous mode [ 208.514788] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 208.531212] chnl_net:caif_netlink_parms(): no params data found [ 208.555374] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 208.565334] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 208.583045] team0: Port device team_slave_0 added [ 208.600937] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.607342] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.614991] device bridge_slave_0 entered promiscuous mode [ 208.622938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 208.630870] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 208.638362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 208.646371] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 208.654461] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 208.665537] team0: Port device team_slave_1 added [ 208.677199] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.684238] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.691869] device bridge_slave_1 entered promiscuous mode [ 208.711636] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 208.738454] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 208.801861] device hsr_slave_0 entered promiscuous mode [ 208.849705] device hsr_slave_1 entered promiscuous mode [ 208.906186] team0: Port device team_slave_0 added [ 208.918494] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.926303] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.934267] device bridge_slave_0 entered promiscuous mode [ 208.941760] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.948125] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.955480] device bridge_slave_1 entered promiscuous mode [ 208.970605] team0: Port device team_slave_1 added [ 208.983617] 8021q: adding VLAN 0 to HW filter on device bond0 [ 209.026614] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 209.033342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 209.041294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 209.052397] 8021q: adding VLAN 0 to HW filter on device team0 [ 209.064311] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 209.122160] device hsr_slave_0 entered promiscuous mode [ 209.160706] device hsr_slave_1 entered promiscuous mode [ 209.231826] 8021q: adding VLAN 0 to HW filter on device bond0 [ 209.240252] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 209.254955] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 209.262638] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.268969] bridge0: port 1(bridge_slave_0) entered forwarding state [ 209.275964] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 209.283715] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 209.291377] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.297709] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.304563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 209.312647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 209.320596] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 209.328221] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 209.337429] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 209.368056] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 209.379747] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 209.402454] 8021q: adding VLAN 0 to HW filter on device team0 [ 209.433177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 209.441851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 209.448662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 209.457017] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 209.465841] team0: Port device team_slave_0 added [ 209.475814] team0: Port device team_slave_1 added [ 209.495939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 209.503842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 209.511338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 209.518769] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 209.546134] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 209.558956] 8021q: adding VLAN 0 to HW filter on device bond0 [ 209.566204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 209.574174] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 209.582500] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.588843] bridge0: port 1(bridge_slave_0) entered forwarding state [ 209.653413] device hsr_slave_0 entered promiscuous mode [ 209.689732] device hsr_slave_1 entered promiscuous mode [ 209.738403] 8021q: adding VLAN 0 to HW filter on device bond0 [ 209.754287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 209.762280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 209.771313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 209.778914] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.785318] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.792690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 209.801171] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 209.808836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 209.816624] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 209.824498] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 209.851419] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 209.861411] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 209.874674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 209.882023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 209.888846] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 209.895919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 209.902839] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 209.910713] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 209.918236] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 209.925881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 209.933836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 209.941608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 209.952658] 8021q: adding VLAN 0 to HW filter on device team0 [ 209.961582] 8021q: adding VLAN 0 to HW filter on device team0 [ 209.981104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 209.997537] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 210.008244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 210.020272] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 210.027766] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.034169] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.043351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 210.051324] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 210.058810] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.065201] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.072299] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 210.079825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 210.111113] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 210.126500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 210.134422] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 210.142112] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.148441] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.155305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 210.163182] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 210.170796] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.177128] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.184221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 210.192025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 210.199930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 210.207582] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 13:15:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x200000000, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x80000001f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setlease(r0, 0x400, 0x2) [ 210.267672] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 210.277841] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 13:15:57 executing program 2: r0 = socket$packet(0x11, 0x8000000003, 0x300) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x8de7d8f023d06bd7}, 0x4) socket$packet(0x11, 0x40000000003, 0x300) r2 = socket$inet6(0xa, 0x2, 0x2000000000) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4f, 0x0) sendmmsg(r1, &(0x7f00000092c0), 0x4f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x2, 0x4000) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cachefiles\x00', 0x400, 0x0) r6 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x1, 0x2) r7 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-monitor\x00', 0x4100, 0x0) ioctl$UDMABUF_CREATE_LIST(r4, 0x40087543, &(0x7f0000000240)=ANY=[@ANYBLOB="0100000003000000", @ANYRES32=r5, @ANYBLOB="0000000000000100000000000000000000000100", @ANYRES32=r6, @ANYBLOB="0000000000800001000000000000000000000000", @ANYRES32=r7, @ANYBLOB="0000000000000000010000890040000001000000"]) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r3, &(0x7f0000007fc0), 0x400000000000030, 0x0) [ 210.310134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 210.318211] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 210.349881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 210.358305] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 210.366593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 210.373907] protocol 88fb is buggy, dev hsr_slave_0 [ 210.374004] protocol 88fb is buggy, dev hsr_slave_1 [ 210.385283] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 210.393077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 210.401057] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 210.408681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 210.409569] hrtimer: interrupt took 30854 ns [ 210.423873] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 210.433944] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 210.445672] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 210.455841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 210.467291] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 210.477243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 210.488615] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 210.501191] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 210.531361] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 210.548283] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 210.567662] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 13:15:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@srh, 0x8) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000140)=0x6) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) process_vm_writev(r1, &(0x7f0000001640)=[{&(0x7f0000000440)=""/164, 0xa4}, {&(0x7f0000000500)=""/166, 0xa6}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/1, 0x1}, {&(0x7f0000001600)=""/17, 0x11}], 0x5, &(0x7f00000018c0)=[{&(0x7f00000016c0)=""/108, 0x6c}, {&(0x7f0000001740)=""/208, 0xd0}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000001840)=""/101, 0x65}], 0x4, 0x0) sendmmsg(r0, &(0x7f0000007e00), 0x4000000000000f4, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)) removexattr(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)=@random={'btrfs.', 'loem0bdev-)[-\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@local}}, {{}, 0x0, @in=@dev}}, 0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000280)={{{@in=@local, @in=@multicast2, 0x4e22, 0xfff, 0x4e23, 0x0, 0x2, 0xa0, 0x0, 0x4, 0x0, r2}, {0x0, 0x0, 0xe4d, 0x7fffffff, 0x80, 0x1ff, 0x2}, {0x9cd, 0x8, 0x6, 0x3}, 0x3f, 0x6e6bbd, 0x1, 0x0, 0x3}, {{@in6=@remote, 0x4d2, 0x7f}, 0xa, @in6=@remote, 0x0, 0x2, 0x0, 0x0, 0x80000001, 0x55, 0x80000001}}, 0xe8) ptrace$setregset(0x4205, 0x0, 0x6, 0x0) [ 210.579769] protocol 88fb is buggy, dev hsr_slave_0 [ 210.584989] protocol 88fb is buggy, dev hsr_slave_1 [ 210.619403] protocol 88fb is buggy, dev hsr_slave_0 [ 210.624483] protocol 88fb is buggy, dev hsr_slave_1 [ 210.650771] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 210.674830] 8021q: adding VLAN 0 to HW filter on device batadv0 13:15:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xd, 0x401) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000340)) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="0900940473c6bbc395a77835278b34b07808a3978034fcfaf3208675d6f9fd211efaf1e95889e2c101e97d0614a813ec1a7dca9a97073b73aae5d5af88f354b26d2c0c19db", @ANYRES16=r2, @ANYBLOB="00082abd7000fcdbdf2501000000000000000841000000140018000000097564703a73797a3100000000"], 0x30}, 0x1, 0x0, 0x0, 0x4000850}, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x185002, 0x0) r3 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x1, 0x2) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4200000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0xd07, 0x70bd28, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) clone(0x40000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f00000000c0)={0x4001080123}) sendmsg(r0, 0x0, 0x1) [ 210.699352] protocol 88fb is buggy, dev hsr_slave_0 [ 210.704421] protocol 88fb is buggy, dev hsr_slave_1 [ 210.749724] protocol 88fb is buggy, dev hsr_slave_0 [ 210.755265] protocol 88fb is buggy, dev hsr_slave_1 [ 210.778018] 8021q: adding VLAN 0 to HW filter on device bond0 [ 210.841778] 8021q: adding VLAN 0 to HW filter on device team0 [ 210.866330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 210.878354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 13:15:58 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000040)={0xc9a, 0x8, 0x3, 0x0, 0x0, [{r0, 0x0, 0x10000}, {r0, 0x0, 0xfffffffffffffffa}, {r0, 0x0, 0x1}]}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, &(0x7f0000000000), r2, 0x0, 0x8, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x3) pivot_root(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="24000000050607031dfffd946fa2830020200a0003000100001d85680c1baba20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0xf0}, 0x0) [ 210.916416] IPVS: ftp: loaded support on port[0] = 21 [ 210.924043] vhci_hcd: invalid port number 0 [ 210.944136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 210.956548] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 210.975821] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.982285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.997550] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 211.024814] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 211.043642] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 211.072045] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.078518] bridge0: port 2(bridge_slave_1) entered forwarding state 13:15:58 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, 0x0, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0x100000000000005, &(0x7f0000000080)=0x7, 0x4) socket$inet(0x2, 0xb, 0x5) r2 = memfd_create(&(0x7f00000002c0), 0x0) dup3(r2, r0, 0x0) [ 211.280171] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 211.295268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 13:15:58 executing program 4: r0 = socket$kcm(0x10, 0x4000000003, 0x10) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000040)={'NETMAP\x00'}, &(0x7f0000000080)=0x1e) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="2e0000002b00672de45ae087185082cf0124b0eba06ec44103000000000000140000000000008d0051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:15:58 executing program 3: setxattr$trusted_overlay_nlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'U+', 0x4a}, 0x28, 0x0) r0 = socket(0x800000000000a, 0x8000000002, 0x3) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0x40a85323, &(0x7f0000000040)={{0x6, 0x1000}, 'port0\x00', 0x4, 0x80000, 0x8, 0x1f, 0x4, 0x3ff, 0xf, 0x0, 0x6, 0x80000001}) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000ab2000)=0x1002, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) recvmmsg(r0, &(0x7f000000a100)=[{{&(0x7f0000009f40)=@can, 0x80, 0x0}}], 0x1, 0x2001, 0x0) 13:15:58 executing program 2: r0 = socket$packet(0x11, 0x8000000003, 0x300) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x8de7d8f023d06bd7}, 0x4) socket$packet(0x11, 0x40000000003, 0x300) r2 = socket$inet6(0xa, 0x2, 0x2000000000) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4f, 0x0) sendmmsg(r1, &(0x7f00000092c0), 0x4f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x2, 0x4000) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cachefiles\x00', 0x400, 0x0) r6 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x1, 0x2) r7 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-monitor\x00', 0x4100, 0x0) ioctl$UDMABUF_CREATE_LIST(r4, 0x40087543, &(0x7f0000000240)=ANY=[@ANYBLOB="0100000003000000", @ANYRES32=r5, @ANYBLOB="0000000000000100000000000000000000000100", @ANYRES32=r6, @ANYBLOB="0000000000800001000000000000000000000000", @ANYRES32=r7, @ANYBLOB="0000000000000000010000890040000001000000"]) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r3, &(0x7f0000007fc0), 0x400000000000030, 0x0) [ 211.334945] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 211.372949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 211.416517] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 211.464397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 211.525302] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 13:15:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, r0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001540)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x101000, 0x0) ioctl$TIOCLINUX3(r3, 0x541c, &(0x7f0000000040)) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x200000000000) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) [ 211.575648] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 211.593448] vhci_hcd: invalid port number 0 [ 211.630989] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 211.650439] IPVS: ftp: loaded support on port[0] = 21 13:15:59 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x109000, 0x0) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000140)=0x3) unshare(0x10000000) [ 211.685627] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 211.696908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 211.722898] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 211.753396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 211.810347] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 211.938243] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 212.047857] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 212.268432] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 13:16:00 executing program 5: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="02000000010000000000000002000100", @ANYRES32=r2, @ANYBLOB="02000700", @ANYRES32=r2, @ANYBLOB="02000300", @ANYRES32=r2, @ANYBLOB="02000400", @ANYRES32=r2, @ANYBLOB="02000400", @ANYRES32=r2, @ANYBLOB="0200f2ee3323eca052396ade0700000000", @ANYRES32=r2, @ANYBLOB="02000700", @ANYRES32=r2, @ANYBLOB="040000000000000008000000", @ANYRES32=r1, @ANYBLOB="10000500000000002000010000000000"], 0x64, 0x0) getxattr(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)=@known='system.posix_acl_access\x00', &(0x7f00000001c0)=""/221, 0xdd) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'nlmon0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40800}, 0xc, &(0x7f00000003c0)={&(0x7f00000004c0)=@newqdisc={0xec, 0x24, 0xdc4f1e804fdf3ff1, 0x70bd29, 0x25dfdbfd, {0x0, r3, {0xffff, 0xfff3}, {0xffff, 0xfff3}, {0xd, 0x1}}, [@TCA_RATE={0x8, 0x5, {0xffffffffffff97c8, 0x94}}, @TCA_RATE={0x8, 0x5, {0x4, 0xffffffffffffffff}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x31}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x1000}, @TCA_STAB={0x80, 0x8, [@TCA_STAB_DATA={0x8, 0x2, [0x5]}, @TCA_STAB_DATA={0xc, 0x2, [0x9, 0x0, 0xffffffff, 0x8]}, @TCA_STAB_BASE={0x1c, 0x1, {0xff, 0x3, 0x9, 0xffff, 0x0, 0x4, 0x100000000, 0x6}}, @TCA_STAB_DATA={0x10, 0x2, [0x1, 0xfffffffffffffff9, 0x3, 0xfffffffffffffffc, 0x1f, 0x7]}, @TCA_STAB_DATA={0x4}, @TCA_STAB_BASE={0x1c, 0x1, {0x58, 0x4, 0x0, 0x3f, 0x2, 0x80, 0x3, 0x2}}, @TCA_STAB_BASE={0x1c, 0x1, {0x7, 0x2937, 0x7, 0x6fd3d9eb, 0x2, 0x8, 0x0, 0x8}}]}, @TCA_EGRESS_BLOCK={0x8}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x2}, @TCA_RATE={0x8, 0x5, {0x80, 0x4}}, @TCA_RATE={0x8, 0x5, {0x9, 0xffffffffffff7fff}}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x7f}]}, 0xec}, 0x1, 0x0, 0x0, 0xc0}, 0x40000) 13:16:00 executing program 0: r0 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x4, 0x200) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f0000000280)) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x800, 0x0) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0, 0xfffffffffffffe83}}, 0x10) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x84200, 0x0) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000200)) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYRES32=r2], 0x3}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) ioctl$TIOCMGET(r4, 0x5415, &(0x7f0000000100)) sendmmsg(r3, &(0x7f0000000180), 0x400000000000117, 0x0) 13:16:00 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x4, 0x80040) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f00000002c0)={0x0, 0xffffffff, 0x1e}, &(0x7f0000000300)=0xc) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000340)={r1, 0x20}, 0x8) r2 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(r2, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) setsockopt$ALG_SET_AEAD_AUTHSIZE(r2, 0x117, 0x5, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x200, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r4, 0xc028ae92, &(0x7f0000000240)={0x2, 0x10001}) r5 = fcntl$dupfd(r0, 0x406, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x378) recvmmsg(r3, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000017c0)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000380)={0xffffffffffffffff, 0x2, {0x2, 0x0, 0xdc, 0x0, 0x4}}) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x3, 0x3}, 0x10) 13:16:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001900)="0adc1f123c123f3188b070") r1 = socket(0x2, 0x80805, 0x0) r2 = epoll_create1(0x0) epoll_pwait(r2, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) r3 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x10001, 0x402000) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000080)="9f7ecd596267559949e7e319a1f33ec9d5941b7c135e889d62840a555fe05fb77ffee1b34ad0c409d54dc32c4207cb2823c8b597378901c061ccd721a36d269022b2d03bb87b4137271faae419637882a9b62b758bd104b98b3ac4238ddba26814c759eb8bb65dfdbf0fc0df334b0afb8092b7514987eb078f545c9bcff084f06413e476c6304e4add772be7550a459a4eba8e1ec7470cd691d3c506cb78195f2920308dba32d5e6ccb66af4792e57ac7205cb093795e137401edfdf2bb5a6b8739dc643bdea4e4f87f5fa2a8f3b4ab52d1f7081f83e1d33192f04d3629807c3a5860f7e2b941027b3e2725ec99f1d4e05d531c1ce1febe837c4ec29af933cf3ecb5b8bba7e32b95791dab7c9508305a6670926281af9f0965a9ba3c02ca0fb50ef05a29ea6a60e80deec7cbd80bbd576faf5177a3a3a6a84eea8b5ae3acca0167348084085b3a0ee955316053edc089bbb823cfaee6fac99ce12767348ca0ce3cc8278d7431a019aa07fbacfc40df343214123c0ffc1e9aecb8b3587ca22446e95ad1216a28fdddfcf39bc525573803c72e9e3b24eed7d7b5321e1c0f93cb81190156c62e546d133a638c35236398ec80dcbe4acfad24735222792ef0ba0a6bdd151b23c324ab47482118c1683ce1877772ce989131952240f725b33f7636ee27bd71d420c40c91c6e2f4bfaf5459c2e3daf26a46a9ca5ca73b6390b7583ba7a028634765f8b58f1899bb591b0ba8cbb66ff090c15fe1249bc4de126001cdd4c0480bbc93301ce9dd4e1c7d59511c3f9f5eaa980abcafa856c48ba3d9da82fe8f916b5822d0dd9af1f481b71a6d97b7f99d5383a89fbfb8e76535184516035f0888118537047f44b17ffbc85a7255756258443aebfdce039db55d5b8d5bf85f3314c75d0cd305f4e7afe5f55f47ca470e9ef209ab6ce85faad4153e324ce75ab6976a57b76625fef75f173880881575374476e197330ef94dff871910c6ccacb3dac849012daae4831201ac7afbb58bfd946665aaaf2b3a9ba5bce8b2ed2d469a5be895c9df7b73996bdf7abd841184a9b6dc381c2c9a9d658be8bf38c9b483e31468ac9c1c8f9712122fdcbf0f04adac6c319bdd472ff6aef879e70fc2c41b697db3ae7a10af691a95ee6e4eabb6fbf330ca04fbb0633619e1217e156114c1c5aeddd62c1be4628bc9235543f62988d3c1533a780eb9155fde1e304a5760846db159fb66d43539d593e1cb2176706ad09beb9235d60de5ee6bbcfe9269286365bd812fa44be5dcf2658135674bb2680e848b6a00b27b54df720ac8a22948317b8e23fb65e57ad1b5db35692bf3d6a213d967193db230c2e01ec64bc42056523e5ed1eb12384cb90149ac835af0faffc0c516d7461fc7979c366a7d4e9e419ee6cfb5d18da88d282e366ae23febf0f47538970d84a0b730a6b888ee0e89052a86ff7d0a8d893fd401f1c10b23d0b53460a15e3859c090e2b98c412096ca7ae1c3c790f5bf888e7817c7bae223f0493b8e371545df0f32ef603f492de4849adeb96405eac807422a180da0d1d36f24f89cb718247ff7778c9dee59dbad7e9dcab03708b8322d9dd2ae1a383a3cf32317f35d411a5b48f9d0fdb4a642ccef4a31b2db587fc351c0ea340ae9164fafa8c7c210558bec53f43ca17d085a10e94942fa7addae3bde4d6d496029253639e141cfcf12cc9a249e6236eaf47b7f2f52de2b255f9e1dbdf6e142dce620be1995b9aa8299bde8e13bea6e5ea439df53502d14872223ab4c13ae46822bcac519e54f3dd8d8603d750837fd44759d2e2746a68cdf8f4f74aa9fae90bdf0097624ff3c6ffce1153e9c838dd3890ad1d2f07c690e28eb5f6504a513f4bb38bb1b4b5578762a2d3ba4ebc32a1dd3af6ccf5037e49776cddf245b83cc5b40ba07b1f6094394959c211762a5a8b500cdd89b87f3070c0563b4400f8e8a9ecdca19eab22c4936e2d2e60062234cca280147fd000f8c94a70cbc2b0ab11365eb23f5ee83eb3d627ce053302788d9cb5589ff7764716e75a0e682a7d0b57f05c5d24b5039711d034db455bcf4f3ad4c6891747c96bd4ef328ca78a0cf5e73f618b615f1ef99227916b894752aa2e44dfeda798ae67dfb772cb23e08cdbe2d4fef940b8591bb5eb29ff123d626a0f321504bcef40d4a61de61d33d46b847bd1233ada19004ca5980f3f8cd01a46c80cd5609b429cd763d9b40e7f44d8b5584d6800d65c2ccef3c2f2500317e2d9b41495f3987595cea3b472bfbbbe43114f16187b6ee57c045ac1c2f84517fdc8c2984e32ec990b6208f4211a02aab5737a699760cf1a851bc53a86b3dbd75d0f14816dfed61e36594ef11c6d7916e8fda3a13850a2538463c9dc4aaececcc5df91252af19077a8861a4a16767a85b7251a0e76c275c6f9b5d0e268dc4667a1e5d536e5fa080caee0322540c05e7835ac7a2c885a2ce689faeb1ab354325c199a05c289d5b83053b214bfed1957be63615d6ee37152a2833ae400bcdb89e91fd0960ab584aa4f5ced4b5d98f4e2c012494ea534b758107d54f1930f02e6e62e51b7ea806ae2dd0e3e3f57edf92168af786ae5cb477c7cebf8721c034fed0d58875c3e37ab9ecb812fa03c35249ab7d92dbe2c4742afea03fac28131f8c3930ec681136d625e5169d66d18bac7ef9fc1e8b1ce675eda5ed90f3908c2427dec62ee50b2fa448dfe125bacb7c94caa2c11ae3e6034f9b09ad39dd0a193f017c7d31b9f70ec3f1d976702bd414918911474f2a55520db6cafe83cbf6393e887f0b001b07a1b445c3e462a269138a42057609a9fb2039798a33f6383a0426f20649a7a692cacacd9fce772b4358b8f26e3072ac06474b924906f07983c8de25c5a36e0fe12c77368c8f9aa123e0f2505f6e477d0f257da39bde67ecd7038de50a21f4d1e052e5bff218c5244342fb68ce3ec05811975f1c9f1c69065c0b377308402ddbd4ad362d02ae4cbafe4d7272079d94b6c5b377863e7e7471aca3b57520d11e85fd330f421f0beaa08a89e75dd3f278aa7b44e477b5e9e0f7e7c584797f9d689e5873ef2a167263ce8ed1741874691bb2bb8b3d0a0babd061e9f17cc649d05c5c2c463dd6f4659874253615fae6ad91231a7fc5b24999bb1c480498e308edd478af3981d646811e130e08da6933d742a6b47eaea5ee14a1b54bd45047b8d66752c0db0e9a5defc7e64900dbb8619523e1ba17d4ef05e60b14efed45a4becc2984ffb561530cd167941bea30878038f40ef74e54d4a527eca8c8b1a559ca7ecb9beb6ec5fe6e89e28940e408746864e8969a65f5b32791c676cf7985212968de1c80aff2e221db3eb4052ea1b2593e5603ca0cc26156355c8cc6cc05100404a7f4611dfd1c7b0d522a4a3cf1e176446508d948a9914af55b04d07ab756bfb80df75382f3114899cdd576c6589a03772417fb0cebb7f8d5fa848ec2cf44eefcdfdf96364529c21da5d3253c3a2744dcac3e20a1703b773311c08844c34e2bd216a25af1a4aac8e7008da8f48292df2778f15e242626c3d775afa0322fb82f61bc4dd659c68d8713ce6c31e09ff309d2b94e560f76174896cdd2ff88025735934f1bf07d09ae667611e028807656ec0df67fd70d6b2b51909c5dce5a72af928053fbafab9317b908ca56bb53f4abcfd427c7bc24e74f3164c11c8d67d70fbe0f0b7a61643295829ebc09cf876bf4519c15e464cc413ce81255c17de4536755c84e373042424ff0f0d7806db81c647f4c81b619dec198fbe2fa2a2dd821fb026b16465bbf079ba910199f47cbe3869480111f8eb29e932eb19f29e1ad3a60db3053f9c5323aed654590f9d10135d6e282b3a4920dbd84a7378e5176dab15af86261a97130e4904762d49c4a70a29641a37d92e73e695a94a8dee7532c6e022f48c6d1644e4e3c9927a50380144aa3224b1477d91363d2395775b85eaea6e8c3652fe69493e66b7de00bf2081482e805c6b76a9ab5305248219259e4c1647f44c085a6b858e4b2ad70a3ab66a8c3a686d52708795d51812c5abd162b0c9aac813726e8a2cabf443ff84a0b1d692038a4e2f1c5923654387b8eb3abf7142c2ac07a201599c51f4d0d4fa670abad6bd39f4ad645858516e877dc98a0311312e7e24be76d25dedc2f22dd6c3a0e364c8a5fea01b0ab50732f2c7086e818cdec0cee739d92ce8194c06f6c66a458825f949e31341d0588939022c2d156c5d71239da8a7714c28f2a3892f961d98d68bc289f5e6b3bf11ac12f85a267a41602c6614f4e9ad014da4fb1f3617e54aeabc772795460c1dd4f05471293ab34c64f5939a0022aaaae1e3c26efde2b9af498d5eac46fa4508805ce5e9e8fa09437cb63aebb1c69115b3f60f83949af3a4e665344a6bcb1e4cade7ea789221f44dd9561f2074223fd6140ebd895fac6eff6caffa37f3b857cf819e208db0dca4a9320c156ccf4fee2439be4baae8d6edc2c6d6a1837b7faf72204f170deaaad75ca1e5dfe54f34586f0189dd0f0423354f326bee1bb0a12a3920c2e0e94e3faf9a2e5450b9a6b656315dee5f6cee97a567084c13ea90457015e0fbd7dd2c42de388ace9b55cec68656048d78481fa423f0fe13b91855c4190f28328251b8c238eb1af63be93b5a5c6fbf9b66b3f9e41ae70f9885be2606e2983b36e7d62928b5f01e80ba2a3cc4e26f3173c6a8ca38c7d36fb253bbc53a7bcb86ba2e45d7e30a275a6f3ce4d261816806c9615c0732beb04d962a45139ae514fc49af4a118300267bc69838d6c8d1632191b18cf2f269f582839843d1cbafc11c51224300ab3259d9cb3c209ae221a0fde845fe8e6ffd35e1609c71d835e999873ed2ddb41e7529e91ecaed8bd5db24f07b79ee08155131e8dc4e3d37bfbbfe4429ac92aae585e608dd24018e1f2b56e52516e06deee1763c21eeaee8c30f799691761858195716a9cae82b8c919f1c77d5dcacc7934d991f48089ff3231eeeb77314f611a9a745222c81edc6cc9666fcfb34a0287c632c5fe39c3a9956651166f29e2dcc6875a7b5d0677ce7ff23caa1773ddeac937e4e1617caad4d7ea54ae86a85f2d5efa5254483400c53367694ce2a435ddbe57be0a31ce922cb8620a31429c1bb8271741edcb3bb2f3ec09c32b9f768d551f6ddfae2e2ee3d8ed2d6b6637612eac7b64eceeb262d98668c7691b4eeb02025ba5a7bd73877732aefeaa20dd3c23ef897a379fc2c4c5e38695bad8f86c27768b7b35b9f1d5926b8aa12890ceaf40c0ffc633a97f80cc26f6785dffcf1b2fc4f19e4f285f31517b9e5eeacf505a2c7bd12982382419eadeec6e74927d23c5eef35ec1dfd5b4e53ab3c13cf6b8ed3b747aeefff8eef2d47c45b9220788472291946e8d9a11038428ef105b739edd472efc8169170a09d42e0ff87b2ffc65f7cb561cf8de3d9baf7b2681514c679446a118acbf90cb17d8963d3d4b9d860b2959709d0a3490d9ba5c06c45aed7507c0c1014d086e6ef06148d27f5d03e7aedbbafad5883b76261e1361158c77991dd920e17e6fc7b9d1d1af27142183a2a2eed139f89ae814ee1e2d2d2480d4be32498033fe1b4db141d49e4ac47f17b6f3fd961b747f11026716fe92d7e57e72ec0d40a78ee3f2237562fff9a1d342ace77e6fe79e1f5ce203bee9e1f38a2312f34c3a77163cebdb223b009db96ec953b042137ba5889941eb366d3d8507e880aaff06d646fc53cb848da398651143ad57cebdca8e0c8cbdd1c54f78049d65a15171d1e9f2ce1b6d511c661ba47eadc50ce4261d14e42c") epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f000000eff4)) socket(0xf, 0x80803, 0x3) shutdown(r1, 0x1) close(r2) shutdown(r1, 0xffffffffffffffff) 13:16:01 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x22, 0x1000, 0x2}) 13:16:01 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0}) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x5, &(0x7f0000000140)={r1}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000240)) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f000002b000/0x18000)=nil, 0x0, 0x0, 0x0, &(0x7f0000000280), 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000026000/0x18000)=nil, &(0x7f00000002c0)=[@textreal={0x8, &(0x7f00000001c0)="64650f01d10f21c13e0fc71ee4e564260533092e0f083e3636650f1811650f01cf0f20d86635200000000f22d80f0138baf80c66b8d0ffdb8566efbafc0c66b80900000066ef", 0x46}], 0x1, 0x0, &(0x7f0000000300)=[@cr4={0x1, 0x40220}], 0x1) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) lstat(&(0x7f0000000340)='./file0\x00', 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x100, 0x0) ioctl$sock_proto_private(r6, 0x89e5, &(0x7f0000000580)="1f34ff61bf115b50741a98082b6d470fa9ddbb16b41481d92d4d0e1d6e8527180c2e94c2b2d3a31b640dce6b8964ff5f8d848e2e7fc8d580fe2ad3268e184ae56faab545f0c70f0e657def769f71f21bb67d696fa2e528eb87265bc138b6c48962098e0eb00515cbe21c7faf2b473fb96464054b2c3ba9939a2a4904b39e4887b317fd51d889575bbace39d16cd8f555aba48cb84616a3bcffa671c44cd5eb3c8f96c4c84afbc9c2707e3d68667c3748bcaecf1e6e59a03e8ac472131bacccb60892d9a6f96b6b9c1055b09441c797a982") mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d8343a9ad7e0c3c7ec88572e1f7f6643933680d07a003", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000540), 0x4) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x60040) r7 = socket(0xa, 0x3, 0x0) semget$private(0x0, 0x4, 0x10) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000180)={'bridge0\x00\x00\x00\x02k\x00'}) syz_open_dev$sndctrl(0x0, 0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) fcntl$setflags(r5, 0x2, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x10, 0xffffffffffffffff, 0x0) getsockopt$bt_hci(r8, 0x0, 0x3, &(0x7f0000000480)=""/111, &(0x7f00000000c0)=0x6f) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000080)) 13:16:01 executing program 5: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)=0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x6, 0x0, 0x5, 0x3, 0x0, 0x1, 0x90, 0x0, 0x1, 0xfff, 0x9, 0x7, 0x8, 0x10000, 0x7, 0x2, 0xffff, 0x81, 0x3, 0x1ff, 0x1ff, 0x1, 0x7fff, 0x9, 0x3f, 0x1ff, 0x200, 0x6, 0x9, 0x4, 0xa5, 0x100, 0x1, 0x3f, 0x7f, 0x6, 0x0, 0xfc9, 0x2, @perf_config_ext={0x80000001, 0x1}, 0x20, 0x7, 0x8, 0x9, 0x81, 0xffffffffffff778d, 0xa0b}, r0, 0xa, r1, 0x2) r2 = gettid() r3 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r4 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x0) ftruncate(r4, 0x1000000) sendfile(r3, r4, 0x0, 0xeffffdef) syz_kvm_setup_cpu$x86(r1, r1, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000280)=[@text16={0x10, &(0x7f0000000200)="66b8f1a6dca40f23c80f21f866350400e0000f23f80fc71c26660feeae3400baf80c66b80001358866efbafc0c66b8ce11000066eff0814ee80048f4660fe28db1000fc72b66b9790900000f32f30f2197", 0x51}], 0x1, 0x40, &(0x7f00000002c0), 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000016) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0x0, 0x0}) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='gfs2meta\x00', 0x300000, 0x0) chdir(&(0x7f0000000000)='./file0\x00') sendmmsg(r5, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 13:16:01 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_DBG_G_CHIP_INFO(0xffffffffffffffff, 0xc0c85666, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffff9c, 0x0) r0 = socket$inet(0x10, 0x3, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4000, 0x48) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) 13:16:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x101000, 0x0) close(r0) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = gettid() write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f00000000c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000640)}}, 0x10) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0x9, 0x6, 0x6, 0x6, 0x0, 0x8, 0x0, 0x3, 0x0, 0x3, 0x0, 0x1, 0x0, 0x4c29, 0x100000001, 0x0, 0x7f, 0x7ff, 0x8, 0x0, 0x4d8f4c1a, 0x1, 0x3cad5bf7, 0x3, 0x0, 0x760000000000, 0x3, 0xb00, 0x3afb070c, 0x3, 0xf10, 0x0, 0x4db, 0x32, 0x9, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x10001, 0xfffffffffffffff9}, 0x12884, 0x82b, 0x7, 0x0, 0x0, 0x1, 0x7}, r3, 0x0, 0xffffffffffffffff, 0x8) bind$rxrpc(r2, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) r5 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0xff, 0x800) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r5, 0xc1105517, &(0x7f0000000240)={{0x1, 0x5, 0x0, 0xffffffffffff0001, '\x00', 0x4}, 0x0, 0x123, 0x1, 0x0, 0x0, 0xeb, 'syz0\x00', 0x0, 0x0, [], [0x800, 0x3, 0x0, 0x4]}) io_submit(r4, 0x1, &(0x7f0000000600)=[&(0x7f0000000200)={0x2000000, 0x0, 0x0, 0x8, 0x0, r0, 0x0}]) 13:16:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="600000001e08000002000000b49a3c1ca0c6d4893c73f10c45c1be4d3d572cdbf3565b573401344463e672fae7860846be58a9326a41a4f32327f5075aa26f4bebbb0c0aaef8420559f8dcea39f3bf8496fe0265794a2979662cb847e7a6332bda7773ad38f89c4460"]) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="21b73c25330d00670e430000"], 0xc) r4 = dup3(r1, r1, 0x80100) ioctl$SNDRV_TIMER_IOCTL_STATUS(r4, 0x80605414, &(0x7f0000000200)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f000000a000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) getsockopt$inet_buf(r0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = semget$private(0x0, 0x7, 0x2) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000200)=""/179) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, &(0x7f0000000040), 0x0) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000080)="68bd0000d7ebd3") ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f00000000c0)={{0x0, 0x3, 0x9, 0x0, 0x5}}) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000400)=""/253, &(0x7f0000000100)=0xfd) ioctl$KVM_RUN(r3, 0xae80, 0x0) socket(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000900)="ed5e683e4aff75573525928ec56ee3b5b639cb05d129112eac4216ea3ef2c86e003b8f1048ad68d3b3c6cc15ebb90ded100f2f4adfcd18bb2826e6ecbeb68e7ca2222e58ec1707640af76bdd6870c93188b083e037fe99a1117fcd49f1c0938f56defffac1a42583eabfae96cc32ef4da7c4b95283d08efd30952a16537473cef491214a45062c", 0x87, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x200000000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000002480)={0x13, 0x10, 0xfa00, {&(0x7f0000000580)}}, 0x18) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) prctl$PR_GET_NO_NEW_PRIVS(0x27) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e24, @remote}, 0x10) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) 13:16:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f0000000080)={0x6, 0x0, [{0xc0000009, 0xfff, 0x3, 0xd8, 0x80000001}, {0x0, 0xffffffffffffffe0, 0x8001, 0x80000001, 0x7}, {0x80000000, 0x74, 0x8, 0x3d, 0x7}, {0x4, 0xe0b, 0x4a92, 0x0, 0xbb3}, {0x8000000f, 0x80000000, 0x0, 0x1f, 0x7}, {0x4000000f, 0x9, 0x200, 0x4c3c98d9, 0x400}]}) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) syz_kvm_setup_cpu$x86(r2, r4, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x28, 0x0, 0x0) 13:16:02 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x22, 0x1000, 0x2}) 13:16:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2, 0x200000000000000, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c00d300000000200300000002000900400000000000bc0000000000030006000000000002000000e1000054d81458184fe8b90002000100000000000000080200000000030005000000000002000000e00020010000000000fca0d9"], 0x60}}, 0x0) [ 214.602057] IPVS: length: 253 != 180047384 13:16:02 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x5, 0x240082) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000a40), &(0x7f00000009c0)=0xdc61ea7507da603a) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x400000, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000300)={'eql\x00', 0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getpeername$tipc(r2, &(0x7f0000000000)=@name, &(0x7f0000000080)=0x10) r3 = openat$cgroup_ro(r2, &(0x7f00000000c0)='mem\x00\x01y7SwaS.\x06\x95r\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}) pkey_alloc(0x0, 0x3) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f0000000240)={r5, 0x3}) execveat(r2, &(0x7f0000000440)='./file0\x00', &(0x7f0000000780)=[&(0x7f0000000480)='mem\x00\x01y7SwaS.\x06\x95r\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}, &(0x7f0000000380)=0x8) creat(&(0x7f0000000980)='./file0\x00', 0x21) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000003c0)={0x1f, 0x4, 0x4, 0x8cd, 0x1, 0x100000001, 0xcd9c, 0x52b, r6}, &(0x7f0000000400)=0x20) mprotect(&(0x7f0000063000/0x600000)=nil, 0x600000, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000940)={0xf}, 0xf) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r4, 0x111, 0x5, 0x5, 0x4) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/vhost-vsock\x00', 0x2, 0x0) 13:16:02 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x22, 0x1000, 0x2}) 13:16:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x181041, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x101ff, 0x0, 0xd000, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x7, 0x120013, r1, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000240)=@ipv4_delrule={0x34, 0x21, 0x103, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, [@FRA_SRC={0x8, 0x2, @multicast1}, @FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x34}}, 0x0) 13:16:02 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x22, 0x1000, 0x2}) [ 215.046634] IPVS: length: 253 != 180047384 13:16:02 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x4000000000000, 0x0, 0x0, 0xe38, 0x3ff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x2) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f00000000c0)=""/75) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) 13:16:02 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x1ff, 0x0) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f00000000c0)) pipe2(&(0x7f0000000100), 0x80000) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) r2 = add_key(&(0x7f00000001c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="dc441f8fdc6dc516ecb04352fab830655894bea3eaf0bab32712807157b7814a8ce29ea90f8d2f89ae75a06336100177bc3840885d1b4303a32b984afd7e7a52834677ee8265824ca133c9023879f36bf0115def5120c7ca3f513e96a9f6e46ed160907cfaf9c4bce55acfc81f630b7cb71e97f6aa5814801fedb0b7faddc1b70bfa90f6b1381897d9af39fe5d42750ed788571c9babac34d344042feb1d6942dbc8bf02527c74a255b1df9ea4f42b96", 0xb0, 0xfffffffffffffffb) keyctl$link(0x8, r1, r2) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r4 = dup(r3) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, 0x0) ioctl$KVM_GET_DIRTY_LOG(r7, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 13:16:02 executing program 5: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400000, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f00000002c0)={'filter\x00', 0x0, 0x4, 0x5f, [], 0x2, &(0x7f0000000140)=[{}, {}], &(0x7f0000000240)=""/95}, &(0x7f0000000180)=0x78) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r2) 13:16:02 executing program 0: r0 = socket(0xa, 0x1, 0x0) syncfs(r0) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000000000)={@mcast2}, &(0x7f0000000040)=0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'bridge_slave_0\x00', r2}) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x3, 0x2}]}}}]}, 0x44}}, 0x0) 13:16:02 executing program 1: syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000000)={0x22, 0x1000, 0x2}) 13:16:02 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x199, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, 0x0, 0x0) r2 = openat$audio(0xffffffffffffff9c, 0x0, 0x103080, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)={0x0, @speck128}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) sched_setparam(0x0, &(0x7f0000000100)) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000e80), 0x4) recvmmsg(0xffffffffffffffff, &(0x7f00000021c0)=[{{&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000300)=""/18, 0x12}, {&(0x7f0000000340)=""/197, 0xc5}, {&(0x7f0000000540)=""/151, 0x97}, {&(0x7f0000000440)=""/45, 0x2d}], 0x4, &(0x7f0000000680)=""/76, 0x4c}, 0x10000}, {{&(0x7f0000000700)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000840)=""/247, 0xf7}, {0x0}, {&(0x7f0000000780)=""/8, 0x8}, {&(0x7f0000000bc0)=""/252, 0xfc}, {&(0x7f0000000d40)=""/74, 0x4a}, {&(0x7f0000000b40)=""/46, 0x2e}], 0x6, &(0x7f0000000f40)=""/88, 0x58}, 0xffff}, {{0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000014c0)=""/177, 0xb1}, {&(0x7f0000001640)=""/72, 0x48}, {&(0x7f0000001340)=""/59, 0x3b}, {&(0x7f00000016c0)=""/82, 0x52}, {&(0x7f0000001740)=""/203, 0xcb}, {&(0x7f00000018c0)=""/44, 0x2c}, {&(0x7f0000001900)=""/176, 0xb0}, {&(0x7f00000019c0)=""/113, 0x71}], 0x8}, 0x6}, {{&(0x7f0000001b00)=@ax25={{}, [@default, @rose, @null, @netrom, @rose, @default, @netrom]}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001b80)=""/222, 0xde}, {&(0x7f0000001c80)=""/26, 0x1a}], 0x2, &(0x7f0000001d00)=""/229, 0xe5}, 0xe21c}, {{&(0x7f0000001e00)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f00000020c0)=[{&(0x7f0000001e80)=""/222, 0xde}, {&(0x7f0000001f80)=""/241, 0xf1}, {&(0x7f0000002080)=""/50, 0x32}], 0x3, &(0x7f0000002100)=""/142, 0x8e}, 0x4}], 0x5, 0x40000000, &(0x7f0000002300)={0x0, 0x1c9c380}) timerfd_gettime(r2, &(0x7f0000000040)) r3 = accept$alg(r1, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 13:16:02 executing program 1: syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000000)={0x22, 0x1000, 0x2}) 13:16:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x4, 0x7, [0x800, 0x101, 0x101, 0x5, 0x20, 0x2, 0x20]}, &(0x7f0000000300)=0x16) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)={r2, 0x2}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000001c0)={r3, 0x57}, &(0x7f0000000200)=0x8) io_setup(0xa7, &(0x7f0000000000)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xffff}]}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_submit(r4, 0x12f, &(0x7f00000000c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000001000)}]) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000280)) 13:16:03 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r1, 0x400c4301, &(0x7f00000000c0)={0x0, 0x0, 0x8001}) readv(r1, &(0x7f0000000b40)=[{&(0x7f0000000b00)=""/37, 0x25}], 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xe, 0x8031, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000013) r2 = creat(&(0x7f0000000940)='./file0\x00', 0x20) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000980), &(0x7f00000009c0)=0x4) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2020000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r3, 0x400, 0x70bd25, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x100000001, 0x8001, 0x0, 0x20, 0x0, 0x2, 0x100, 0x4, 0x80000000, 0xa82, 0x800000, 0x44e, 0x3ff, 0x8, 0x1, 0x8000, 0xec, 0x7, 0x6, 0x5, 0x7f, 0x6, 0x2, 0xffffffffffffff8c, 0x10001, 0x1ff, 0xfffffffffffffff9, 0x101, 0x80, 0x7, 0x40, 0x0, 0x1, 0x3, 0x8, 0x1, 0x0, 0x1ff, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x1, 0x5, 0x7fff, 0x5, 0x3, 0x7fffffff, 0x1f}, 0x0, 0xa, 0xffffffffffffffff, 0x8) 13:16:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r1 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r1, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r2, r3/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r4 = shmget(0x0, 0x4000, 0x2, &(0x7f0000ffc000/0x4000)=nil) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000980)={{{@in=@broadcast, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000a80)=0xe8) r6 = getegid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000ac0)={0x0, 0x0}, &(0x7f0000000b00)=0xc) r8 = getegid() r9 = getpgid(0x0) r10 = gettid() shmctl$IPC_SET(r4, 0x1, &(0x7f0000000b40)={{0xfffffffffffffff8, r5, r6, r7, r8, 0x1a, 0x7}, 0x98a7, 0x4, 0x1b8000000, 0x3, r9, r10, 0x2}) r11 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$VIDIOC_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f0000000780)={0x0, @reserved}) ioctl$ifreq_SIOCGIFINDEX_vcan(r11, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r12}) r14 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r14, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) r15 = syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x7000000000000, 0x400) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x2d7a, 0x30, 0xfffffffffffffffc, 0x7ff}, &(0x7f0000000380)=0x18) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r15, 0xc008551a, &(0x7f00000001c0)=ANY=[@ANYBLOB="07000000280000e0ff7ff7363cadc5000100010002000000000200000001000080000000000000000000000000000000"]) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f00000006c0)={0x0, @bt={0x7, 0x8, 0x0, 0x3, 0x40b, 0xffffffff, 0x9, 0x8, 0x5, 0x4, 0x7, 0x8, 0x40, 0x2, 0x14, 0x2}}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r15, 0x84, 0x6f, &(0x7f0000000440)={r16, 0x2c, &(0x7f00000003c0)=[@in6={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0xc97}, @in={0x2, 0x4e21, @loopback}]}, &(0x7f0000000480)=0x10) setsockopt$XDP_UMEM_REG(r14, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000000c0)={r16, 0x9}, 0x8) ioctl$sock_SIOCGPGRP(r14, 0x8904, &(0x7f0000000300)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc1105511, &(0x7f0000000840)={{0x7, 0x3, 0x5, 0x0, 'syz1\x00', 0x6}, 0x0, 0x0, 0x800, r17, 0x3, 0x0, 'syz1\x00', &(0x7f0000000600)=['vcan0\x00', '{\x00', '/dev/vhost-vsock\x00'], 0x19, [], [0x9, 0x9, 0x3, 0x7]}) setsockopt$XDP_UMEM_FILL_RING(r15, 0x11b, 0x5, &(0x7f0000000640)=0x810, 0x0) ioctl$DRM_IOCTL_GET_MAP(r15, 0xc0286404, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x8, 0x0, 0x43, &(0x7f0000ffd000/0x3000)=nil, 0x6}) setsockopt$XDP_UMEM_COMPLETION_RING(r14, 0x11b, 0x6, &(0x7f00000002c0)=0x80, 0x4) connect$l2tp(r15, &(0x7f0000000400)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x4, 0x1, 0x3, 0x3, {0xa, 0x4e24, 0x1, @local, 0x401}}}, 0x32) bind$xdp(r14, &(0x7f0000000100)={0x2c, 0x1, r13, 0x34, r14}, 0x10) 13:16:03 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f00000001c0)={0x0, @empty, 0x4e23, 0x0, 'sed\x00'}, 0x2c) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x101000, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000040)="7bc3a82b02cf4ccc8b4de21c14b45194", 0x10) 13:16:03 executing program 1: syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000000)={0x22, 0x1000, 0x2}) [ 215.543114] IPVS: set_ctl: invalid protocol: 0 0.0.0.0:20003 [ 215.606874] IPVS: set_ctl: invalid protocol: 0 0.0.0.0:20003 13:16:03 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f0000000000)={0x22, 0x1000, 0x2}) 13:16:03 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x1ff, 0x0) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f00000000c0)) pipe2(&(0x7f0000000100), 0x80000) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) r2 = add_key(&(0x7f00000001c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="dc441f8fdc6dc516ecb04352fab830655894bea3eaf0bab32712807157b7814a8ce29ea90f8d2f89ae75a06336100177bc3840885d1b4303a32b984afd7e7a52834677ee8265824ca133c9023879f36bf0115def5120c7ca3f513e96a9f6e46ed160907cfaf9c4bce55acfc81f630b7cb71e97f6aa5814801fedb0b7faddc1b70bfa90f6b1381897d9af39fe5d42750ed788571c9babac34d344042feb1d6942dbc8bf02527c74a255b1df9ea4f42b96", 0xb0, 0xfffffffffffffffb) keyctl$link(0x8, r1, r2) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r4 = dup(r3) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, 0x0) ioctl$KVM_GET_DIRTY_LOG(r7, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 13:16:03 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x4, 0x4000) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000100)={0x1, 0xfffffffffffffffd, 0x10f2}) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) getpeername$netlink(r3, &(0x7f0000000140), &(0x7f0000000080)=0xfffffffffffffc9d) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x54, 0x0, &(0x7f0000000900)=[@acquire, @transaction_sg={0x40046307, {{0x0, 0x40486312, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) 13:16:03 executing program 5: r0 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000003c0)={0xffffffffffffffff}) sendto$inet(r1, &(0x7f0000000000)="af", 0x1, 0x2000c040, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)='/', 0x1}], 0x1}, 0x0) sendmsg$rds(r1, &(0x7f0000001c00)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1}, 0x0) 13:16:03 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f0000000000)={0x22, 0x1000, 0x2}) 13:16:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x10000000, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x11}]]}}}]}, 0x38}}, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) getresuid(&(0x7f0000000080)=0x0, &(0x7f00000000c0), &(0x7f0000000140)) r3 = getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000340)={{{@in=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000480)={'veth0_to_bridge\x00', r4}) write$FUSE_ENTRY(r1, &(0x7f0000000180)={0x90, 0xfffffffffffffffe, 0x7, {0x6, 0x1, 0x9, 0xa9f, 0x0, 0x7, {0x5, 0x6, 0x9, 0x7, 0x2, 0x40000000000000, 0x7fffffff, 0x7, 0x7f, 0x1, 0x7, r2, r3, 0x5, 0x1ffe0000000000}}}, 0x90) [ 216.000820] netlink: 'syz-executor.3': attribute type 17 has an invalid length. [ 216.023030] binder: 7901 invalid dec weak, ref 2 desc 0 s 1 w 0 [ 216.033585] netlink: 'syz-executor.3': attribute type 17 has an invalid length. 13:16:03 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') writev(r0, &(0x7f0000000040)=[{&(0x7f0000000180)='35', 0xfffffec1}], 0x1) ioctl$VIDIOC_G_ENC_INDEX(r0, 0x8818564c, &(0x7f00000001c0)) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f00000000c0)=0x7, 0x4) rt_sigsuspend(&(0x7f0000000000), 0x8) 13:16:03 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f0000000000)={0x22, 0x1000, 0x2}) [ 216.050001] binder: 7901:7906 got reply transaction with no transaction stack [ 216.089897] binder: 7901:7906 transaction failed 29201/-71, size 0-0 line 2801 [ 216.188159] binder: undelivered TRANSACTION_ERROR: 29201 13:16:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f0788b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x4e1d, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xfffffffffffffe46) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f00000002c0)={0x1, 0x4}, 0x8) bind(r0, &(0x7f0000000140)=@sco={0x1f, {0x74e, 0xc5, 0xd94, 0x5e4d4997, 0x2, 0x4}}, 0x80) sendto$inet(r1, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="02600bb9b2139eae430cb71c7b9e3423135fef43323719cb10740bb1e10e2c6cf40cc39eda4845a52a404f8f201baf45c60fb5a3d102a8a991bc4a3bec00000000c7f97d2f8197b92038c83e2300a3c967ca603731913bce45406f0f51c9a2d21022652e99780ac67cc40ad1dff660f7c0ab124d38626b424687406c725896fca8ee46b67561d9512a08cbe1ae977cbfda280baf55327929fb5a200dabc17497ead3b13c5bb741e200000000000000"], 0x1}}, 0x8000) close(r1) 13:16:03 executing program 1: r0 = syz_open_dev$dri(0x0, 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x22, 0x1000, 0x2}) 13:16:03 executing program 0: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x4000000, 0x80400) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0xff, 0x4) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f00000000c0)={0x3, 0x3, 0x9, 0x8001, [], [], [], 0xedb, 0x8, 0x100000000, 0x8000, "283cba00d0b552db72f4d9d2b5a6ac44"}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) tee(r0, r1, 0x1000, 0x4) ioctl$KVM_RUN(r0, 0xae80, 0x0) 13:16:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, &(0x7f00000000c0)=@abs={0x1}, 0x6e) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x1c, &(0x7f0000000000), 0x20395dd4) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x200, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x101800, 0x0) ioctl$sock_SIOCBRADDBR(r3, 0x89a0, &(0x7f0000000080)='syzkaller0\x00') 13:16:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") r1 = socket$inet(0x2, 0x80006, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000004c0)='bridge_slave_0\x00', 0x10) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) connect$unix(r1, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) [ 216.342854] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 13:16:04 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/anycast6\x00') ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000040)={0x81, 0x200, 0x2}) preadv(r1, &(0x7f0000000a00)=[{&(0x7f0000000480)=""/192}, {&(0x7f0000000540)=""/111}, {&(0x7f00000005c0)=""/109}, {&(0x7f0000000640)=""/126}, {&(0x7f00000006c0)=""/155}, {&(0x7f0000000880)=""/138}, {&(0x7f0000000940)=""/133}], 0x100000000000038d, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, 0xffffffffffffffff, 0x0) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x3f}) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[{0xc2, 0x5}, {0x20, 0x2}, {0x10000, 0x5}, {0x1, 0xbeb}]}) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0x8) ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockopt$inet_mreqsrc(r1, 0x0, 0x26, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000100)=r1) 13:16:04 executing program 4: r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000001b80)='io\x00[\xfcW\x16\x9b\xab\xeeT\xed\x16\xe3\x9ez\x8f\xe4\xb9\x00\x16\xf2f\xe3\xf60x0}) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000000c0)={r1, @empty, @rand_addr=0x1}, 0xfffffffffffffc7f) r2 = socket$nl_route(0x10, 0x3, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x81) sendmsg$nl_route(r2, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000080)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0x4}}}]}, 0x38}}, 0x0) 13:16:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x1, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$sock_SIOCOUTQ(r0, 0x5411, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040)=@assoc_value={0x0, 0x3ff}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000000c0)={r3, 0x5}, &(0x7f0000000100)=0x8) 13:16:04 executing program 5: syz_emit_ethernet(0x0, &(0x7f0000000080)=ANY=[], 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x441, 0x0) r1 = gettid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000040)=r1) 13:16:04 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001580)='./file0\x00', &(0x7f0000001540)='cgroup2\x00', 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents(r0, &(0x7f0000000280)=""/4096, 0x82f) inotify_add_watch(0xffffffffffffffff, &(0x7f00000012c0)='./file0\x00', 0x80000009) 13:16:04 executing program 1: r0 = syz_open_dev$dri(0x0, 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x22, 0x1000, 0x2}) 13:16:04 executing program 3: setxattr$security_capability(0x0, &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000180)) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x212400, 0x0) sendto$rxrpc(r0, &(0x7f0000000780)="5c690f791ff74701221783c9c0af458f965814e73aa23f9e84ef013126a01add7ad2e5ad34477ab0b4a1f579ba60faf648df5e1724d12750444ba5bce2bdfb5a19ace7f749831a64d05714ac17672f1dfd22a0d53636ecc779c67034e3b659e27c3c24dbdca8fbdd3a9a", 0x6a, 0x20000000, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(0x0, 0x0, &(0x7f00000001c0)) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x101000, 0x0) r3 = socket$xdp(0x2c, 0x3, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) ioctl$VIDIOC_G_STD(0xffffffffffffffff, 0x80085617, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) ioctl$FS_IOC_GETVERSION(r3, 0x80087601, &(0x7f0000000000)) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) ioctl$int_out(r1, 0x0, 0x0) pwritev(r1, &(0x7f0000000700)=[{&(0x7f0000000600)="7d1d78d5f30c44521952148f023779368b5ee8a37f0894e58a7c63a2d6b4ebd3b01f5d1139e0951d2ba686f950d604728df6e3cfe9ccaf96f535e08efb9df6da0437095ef12b4afb390d671036901fda4825da8f040a345cd1c7684a7ce85f82c8449f8be1964929a43d3e900a8568ef28862ee6a6142aa4d685233752e6bc164187d445bf6f3d9e2915f78c0ae27f2f580218d28f77a6e384db71a935dd3c04b7445ad74aa9f15b06aa1b52286274c6a06c", 0xb2}], 0x1, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r7 = shmget(0x0, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmctl$SHM_STAT(r7, 0xd, 0x0) r8 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x10800, 0x0) sched_getscheduler(r4) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r6, 0x40045532, &(0x7f00000002c0)=0xfffffffffffffffe) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x802, 0x0) ioctl$EVIOCGBITSW(r8, 0x80404525, &(0x7f0000000240)=""/114) unshare(0x40000000) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) ioctl$VIDIOC_G_FBUF(r8, 0x8030560a, &(0x7f0000000040)={0x10, 0x40, 0x0, {0x4, 0x81, 0x0, 0x5, 0x1, 0x100000001, 0x9, 0x3ff}}) ioctl$VIDIOC_G_STD(r5, 0x80085617, &(0x7f00000004c0)) 13:16:04 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000480)='/dev/dmmidi#\x00', 0x2, 0x0) getsockopt(r0, 0x0, 0xb, 0x0, &(0x7f0000000740)) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) getsockname$unix(r0, &(0x7f00000001c0), &(0x7f0000000040)=0x6e) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001f80)=[{{&(0x7f0000000080)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)=""/95, 0x5f}, {&(0x7f0000000400)=""/55, 0x37}], 0x2, &(0x7f0000000540)=""/221, 0xdd}, 0x4}, {{0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000640)=""/199, 0xc7}, {&(0x7f0000000800)=""/80, 0x50}, {&(0x7f00000004c0)=""/5, 0x5}, {&(0x7f0000000bc0)=""/226, 0xe2}], 0x4, &(0x7f0000000900)=""/52, 0x34}, 0x7f}, {{0x0, 0x0, &(0x7f0000000d80), 0x0, &(0x7f0000000dc0)=""/80, 0x50}, 0x9}, {{&(0x7f0000001940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0, 0x0, &(0x7f0000001e80)=""/250, 0xfa}}], 0x4, 0x0, &(0x7f0000002140)={0x0, 0x989680}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000340), &(0x7f0000000500)=0x4) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000300)=0x0) perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x1f, 0x101, 0x7a, 0x3, 0x0, 0x8, 0x8, 0x9, 0x1, 0x7, 0x2c, 0x51, 0x6e6, 0x4, 0xfff, 0x0, 0x1, 0x8, 0x0, 0x6, 0x7cd80000, 0x6, 0x5, 0x691, 0x1ff, 0xe7, 0x10000000, 0x7, 0x6, 0x1, 0xb29, 0x4, 0x0, 0x978d, 0x6, 0x5, 0x0, 0x3d6, 0x4, @perf_bp={&(0x7f0000000240), 0x8}, 0x2, 0x8, 0x5, 0x5, 0x672, 0xfff, 0xfffffffffffffffa}, r3, 0x5, r0, 0x0) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f00000007c0)={0x1001, &(0x7f0000000780), 0x2, r0, 0x3}) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x359, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0xc, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) 13:16:04 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/anycast6\x00') ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000040)={0x81, 0x200, 0x2}) preadv(r1, &(0x7f0000000a00)=[{&(0x7f0000000480)=""/192}, {&(0x7f0000000540)=""/111}, {&(0x7f00000005c0)=""/109}, {&(0x7f0000000640)=""/126}, {&(0x7f00000006c0)=""/155}, {&(0x7f0000000880)=""/138}, {&(0x7f0000000940)=""/133}], 0x100000000000038d, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, 0xffffffffffffffff, 0x0) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x3f}) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[{0xc2, 0x5}, {0x20, 0x2}, {0x10000, 0x5}, {0x1, 0xbeb}]}) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0x8) ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockopt$inet_mreqsrc(r1, 0x0, 0x26, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000100)=r1) 13:16:04 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x22, 0x1000, 0x2}) 13:16:04 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3, 0x4000) write$selinux_attr(r0, &(0x7f00000000c0)='system_u:object_r:insmod_exec_t:s0\x00', 0x23) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = socket$inet6(0xa, 0x3, 0xbb) recvmmsg(r2, &(0x7f0000000200), 0x400000000000190, 0x40000020, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) fremovexattr(r1, &(0x7f0000000100)=@known='trusted.overlay.redirect\x00') sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 13:16:04 executing program 4: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget(0x1, 0x5) msgctl$MSG_INFO(r0, 0xc, &(0x7f00000000c0)=""/24) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_IO(r2, 0x2285, &(0x7f00000003c0)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x200000, 0x0}, &(0x7f0000000580)="5f39203a1ec6", 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x800, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r3, 0xc0205649, &(0x7f0000000300)={0x0, 0x1, 0x3, [], 0x0}) r4 = getpid() rt_tgsigqueueinfo(r4, r4, 0x16, &(0x7f0000000100)={0x0, 0x0, 0x500}) setfsuid(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, 0x0, 0x0) fstat(r2, 0x0) ptrace(0x4206, r4) ptrace$getenv(0x4201, r4, 0x0, &(0x7f0000000080)) ptrace(0x8, r4) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, 0x0) write$binfmt_misc(r1, &(0x7f0000000180)={'syz0', "d0a2eeafbb6717f8e6add5a4ce4e331eac52a7e4b825eadd92c73225c5aa2b07fd210388d852a8533f6741b247d438e2801aff1af105a40522b2cfc6787dafcaba4b6a1ebee56b60c1db5faaa44f45419e7bfb282715f074931c0b85334e448ef0c95208a41661a3afdd9c119aab4f1e78d59f8fdaa2a34d96e4d1dace399fa7483b2b977f98631db6c4892b720c707f6ca57577746828fd329e99221f4084eea374a4cf35ebc54c479c4c"}, 0xaf) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) 13:16:04 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x22, 0x1000, 0x2}) [ 217.382984] IPVS: ftp: loaded support on port[0] = 21 13:16:05 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x80) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x40000, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000300)={0xdc, &(0x7f0000000200)=""/220}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in=@local, @in6=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) ioctl(r2, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'veth1_to_team\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000440), 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=@delneigh={0x28, 0x1d, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@NDA_LLADDR={0xa}]}, 0x28}}, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, 0x0, &(0x7f00000001c0)) syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x9, 0x440000) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6(0xa, 0x1000000000002, 0x0) connect$netlink(r4, 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) sendmsg$nl_xfrm(r4, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}, @in, {}, {}, {}, 0x0, 0x0, 0xa}, 0x0, 0xfff}}, 0xf8}}, 0x0) 13:16:05 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x22, 0x1000, 0x2}) 13:16:05 executing program 1: syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r0 = dup(0xffffffffffffffff) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f0000000000)={0x22, 0x1000, 0x2}) 13:16:05 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) r2 = socket(0x10, 0x3, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000600)=""/4096, 0x1000) rt_sigtimedwait(&(0x7f0000000340), 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r4 = getpid() ioctl$RTC_WKALM_RD(r3, 0x80287010, &(0x7f0000000040)) rt_tgsigqueueinfo(0x0, r4, 0x16, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000240)={0x4, 0x0, 0x3, 0x6, 0xfffffffffffffffe, 0x8}) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ptrace(0x10, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) r5 = request_key(&(0x7f00000000c0)='rxrpc_s\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)='/dev/rtc0\x00', 0xfffffffffffffff9) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000001c0)={r5, 0x9, 0xffffffff}, &(0x7f0000001600)=ANY=[@ANYBLOB="656e633d706b6373be7b933120686161e1047a6861332d3338342d67656e6572696300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000061532c78fdb4f7f41c4e0dc5bc77f24642cca249da4aec364e2cea328cbfdf025fb7e230452921fe1d0526f2ae8a8f822a9610750c35deed14e3e08b8d34712ac6dfec2de8fe3959854cf5083821d4e1fdccab495e7c0dc94d7fdd10a6ce82f52d5833fbf2553080dc68b1c9e1c1c3ba2cc06b90025350d363b6"], &(0x7f0000000480)="02a052b1536bb62a0bcbf32e805a92ac12a36becbf7ef9a9dd776cb9481732f901c5cc8d6bbc814d1d75f7450c733cbe89b542de4eea9fc910cf8e3a9a25546f7d6dffa47c8ba520dd9e89033289002f", &(0x7f0000000500)=""/228) ioctl$DRM_IOCTL_GET_CTX(r3, 0xc0086423, &(0x7f00000002c0)) fcntl$getflags(r3, 0x0) set_thread_area(&(0x7f0000002640)={0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x9}) ptrace$pokeuser(0x6, 0x0, 0x388, 0xffffffffffffffff) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) ioctl$sock_ifreq(r2, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x2000004, &(0x7f0000000000)={'syzkaller1\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r2, 0x0, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000280)=0x291d, 0x4) 13:16:05 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x80) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x40000, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000300)={0xdc, &(0x7f0000000200)=""/220}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in=@local, @in6=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) ioctl(r2, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'veth1_to_team\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000440), 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=@delneigh={0x28, 0x1d, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@NDA_LLADDR={0xa}]}, 0x28}}, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, 0x0, &(0x7f00000001c0)) syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x9, 0x440000) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6(0xa, 0x1000000000002, 0x0) connect$netlink(r4, 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) sendmsg$nl_xfrm(r4, &(0x7f00000007c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}, @in, {}, {}, {}, 0x0, 0x0, 0xa}, 0x0, 0xfff}}, 0xf8}}, 0x0) [ 217.951310] IPVS: ftp: loaded support on port[0] = 21 13:16:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r1, 0x0, 0x9, 0x3672, 0x3f}) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0xc011, r2, 0x0) 13:16:07 executing program 1: syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r0 = dup(0xffffffffffffffff) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f0000000000)={0x22, 0x1000, 0x2}) 13:16:07 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000480)='/dev/dmmidi#\x00', 0x2, 0x0) getsockopt(r0, 0x0, 0xb, 0x0, &(0x7f0000000740)) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) getsockname$unix(r0, &(0x7f00000001c0), &(0x7f0000000040)=0x6e) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001f80)=[{{&(0x7f0000000080)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)=""/95, 0x5f}, {&(0x7f0000000400)=""/55, 0x37}], 0x2, &(0x7f0000000540)=""/221, 0xdd}, 0x4}, {{0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000640)=""/199, 0xc7}, {&(0x7f0000000800)=""/80, 0x50}, {&(0x7f00000004c0)=""/5, 0x5}, {&(0x7f0000000bc0)=""/226, 0xe2}], 0x4, &(0x7f0000000900)=""/52, 0x34}, 0x7f}, {{0x0, 0x0, &(0x7f0000000d80), 0x0, &(0x7f0000000dc0)=""/80, 0x50}, 0x9}, {{&(0x7f0000001940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0, 0x0, &(0x7f0000001e80)=""/250, 0xfa}}], 0x4, 0x0, &(0x7f0000002140)={0x0, 0x989680}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000340), &(0x7f0000000500)=0x4) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000300)=0x0) perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x1f, 0x101, 0x7a, 0x3, 0x0, 0x8, 0x8, 0x9, 0x1, 0x7, 0x2c, 0x51, 0x6e6, 0x4, 0xfff, 0x0, 0x1, 0x8, 0x0, 0x6, 0x7cd80000, 0x6, 0x5, 0x691, 0x1ff, 0xe7, 0x10000000, 0x7, 0x6, 0x1, 0xb29, 0x4, 0x0, 0x978d, 0x6, 0x5, 0x0, 0x3d6, 0x4, @perf_bp={&(0x7f0000000240), 0x8}, 0x2, 0x8, 0x5, 0x5, 0x672, 0xfff, 0xfffffffffffffffa}, r3, 0x5, r0, 0x0) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f00000007c0)={0x1001, &(0x7f0000000780), 0x2, r0, 0x3}) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x359, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0xc, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) 13:16:07 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) r2 = socket(0x10, 0x3, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x18e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000600)=""/4096, 0x1000) rt_sigtimedwait(&(0x7f0000000340), 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r4 = getpid() ioctl$RTC_WKALM_RD(r3, 0x80287010, &(0x7f0000000040)) rt_tgsigqueueinfo(0x0, r4, 0x16, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000240)={0x4, 0x0, 0x3, 0x6, 0xfffffffffffffffe, 0x8}) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ptrace(0x10, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) r5 = request_key(&(0x7f00000000c0)='rxrpc_s\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)='/dev/rtc0\x00', 0xfffffffffffffff9) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000001c0)={r5, 0x9, 0xffffffff}, &(0x7f0000001600)=ANY=[@ANYBLOB="656e633d706b6373be7b933120686161e1047a6861332d3338342d67656e6572696300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000061532c78fdb4f7f41c4e0dc5bc77f24642cca249da4aec364e2cea328cbfdf025fb7e230452921fe1d0526f2ae8a8f822a9610750c35deed14e3e08b8d34712ac6dfec2de8fe3959854cf5083821d4e1fdccab495e7c0dc94d7fdd10a6ce82f52d5833fbf2553080dc68b1c9e1c1c3ba2cc06b90025350d363b6"], &(0x7f0000000480)="02a052b1536bb62a0bcbf32e805a92ac12a36becbf7ef9a9dd776cb9481732f901c5cc8d6bbc814d1d75f7450c733cbe89b542de4eea9fc910cf8e3a9a25546f7d6dffa47c8ba520dd9e89033289002f", &(0x7f0000000500)=""/228) ioctl$DRM_IOCTL_GET_CTX(r3, 0xc0086423, &(0x7f00000002c0)) fcntl$getflags(r3, 0x0) set_thread_area(&(0x7f0000002640)={0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x9}) ptrace$pokeuser(0x6, 0x0, 0x388, 0xffffffffffffffff) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) ioctl$sock_ifreq(r2, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x2000004, &(0x7f0000000000)={'syzkaller1\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r2, 0x0, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000280)=0x291d, 0x4) 13:16:07 executing program 4: socketpair$unix(0x1, 0x6, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x4000, 0x0) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_EDID(r1, 0xc0285629, &(0x7f00000001c0)={0x0, 0x0, 0x7, [], &(0x7f0000000140)=0x9}) migrate_pages(0x0, 0x0, 0x0, &(0x7f00000007c0)=0x8000) socket$inet_tcp(0x2, 0x1, 0x0) ioprio_set$pid(0x6, 0x0, 0x3) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$IMGETVERSION(r1, 0x80044942, &(0x7f0000000380)) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)={0x48, r5, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_TYPE={0x8}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f0000002880)) kcmp(0x0, 0x0, 0x6, 0xffffffffffffffff, r1) clock_gettime(0x0, &(0x7f0000002600)={0x0, 0x0}) recvmmsg(r2, &(0x7f0000002480)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/161, 0xa1, 0x4ae}, 0x101}, {{0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000500)=""/232, 0xe8, 0x7}, 0x8}, {{&(0x7f0000000700)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000840)=""/137, 0x89}, {&(0x7f0000000900)=""/56, 0x38}, {&(0x7f0000000940)=""/42, 0x2a}, {&(0x7f0000000c00)=""/248, 0xf8}], 0x4, &(0x7f0000000a40)=""/37, 0x25, 0x8001}, 0x9}, {{0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000dc0)=""/49, 0x31}, {&(0x7f0000000e00)=""/216, 0xd8}, {&(0x7f0000000f00)=""/117, 0x75}, {0x0}], 0x4}}, {{&(0x7f0000001080)=@nfc, 0x80, &(0x7f0000002400)=[{0x0}, {&(0x7f0000001140)=""/67, 0x43}, {0x0}, {0x0}, {&(0x7f0000001340)=""/12, 0xc}, {&(0x7f0000001380)=""/77, 0x4d}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x7, 0x0, 0x0, 0xff}}], 0x5, 0x41, &(0x7f0000002640)={r6, r7+30000000}) r8 = dup2(r4, r2) listen(r2, 0xffffffffffffff20) ioctl$FITRIM(r8, 0xc0185879, &(0x7f0000000000)={0x2, 0x7f, 0x1000}) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, 0x0) sendmsg$netlink(r8, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[@rights={0x20, 0x1, 0x1, [r8, r2, r3]}], 0x20}, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x100, 0x0) recvmmsg(r3, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0xb, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 13:16:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f00000002c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f00000000c0), 0x0, 0x0) r1 = accept$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000000000)) write$binfmt_elf32(r1, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x20, 0x2, 0xc9, 0x8, 0x3, 0x3, 0x5, 0x2a0, 0x38, 0x321, 0x5, 0x5, 0x20, 0x2, 0xffffffffffffff22, 0x40, 0x8}, [{0x70000000, 0x8001, 0x580b6eed, 0x0, 0xfffffffffffffffb, 0x1, 0x100000001, 0x4}, {0x6474e557, 0x5, 0x7ff, 0x0, 0x80000000, 0x8, 0x0, 0x2}], "80014ea65db5f939c64ec173214bd79c31b5f8ec734659ccdcb8abc7fbbf415390b51cf76d5c52788351213966ed59792886911bf4b3ae7025e64c5de3bd852ec8c3a86204ce0316e5b8f90a5d604ef701bf354d213424e7bfba3d1dadc81c01fea2557e1aeb6d098a7212af8ac3f96cd87597cf04128f3d60596f88665f17ce9e11e33cf29e8468f56c307dfb0375fa6b9b09e7976063b0ac267c6be4067f49"}, 0x118) 13:16:07 executing program 1: syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r0 = dup(0xffffffffffffffff) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f0000000000)={0x22, 0x1000, 0x2}) 13:16:07 executing program 2: r0 = shmget(0x0, 0x4000, 0x800, &(0x7f0000ff9000/0x4000)=nil) shmctl$IPC_INFO(r0, 0x3, 0xfffffffffffffffe) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x200000, 0x0) r1 = memfd_create(&(0x7f0000000180)='dev\x00\xcbh\x80\x87\x1d\xf6\xbe\x8f^K;\xf0z|x}\xdb\xc7\xc2\x1c(\x05\x91\x1f\v\x87(\xe8vB\x87\xb7U\rhI\xb3p\xc2\xd8\x809\xbe\xed\xeak\xdb\x96%zx\xed2m\xe7\xdbK\x93\xc7\x96BL\xe9\xeb\xb5F\xc7\x85\x9c\xba\xfc;#\xa7\x18\xa1\n\xd3\x9e\xd9\xbfO\xff\x00\xc8=\xb9A\xd6\x8d\xf6\xca\x80\r\xe9\x01\x88H\xa9\xf4\x05\x00\x00\x9b\xa0\xb7\x1e\x1bp\xe1 \xaf\xae\xb7\xade;\xab\x19:TU\xf9\xe8W\xf9\xc0|\xc6\x03\x05$\xe2w\xbc.\x17\x03\x91\xaf\xca\xe9\x95\x82\x7f\x03|\xe4\x0fhT\x9a\a\x92o\x98\'\x84\xedP\x98\xbf@zo\xb1f\x9d\xef\f\xc3\x8d\xc9\x9d\xe6M^\xf2\xbe\x92\xfa+q\xd8\x1f\xf10#\xc3\xf6\xdf\xf0\'Fl@\x00\x00\x00\xbdI\xd6\xd0\xa4w^c\xde\xe1\nx\xb9&\x12\xf4\v1\xd6R+\xca\x9e\x9e5\xdf\x81U\xd5pT\xdaK?\xc2o\xceW\xf5iK\x03\x9f\x9c\x9fh\xe1]~\xab\x05\xb5\xa7T\x9cQ\x1a\x84\xbb\xbe\xec\xb2&D\x81\x81\x8f\xbe\x1eG 4i\x81\xb6\xbb\x1d\x9d0xffffffffffffffff}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000080)=0x4000, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x3) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'lo\x00\xec\bV/\xe8\xb0+CN\x00', 0x0}) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000100)=0x1) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0xffffffffffffff31, &(0x7f00000001c0)={&(0x7f0000000500)=@newlink={0x40, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_IFNAME={0x14, 0x3, 'ip6_vti0\x00'}, @IFLA_ADDRESS={0xc, 0x1, @dev}]}, 0xe98b}}, 0x0) 13:16:07 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000000)={0x22, 0x1000, 0x2}) 13:16:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000240)="ba4300b00bee0f017edaf02114650f1ea7f07f0f20e06635040000000f22e03e0fc72dbaf80c66b80fb2578d66efbafc0cb001ee0fc75ba2f40f3805800060", 0x3f}], 0x1, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in, @in6=@local}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1c00486}, 0xc, 0x0}, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f00000000c0)) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r3, &(0x7f00000003c0)}, 0x10) rt_sigsuspend(&(0x7f0000000040)={0x8000}, 0x8) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x1}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x2000, 0x0) 13:16:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="5e8ef9d7e5221adb02e0c0255cdc9052", 0x10) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e21, @broadcast}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x16}}, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x201, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000140)='team_slave_1\x00', 0x0, 0x1ff, 0x4}) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f00000000c0)={0x3, r3}) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000200)={{0x1000, 0x100000, 0x0, 0x4, 0x400, 0x0, 0x30e, 0x6, 0x1, 0x3}, {0x0, 0x6000, 0x1f, 0x4a455c0f, 0x43, 0x8, 0xffffffffffff73ed, 0x4, 0x3, 0x7, 0x4, 0x1}, {0x4000, 0x4000, 0x0, 0x5, 0x4, 0x7f7f, 0x3f, 0x8a3d, 0x4e, 0x8, 0x0, 0x101}, {0x100000, 0x2, 0xf, 0x1, 0x3, 0x101, 0x10001, 0x0, 0x100000001, 0x4, 0x200, 0x80000000000}, {0x3000, 0x3000, 0xe, 0x1, 0x2, 0xff, 0x257, 0x9, 0x8, 0x9, 0x2, 0x401}, {0x13000, 0x5000, 0xf, 0xffffffffffffff81, 0x2, 0x6, 0x1f, 0x5b4, 0x3, 0x40, 0x6, 0x40}, {0x0, 0x4000, 0xd, 0x6f, 0x100000000, 0x3, 0x9, 0x3, 0x2, 0xffffffff, 0xfff, 0x7}, {0x105003, 0x2004, 0xf, 0x7, 0x8, 0x2, 0x100000001, 0x4, 0x4, 0x9, 0x10001, 0x3}, {0xd000}, {0x2, 0x10001}, 0x1, 0x0, 0x6000, 0x40040, 0x0, 0x8c00, 0x1, [0x6, 0x4b4, 0x9, 0x5]}) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) socket$inet6(0xa, 0x0, 0x7ff) close(r0) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 220.270638] net_ratelimit: 20 callbacks suppressed [ 220.270650] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 220.303295] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 220.340860] protocol 88fb is buggy, dev hsr_slave_0 [ 220.346877] protocol 88fb is buggy, dev hsr_slave_1 13:16:08 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000000180)=ANY=[@ANYBLOB="9fc2e091aa6807b1f3acdf3cf8262bcda0fe7e203ce3e2c94fc8441e598aa8e17e92e370ffc5516322b0235c394150923dc29a84d059a21f362a355dfb12017b1c0d739598d672d1d13c14af441b536c1dbb03b7a09b46fe9672bd750b31faa18dc169820879c2b34110352d194d46c91c76d014bfceddd8700f09f3e686d1521474fc0915"]) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080), 0x0, 0x0, 0x0) ioctl$KVM_NMI(r0, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/sockcreate\x00') write$P9_RUNLINKAT(r1, &(0x7f0000000080)={0x7, 0x4d, 0x1}, 0x7) stat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_VERIFY(0x1c, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 13:16:08 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000000)={0x22, 0x1000, 0x2}) 13:16:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r1, &(0x7f0000000100)) finit_module(r1, &(0x7f0000000040)='bdevlovboxnet1]eth1\x00', 0x2) 13:16:08 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000001140)='/dev/ion\x00', 0x802, 0x0) syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x2, 0x2) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000100)={0x80033d, 0x20000000209, 0x0, 0xffffffffffffffff}) signalfd4(r0, &(0x7f0000000080)={0x8001}, 0x8, 0x0) r3 = dup2(r1, r2) ioctl$ION_IOC_ALLOC(r3, 0x5451, &(0x7f0000000000)={0x9cf0000008, 0x9}) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140), 0x13f, 0x100b}}, 0x20) syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) r4 = socket(0x11, 0x802, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x77, 0x0) r5 = socket(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x3, 0x1}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f00000002c0)={r6, 0x101}, &(0x7f0000000300)=0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) socket$bt_cmtp(0x1f, 0x3, 0x5) socket$inet(0x10, 0x100000008000f, 0x80000001) io_cancel(0x0, 0x0, &(0x7f0000000100)) 13:16:08 executing program 4: socketpair$unix(0x1, 0x6, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x4000, 0x0) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_EDID(r1, 0xc0285629, &(0x7f00000001c0)={0x0, 0x0, 0x7, [], &(0x7f0000000140)=0x9}) migrate_pages(0x0, 0x0, 0x0, &(0x7f00000007c0)=0x8000) socket$inet_tcp(0x2, 0x1, 0x0) ioprio_set$pid(0x6, 0x0, 0x3) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$IMGETVERSION(r1, 0x80044942, &(0x7f0000000380)) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)={0x48, r5, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_TYPE={0x8}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f0000002880)) kcmp(0x0, 0x0, 0x6, 0xffffffffffffffff, r1) clock_gettime(0x0, &(0x7f0000002600)={0x0, 0x0}) recvmmsg(r2, &(0x7f0000002480)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/161, 0xa1, 0x4ae}, 0x101}, {{0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000500)=""/232, 0xe8, 0x7}, 0x8}, {{&(0x7f0000000700)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000840)=""/137, 0x89}, {&(0x7f0000000900)=""/56, 0x38}, {&(0x7f0000000940)=""/42, 0x2a}, {&(0x7f0000000c00)=""/248, 0xf8}], 0x4, &(0x7f0000000a40)=""/37, 0x25, 0x8001}, 0x9}, {{0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000dc0)=""/49, 0x31}, {&(0x7f0000000e00)=""/216, 0xd8}, {&(0x7f0000000f00)=""/117, 0x75}, {0x0}], 0x4}}, {{&(0x7f0000001080)=@nfc, 0x80, &(0x7f0000002400)=[{0x0}, {&(0x7f0000001140)=""/67, 0x43}, {0x0}, {0x0}, {&(0x7f0000001340)=""/12, 0xc}, {&(0x7f0000001380)=""/77, 0x4d}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x7, 0x0, 0x0, 0xff}}], 0x5, 0x41, &(0x7f0000002640)={r6, r7+30000000}) r8 = dup2(r4, r2) listen(r2, 0xffffffffffffff20) ioctl$FITRIM(r8, 0xc0185879, &(0x7f0000000000)={0x2, 0x7f, 0x1000}) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, 0x0) sendmsg$netlink(r8, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[@rights={0x20, 0x1, 0x1, [r8, r2, r3]}], 0x20}, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x100, 0x0) recvmmsg(r3, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0xb, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 13:16:08 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000000)={0x22, 0x1000, 0x2}) 13:16:08 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x101200, 0x0) select(0x40, &(0x7f00000001c0)={0xffffffffffffff8a, 0x80000000, 0xfffffffffffffffa, 0xb3, 0x4, 0xf16, 0x4, 0x7f}, &(0x7f0000000200)={0x9, 0x5, 0x100, 0x7fff, 0x64f, 0xfffffffffffffff8, 0x9, 0x6}, &(0x7f0000000280)={0x9, 0x1, 0x5a, 0x3, 0x0, 0x1ff, 0x4, 0x3}, &(0x7f00000002c0)={0x77359400}) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000080)=0x100, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="10ffc5fe4c0b0cafaa0000000000080000800000", @ANYRES32=0x0, @ANYBLOB="2100000000000000f55d6db60c00010072008001000000b90c00020008000a0000000000917d48bb7047f1c27dddca73277ad4aa2f88f5cf68fe4cd3dca155e5e496829f4e38f25fc38ce796666390c200feffffffffffff0000"], 0x3c}}, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x2, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000340)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x4000, 0x1}) accept4$inet(r0, &(0x7f0000000140)={0x2, 0x0, @broadcast}, &(0x7f0000000240)=0x10, 0x2000000080800) 13:16:08 executing program 3: r0 = gettid() tkill(r0, 0xe) tkill(r0, 0x400000000414) 13:16:08 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, 0x0) 13:16:08 executing program 5: syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x20011, r0, 0x0) dup(r0) preadv(r0, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/183, 0xb7}, {&(0x7f0000000180)=""/4096, 0x1000}], 0x2, 0x0) 13:16:08 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x200, 0x4000) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000100)) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x6, 0x20000) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f00000002c0)={0x6, 0x0, [{0x8, 0x1, 0x0, 0x0, @adapter={0x80, 0x7f, 0x80, 0x9, 0x3}}, {0x100000001, 0x2, 0x0, 0x0, @msi={0xb7e, 0x9, 0x4}}, {0x6, 0x7, 0x0, 0x0, @sint={0x0, 0x9}}, {0x4, 0x7, 0x0, 0x0, @msi={0x1, 0x1, 0x4}}, {0x90, 0x3, 0x0, 0x0, @irqchip={0x8000, 0x8}}, {0x3, 0x7, 0x0, 0x0, @irqchip={0x3ff, 0x5f}}]}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0xe0a3acd6abcce1d5, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x211f1e36, 0xb0100) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000200)=""/148) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000180)={0x3, 0x67, "bae8288f9cb116022a9a0629fc9a598d4c86bf9c9933ff46bc71ba16f41fb960ed1736d14dba646ee5ecb1a78990327a09a3edcc2ab6d94038b024ba6d941b271a512481bb1053acac363674bf97ff3afbb6697b6011e990a84ea6305ad87f84f1f0a0ce336b28"}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x1, 0x81, 0xffffffffffffffff, 0x1, 0x0, 0xdf, 0x2}, 0x1c) 13:16:08 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000280)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x4000, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)=ANY=[], &(0x7f00000002c0)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) fsetxattr$security_ima(r0, &(0x7f00000001c0)='security.ima\x00', &(0x7f0000000200)=@v1={0x2, "b45f"}, 0x3, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x2) r2 = socket(0x10, 0x20000000000003, 0x0) ioctl$int_out(r1, 0x5462, &(0x7f0000000340)) clock_gettime(0x0, &(0x7f0000000140)={0x0}) recvmmsg(r2, &(0x7f0000000040), 0x0, 0x10102, &(0x7f0000001540)={r3}) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000003080)={0x14, 0x1a, 0x201}, 0x14}}, 0x0) 13:16:08 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, 0x0) 13:16:08 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, 0x0) 13:16:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0xa, 0x300) r1 = syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x7, 0x0) mq_notify(r1, &(0x7f0000000400)={0x0, 0x39, 0x0, @thr={&(0x7f0000000240)="7f70623efb9751bc1db9c2420b66c95eafba3ed7e5ffff4b561a0d11d90c6f8239a7f60b392717d3a03b18348095058d12b56fee6a93185bc1562a56ba2c518b0d1bdf37869b7ae11b4480fda16635fd9764a89c7e883c6ca57dff7661ee2cf95174573dd4270ce69771ce444be22b48bb4568ede711b049758aebd607f7f1ea412beb5a29448622f6d9f8bebe615402bc9a4a47bed8374a5a4d36a5333bd1a3514ecc9e307f07a2f608dcda0ff3a7e1854199c92d703a2a5a7a359910a8f17e57de20e6104a1f70fbd31c4725962f5db0454f5624", &(0x7f0000000340)="68de25746fcc34e5447701db5f3d0bf745a61dfcfd312dffc07f3b84ccdc71622e476c0e53a118bf5704a688d97bd4037c25bcb0ccd52837756cf535e86e523f5c84bddec62ea8c60fe85d2d09c964f0a9c70eadb9caf367cbf0f96de1c2157843f80e2ca7c70a18690a745d1ab1ffdd9f47d2d97ef3128eee045a05cf2cc414eafd62cf902ec735d6ff64bbea2254c7483c4d67f817fd1e151c75cf2fed5ab4e3a4d712"}}) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000001c0)=0x111000, 0x4) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000100)=0x1, 0x4) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000080)) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000000c0)=0x3, 0x4) syz_emit_ethernet(0x36, &(0x7f0000000b40)=ANY=[@ANYBLOB="aaaaaaaaaac60000000000004305450000280000000000009078ac1414aa00000000000000004d2673689936c50b27aef7476c5ae929d5c59de8038c10a3b117bf218fd4a9bb2136a36c2bd3bf329ee2f8c66189eb5db12ab84a667383524277e632004289c246785a2c6ae49dcff76e49a84e55bfa22988edd2ed98d8f73d2511fe937664d755ce2a6e6312e9a34bcef46173c9ae9611d6307d5aa9d122da6a5ffb825b88156327f7cef6ccc35ab66f51f70e9e8d5a7800000000000000000000000000fe1910d87472f272af3482f36687ba74cfbecd8b93c8b83ebb8cff969857824ab27da903d165bc91087eac62fd6c6b6934683551d7ade55878918a970a3d4103f42183e4ddd8ba509f8cf9ec2671379c3efff5862bc3ef6146668b8b069ddf209c5f4d41e0131fda1671ef0307f067cf6427bf7908710c0100f2fd28801eb2444e55fb31051e59c6c81c987767f69f9e91b671c4f0bb99bea51f9973fd599bbfc15d16e6a36dba3acb8f8fdfde49fd609fdfbb488a1ac4988173ce81", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) [ 221.539395] protocol 88fb is buggy, dev hsr_slave_0 [ 221.544566] protocol 88fb is buggy, dev hsr_slave_1 13:16:09 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.memory_spread_slab\x00', 0x2, 0x0) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x8000000000, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000100)=0xa46, 0x4) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_hci(r2, 0x0, 0x1, &(0x7f0000000540)=""/66, &(0x7f00000006c0)=0xfffffffffffffe49) accept4$unix(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000200)=0x6e, 0x80800) r4 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f00000000c0)=0x80, 0x8) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x01\'n\x00\xbdh\x00'}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40042406, &(0x7f0000000280)='-$[\x88\x00') ioctl$EVIOCGLED(r5, 0x80404519, &(0x7f00000005c0)=""/102) socket$nl_route(0x10, 0x3, 0x0) r6 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_mtu(r5, 0x0, 0xa, &(0x7f0000000500), &(0x7f0000000640)=0x4) setxattr$trusted_overlay_upper(&(0x7f0000000340)='./file0//ile0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f00000008c0)=ANY=[], 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r6) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000800)={0x0, 0x0, 0x5, 'queue1\x00', 0x8}) memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xe4\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) write$cgroup_int(r1, &(0x7f0000000080)=0x100000001, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 13:16:09 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='sessionid\x00') pread64(r0, 0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000280)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000000000000000000000000000e600000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000e2eaea9b8e1335224f692a90efb2018a23875557bf1cb1029f5776db1362ad01ad9e21ba4263eef01a63c0c444d6cf88b751fdbedc486d8658b9178cc84310d6c90f43d82ec3aca644aa9e7b27c5ef76350f7e46dc05e96e736a985da654f592f28ae9b9f1064927352def59396e97966c2d638b79454ec4f92bd26e53265a96a09492a1450d1117813db926f9356b7db24e39508d386cb63b3e124bfad4b3afd166cac3ae3d50a5100c624caca473a10395c8d3c1261a5926910f84ae5024f890c5cee3b0a52f37aab5d476f37a9131ddd7760f07c57d2e04cb"], 0x1) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000000)={'raw\x00', 0x3, [{}, {}, {}]}, 0x58) 13:16:09 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x0, 0x1000, 0x2}) 13:16:09 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x20000, 0x0) getsockname$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @multicast2}, &(0x7f0000000300)=0x10) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000180), r2, 0x100000000}}, 0x18) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x10001, 0x0) ioctl$SG_GET_ACCESS_COUNT(r3, 0x2289, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x6}}, 0x18) 13:16:09 executing program 3: stat(&(0x7f0000000340)='./file0\x00', &(0x7f00000004c0)) setxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x2) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000180)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_TSC_KHZ(0xffffffffffffffff, 0xaea2, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x8000, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001140)=@mangle={'mangle\x00', 0x1f, 0x6, 0x650, 0x468, 0x138, 0x468, 0x228, 0x338, 0x5b8, 0x5b8, 0x5b8, 0x5b8, 0x5b8, 0x6, &(0x7f0000000240), {[{{@ip={@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0xff000000, 'veth0_to_bond\x00', 'bond_slave_0\x00', {}, {0xff}, 0x8, 0x1, 0x21}, 0x0, 0xc8, 0x138, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x80, 0x0, 0x0, 0x1}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x4, 0x5, 0x1f, 0x1, 0x0, "ec871a85b333986cc7b93d1a9131f2f13db2c9d7412b915e909b511dcc14e8ca46435a0b06f486d5bcae106624bd79e0ee628aeb6372f9b51af30f90d4677ded"}}}, {{@ip={@multicast2, @dev={0xac, 0x14, 0x14, 0x13}, 0xffffffff, 0xffffff00, 'tunl0\x00', 'ipddp0\x00', {}, {}, 0x2, 0x3, 0xe}, 0x0, 0xc0, 0xf0, 0x0, {}, [@common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x20, 0x80, 0xf}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x6da, @broadcast, 0x4e21}}}, {{@ip={@local, @rand_addr=0x6, 0xff000000, 0xff, 'syzkaller1\x00', 'erspan0\x00', {0xff}, {0xff}, 0x33, 0x1, 0x4}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xb}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x5}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x1, 0x9}}}, {{@ip={@multicast2, @local, 0xff000000, 0xffffffff, 'syzkaller1\x00', 'veth1_to_hsr\x00', {0xff}, {0xff}, 0x73, 0x3, 0x30}, 0x0, 0xe8, 0x130, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x7}}, @common=@icmp={0x28, 'icmp\x00', 0x0, {0x10, 0x10001, 0x1, 0x1}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@empty, 'teql0\x00', 0x3}}}, {{@uncond, 0x0, 0x110, 0x150, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xd}}, @common=@inet=@multiport={0x50, 'multiport\x00', 0x1, {0x1, 0x5, [0x4e24, 0x4e23, 0x4e20, 0x4e23, 0x4e24, 0x4e20, 0x4e21, 0x4e22, 0x4e22, 0x4e20, 0x4e24, 0x4e20, 0x4e24, 0x80000001, 0x4e22], [0x1, 0x1, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1], 0x1}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x20, 0x4, @ipv6=@empty, 0x4e24}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6b0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer2\x00', 0x200, 0x0) getsockname$netlink(r2, &(0x7f0000000540), &(0x7f0000000580)=0xc) r3 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_G_STD(r3, 0x80085617, &(0x7f0000000000)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f0000000140)="39fd17d985e3d9b07302528d756d04319168ac0c2c2298bfbd5c0149fa974e", 0x1f}], 0x1, 0x0, 0x0, 0x40}], 0x1, 0x4000000) ioctl$int_out(r0, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f0000000b00)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000002f00000000000000000000034ffffffffffffff090000000000000020000000000000000000000000000000000000000000000000000000000000000100008001000000f3000000000000000700000000000000ff01000000000000ffffff7f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000180000000000000000000000000000e08d89a55b83dd9b306d82a7624cbd5cdf74178ffa5c9d6ba3cb1b2394dc2883b6c96eee044a29cae6a9c45fb5b86a95c54a720ccb6280172d7d886b4eaad44869ba977ab9ca5e1824cdc9e96814a2141735def40b54953929bf88b8ff757044b7c256be720d57b9b5714d5aa9016c346b8fb5e87614c56d28656dcca4aa06a1343726b4baf48254381e478754cdf3716dd97701d9b2f673cff86c0f4996255cbcf58d103086902ed9e48a915d02b4a07af2a6e077653ab5e8ebaaf9bc70ba96d48f09"]) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000800)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x4010) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000d00)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0x0, 0x0, 0x0, 0xf8, 0xf8, 0x330, 0x330, 0x330, 0x330, 0x330, 0x4, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @empty, 0xff, 0x1, [0x20, 0xc, 0x27, 0x5, 0x24, 0x3, 0x26, 0x3, 0x1a, 0xe, 0x1a, 0x2b, 0x9, 0x24, 0xc, 0x38], 0x0, 0x6, 0xd49f}}}, {{@ip={@multicast1, @remote, 0xffffff00, 0xff, 'ip6gretap0\x00', 'batadv0\x00', {0xff}, {}, 0x21, 0x1, 0x1}, 0x0, 0xe8, 0x110, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}, @common=@ah={0x30, 'ah\x00', 0x0, {0x101, 0x9, 0x1}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x2, 0x9, 0x9}}}, {{@ip={@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xff, 0xffffffff, 'syz_tun\x00', 'caif0\x00', {}, {}, 0xff, 0x0, 0xb}, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x9, 0x1}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x7, [0x80000001, 0x571, 0x80000000, 0x6, 0x80000001, 0x80000000], 0x6, 0x1000000000000}, {0x3ff, [0x7fffffff, 0x7c00000, 0x0, 0x3, 0x6a, 0x4], 0x4, 0x3f}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x428) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x10800, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x7, 0x70, 0x6, 0x6, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0x420, 0x8, 0x2, 0xb5f0, 0x2, 0x2d6, 0x5, 0xeea, 0x81, 0x8, 0x5, 0x8, 0x1b, 0x29, 0x2, 0x4501, 0x0, 0x52e1, 0x1, 0x8, 0x1a, 0x9, 0x0, 0x6, 0xffff, 0x5, 0xfffffffffffffffd, 0x8, 0xfffffffffffffff8, 0x1, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x200, 0x2, 0xb373, 0x381, 0xffffffffffffff80}, r3, 0x10, 0xffffffffffffffff, 0x1) ioctl$EVIOCGBITSW(r4, 0x80404525, 0x0) unshare(0x40000000) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r2, 0xc0305615, &(0x7f0000000740)={0x0, {0x1}}) syz_open_dev$loop(0x0, 0x100000001, 0x0) 13:16:09 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x0, 0x0, 0x2}) 13:16:09 executing program 2: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x501080, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000140)={0x4, 0xffffffffffffffff}) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) chroot(&(0x7f0000000080)='./file0\x00') fadvise64(r1, 0x0, 0x0, 0x2) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000002000/0x18000)=nil, 0x0, 0xa0500000000000, 0x0, 0x0, 0x0) 13:16:09 executing program 5: syz_emit_ethernet(0x2a8, &(0x7f0000000100)={@broadcast, @random="cbe23a161d96", [], {@ipx={0x8137, {0xffff, 0x0, 0x7, 0x4, {@random=0x5c3, @random="273b8fcdd857"}, {@current, @current, 0x1}, "74eb8eed5b1fa222a64faa2f97deaee3b7c987f0db83b05554d8ac39d1fe016a0ebaf83306adb2c66686405a5e9f214f6cb9cbbd9db344af80f401a35a16977ddd633e3e1a4520b8cd9549070cb54aedbef21dc23ac7b2a27bfd304c9ecbae2069c2b624430d0a"}}}}, 0x0) 13:16:09 executing program 4: r0 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x5, 0x8000) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f0000000180)={0x9, &(0x7f0000000100)=[{0x400, 0x8, 0x1, 0x1ff}, {0x7, 0x0, 0x80, 0x8c70}, {0x0, 0x7ff, 0x5, 0x40}, {0x7da00, 0x4, 0x9, 0x937}, {0x6, 0x0, 0x6, 0x9}, {0x40, 0xffff, 0x4, 0x8}, {0x200, 0xfffffffffffffffd, 0xffffffff80000001, 0x3f}, {0xe753, 0x81, 0x4, 0x20}, {0x10001, 0xffffffff7fffffff, 0x8, 0x1}]}) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd0000000c00010004081000000000000004fcff", 0x58}], 0x1) 13:16:09 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)) 13:16:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x6, 0x591500) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r2, 0x54a2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f0000bba000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r1, @ANYBLOB="00000000d1426ae27aff77a0c4fcb9714a525cedac40c1b2d7872049d1a4dc323e64183418091c220e947b4b2d9187f98509806367b5345dab3dddee082ed99dcb2f83282444fe71e92dcabf8e3e38d7ae546d84360972aa6809bcc94e181d0daf282e446dd2"], 0x18}, 0x0) close(r3) 13:16:09 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x200000, 0x0) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000100)=""/4096) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000000)={0x5}) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f0000001100)) [ 222.192477] IPVS: ftp: loaded support on port[0] = 21 13:16:09 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.memory_spread_slab\x00', 0x2, 0x0) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x8000000000, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000100)=0xa46, 0x4) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_hci(r2, 0x0, 0x1, &(0x7f0000000540)=""/66, &(0x7f00000006c0)=0xfffffffffffffe49) accept4$unix(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000200)=0x6e, 0x80800) r4 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f00000000c0)=0x80, 0x8) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x01\'n\x00\xbdh\x00'}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40042406, &(0x7f0000000280)='-$[\x88\x00') ioctl$EVIOCGLED(r5, 0x80404519, &(0x7f00000005c0)=""/102) socket$nl_route(0x10, 0x3, 0x0) r6 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_mtu(r5, 0x0, 0xa, &(0x7f0000000500), &(0x7f0000000640)=0x4) setxattr$trusted_overlay_upper(&(0x7f0000000340)='./file0//ile0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f00000008c0)=ANY=[], 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r6) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000800)={0x0, 0x0, 0x5, 'queue1\x00', 0x8}) memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xe4\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) write$cgroup_int(r1, &(0x7f0000000080)=0x100000001, 0xf) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 13:16:09 executing program 1 (fault-call:2 fault-nth:0): r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)) 13:16:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000006c0)=0x200, 0x20) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)=0x0) setpgid(0x0, r1) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x54, 0x101400) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x1, 0x2, 0x4, 0x4, {0xa, 0x4e20, 0xa5f1, @mcast1, 0x8}}}, 0x32) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) r3 = request_key(&(0x7f00000002c0)='syzkaller\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)='keyring\x00', 0xfffffffffffffffc) r4 = add_key$keyring(&(0x7f0000000400)='keyring\x00', 0x0, 0x0, 0x0, r3) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, r4) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) io_setup(0xb88, &(0x7f0000000080)=0x0) io_cancel(r6, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7, 0x86, r0, &(0x7f0000000140)="41e39404bff81daa523b4f393f347232b0606fe9fe02bff203d0293afd276e5bb5be6272c8a4daae0bde7715de6e97acda99b90082093dd25634e76825b4d693c7aff0a48f3832d1a3e14dfcf19da6be68fd31946924895073ebe219dd65a489768372fd171473c267f1d70b25e4a7ba16475be5240fdc4c91dfb185a6cc43dbe03328", 0x83, 0x0, 0x0, 0x1, r5}, &(0x7f0000000240)) 13:16:09 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xffff, 0x10000) fcntl$setlease(r0, 0x400, 0x1) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="2f00000003000000000000000000000003000000000000000e0000000000000076657468305f746f5f7465516d0000"], 0x1000002f0) [ 222.708253] IPVS: ftp: loaded support on port[0] = 21 13:16:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x8f, 0x80000201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x14e) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x7ffffffffe, 0x0) perf_event_open(&(0x7f0000000800)={0x0, 0x70, 0x1, 0x9, 0x0, 0x100000000, 0x0, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x2, 0xe1, 0x5, 0x0, 0x9, 0x7, 0x354e3000, 0xfffffffffffff910, 0x5, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15a021c6, 0x0, 0x8001, 0x0, 0x0, 0x100000000, 0x400, 0x2, 0x0, 0x4, 0x0, @perf_config_ext={0x1}, 0x1000, 0xa66d, 0x0, 0x7, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x40002, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x2c) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) close(r2) 13:16:10 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)) 13:16:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x6, 0x591500) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r2, 0x54a2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f0000bba000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r1, @ANYBLOB="00000000d1426ae27aff77a0c4fcb9714a525cedac40c1b2d7872049d1a4dc323e64183418091c220e947b4b2d9187f98509806367b5345dab3dddee082ed99dcb2f83282444fe71e92dcabf8e3e38d7ae546d84360972aa6809bcc94e181d0daf282e446dd2"], 0x18}, 0x0) close(r3) 13:16:10 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x80000) socket$nl_route(0x10, 0x3, 0x0) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f0000000100)={0x400, "139045a5eb60376aa2af2c1b16037f9276adae31fb67f9b24ae804b97d063b00", 0x3, 0x3f4, 0x8001, 0xc00000, 0x8}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$RTC_WIE_ON(r0, 0x700f) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='net/route\x00'}, 0x10) 13:16:10 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_SET_FLAGS(r0, 0x80044324, &(0x7f0000000040)=0x1) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x100, 0x0) bind$rxrpc(r2, &(0x7f00000001c0)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e22, 0xfffffffffffffff9, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}}, 0x24) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r3, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1, 0x200000000001f6) ioctl$DRM_IOCTL_SET_UNIQUE(r3, 0x40106410, &(0x7f0000000080)={0xcc, &(0x7f0000000240)="5d2e0954b65fd37f78e747a09608bf39d471d746ba3035db71f998c26f9d96b954ab7830db6f7206ef43d6848d9c4e3121eb998d2f01d52d88e0b2d57b35b21abb785bbf6e87126ee41c071bdbdc53acecf68f1804fc013b1ca2c024421330cec9e6d17e9fe06527a374f63d46d5e559b8ec34c254e740321d982ba3cea75679ade71290d8d94307cfce028d4158577fff808698cd13ea243d8b8aa89a54336704d2a5dab8aa0550f4f3658e3a4df974ec6bbafd3374a5db70a4590eb3203e88a26f07719199b3fc432a086d"}) prctl$PR_GET_THP_DISABLE(0x2a) 13:16:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f3188b070") socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 13:16:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x8001, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) sendto$inet6(r1, &(0x7f00000001c0)="cc", 0x1, 0x0, 0x0, 0x0) 13:16:10 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x2, &(0x7f0000000000)) 13:16:10 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 13:16:10 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x5421, &(0x7f0000000000)) [ 222.971609] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 13:16:11 executing program 2: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2400000002031f001cfffd940200000020200a000900010001ec00000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000010307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x8}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x5d5f80cc5264d36d) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000280)=""/91) 13:16:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x200, 0x0, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x108) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000180)='./file0\x00', 0x800000000002, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) pause() 13:16:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r2, r3) execve(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x841, 0x0) clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f000000a880)={0x0, 0x0, &(0x7f000000a840)={0x0}}, 0x0) 13:16:11 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x5450, &(0x7f0000000000)) 13:16:11 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000600)=""/11, 0x232) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) dup2(r1, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000100)={@dev, 0x0, 0x2}, 0x20) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) 13:16:11 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x5451, &(0x7f0000000000)) [ 223.585469] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 223.601522] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 13:16:11 executing program 2: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2400000002031f001cfffd940200000020200a000900010001ec00000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000010307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x8}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x5d5f80cc5264d36d) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000280)=""/91) [ 223.642523] ptrace attach of "/root/syz-executor.2"[8274] was attempted by "/root/syz-executor.2"[8275] [ 223.749629] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 223.782190] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 223.820858] ptrace attach of "/root/syz-executor.2"[8293] was attempted by "/root/syz-executor.2"[8294] 13:16:11 executing program 0: socketpair$unix(0x1, 0x805, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r1, &(0x7f0000009400)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x5}, 0x1c) recvmmsg(r1, &(0x7f0000003640)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000400)=""/232, 0xe8}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x173, 0x0, 0x0) r2 = dup(r1) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd601bfc97004d8800fe800000000000000000000000000000ff02000000000000000000000000000100004e20000d9078e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"], 0x0) shutdown(r1, 0x0) 13:16:11 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x5452, &(0x7f0000000000)) 13:16:11 executing program 2: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2400000002031f001cfffd940200000020200a000900010001ec00000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000010307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x8}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x5d5f80cc5264d36d) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000280)=""/91) 13:16:11 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x10, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="852a628b"], @ANYPTR=&(0x7f0000000240)=ANY=[]], 0x0, 0x0, 0x0}) 13:16:11 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x5460, &(0x7f0000000000)) [ 224.096952] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 224.114243] binder: 8318:8320 unknown command 536871424 [ 224.135324] binder: 8318:8320 ioctl c0306201 20000440 returned -22 13:16:11 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ipv6_route\x00') pipe2$9p(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) splice(r0, 0x0, r1, 0x0, 0x1, 0x0) [ 224.153227] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 224.212801] [ 224.214469] ====================================================== [ 224.220780] WARNING: possible circular locking dependency detected [ 224.223312] kobject: 'loop5' (000000002b0050e0): kobject_uevent_env [ 224.227099] 5.0.0 #4 Not tainted [ 224.227105] ------------------------------------------------------ [ 224.227113] syz-executor.4/8330 is trying to acquire lock: [ 224.227123] 0000000079f7df20 (&p->lock){+.+.}, at: seq_read+0x71/0x1130 [ 224.240577] kobject: 'loop5' (000000002b0050e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 224.243168] [ 224.243168] but task is already holding lock: [ 224.243173] 00000000cec9e4b3 (&pipe->mutex/1){+.+.}, at: pipe_lock+0x6e/0x80 [ 224.243204] [ 224.243204] which lock already depends on the new lock. [ 224.243204] [ 224.286418] [ 224.286418] the existing dependency chain (in reverse order) is: [ 224.294030] [ 224.294030] -> #2 (&pipe->mutex/1){+.+.}: [ 224.299673] __mutex_lock+0xf7/0x1310 [ 224.303998] mutex_lock_nested+0x16/0x20 [ 224.308577] fifo_open+0x159/0xb00 [ 224.312646] do_dentry_open+0x47d/0x1130 [ 224.317227] vfs_open+0xa0/0xd0 [ 224.321024] path_openat+0x10d7/0x4690 [ 224.325428] do_filp_open+0x1a1/0x280 [ 224.329743] do_open_execat+0x13b/0x6d0 [ 224.334237] __do_execve_file.isra.0+0x178d/0x23f0 [ 224.339681] __x64_sys_execve+0x8f/0xc0 [ 224.344179] do_syscall_64+0x103/0x610 [ 224.348603] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 224.354321] [ 224.354321] -> #1 (&sig->cred_guard_mutex){+.+.}: [ 224.360646] __mutex_lock+0xf7/0x1310 [ 224.364964] mutex_lock_killable_nested+0x16/0x20 [ 224.370325] do_io_accounting+0x1f4/0x830 [ 224.374991] proc_tid_io_accounting+0x20/0x30 [ 224.380003] proc_single_show+0xf6/0x180 [ 224.384589] seq_read+0x4db/0x1130 [ 224.388649] __vfs_read+0x116/0x8c0 [ 224.392790] vfs_read+0x194/0x3e0 [ 224.396774] ksys_pread64+0x183/0x1c0 [ 224.401091] __x64_sys_pread64+0x97/0xf0 [ 224.405672] do_syscall_64+0x103/0x610 [ 224.410077] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 224.415778] [ 224.415778] -> #0 (&p->lock){+.+.}: [ 224.420895] lock_acquire+0x16f/0x3f0 [ 224.425213] __mutex_lock+0xf7/0x1310 [ 224.429529] mutex_lock_nested+0x16/0x20 [ 224.434111] seq_read+0x71/0x1130 [ 224.438082] proc_reg_read+0x1fa/0x2c0 [ 224.442484] do_iter_read+0x4a9/0x660 [ 224.446803] vfs_readv+0xf0/0x160 [ 224.450780] default_file_splice_read+0x475/0x890 [ 224.456148] do_splice_to+0x12a/0x190 [ 224.460464] do_splice+0xf7c/0x1330 [ 224.464616] __x64_sys_splice+0x2c6/0x330 [ 224.469283] do_syscall_64+0x103/0x610 [ 224.473692] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 224.479389] [ 224.479389] other info that might help us debug this: [ 224.479389] [ 224.487520] Chain exists of: [ 224.487520] &p->lock --> &sig->cred_guard_mutex --> &pipe->mutex/1 [ 224.487520] [ 224.498354] Possible unsafe locking scenario: [ 224.498354] [ 224.504413] CPU0 CPU1 [ 224.509069] ---- ---- [ 224.513721] lock(&pipe->mutex/1); [ 224.517343] lock(&sig->cred_guard_mutex); [ 224.520930] kobject: 'loop2' (00000000821c314e): kobject_uevent_env [ 224.524171] lock(&pipe->mutex/1); [ 224.532173] kobject: 'loop2' (00000000821c314e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 224.536702] lock(&p->lock); [ 224.536710] [ 224.536710] *** DEADLOCK *** [ 224.536710] [ 224.536719] 1 lock held by syz-executor.4/8330: [ 224.536723] #0: 00000000cec9e4b3 (&pipe->mutex/1){+.+.}, at: pipe_lock+0x6e/0x80 [ 224.567570] [ 224.567570] stack backtrace: [ 224.572069] CPU: 1 PID: 8330 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 224.578739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 224.588056] kobject: 'loop1' (00000000930985a5): kobject_uevent_env [ 224.588096] Call Trace: [ 224.595982] kobject: 'loop1' (00000000930985a5): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 224.597080] dump_stack+0x172/0x1f0 [ 224.610131] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 224.615500] __lock_acquire+0x2f00/0x4700 [ 224.619651] ? mark_held_locks+0x100/0x100 [ 224.623880] ? mark_held_locks+0x100/0x100 [ 224.628098] ? mark_held_locks+0x100/0x100 [ 224.632332] ? __lock_acquire+0x53b/0x4700 [ 224.636550] ? __lock_is_held+0xb6/0x140 [ 224.640599] ? seq_read+0x71/0x1130 [ 224.644206] lock_acquire+0x16f/0x3f0 [ 224.647989] ? seq_read+0x71/0x1130 [ 224.651601] ? seq_read+0x71/0x1130 [ 224.655212] __mutex_lock+0xf7/0x1310 [ 224.658992] ? seq_read+0x71/0x1130 [ 224.662601] ? seq_read+0x71/0x1130 [ 224.666214] ? mutex_trylock+0x1e0/0x1e0 [ 224.670260] ? aa_file_perm+0x3f6/0xdc0 [ 224.674216] ? trace_hardirqs_on+0x67/0x230 [ 224.678518] ? kasan_unpoison_shadow+0x35/0x50 [ 224.683084] ? kasan_alloc_pages+0x38/0x40 [ 224.687302] ? aa_path_link+0x460/0x460 [ 224.691258] ? seq_dentry+0x2d0/0x2d0 [ 224.695039] mutex_lock_nested+0x16/0x20 [ 224.699081] ? mutex_lock_nested+0x16/0x20 [ 224.703299] seq_read+0x71/0x1130 [ 224.706734] ? seq_dentry+0x2d0/0x2d0 [ 224.710517] proc_reg_read+0x1fa/0x2c0 [ 224.714384] ? proc_reg_unlocked_ioctl+0x2a0/0x2a0 [ 224.719302] ? rw_verify_area+0x118/0x360 [ 224.723460] do_iter_read+0x4a9/0x660 [ 224.727242] ? dup_iter+0x260/0x260 [ 224.730850] vfs_readv+0xf0/0x160 [ 224.734285] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 224.739644] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 224.745159] ? push_pipe+0x417/0x7a0 [ 224.748856] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 224.754373] ? iov_iter_revert+0xaa0/0xaa0 [ 224.758592] ? aa_file_perm+0x3cf/0xdc0 [ 224.762560] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 224.767562] ? iov_iter_pipe+0xba/0x2f0 [ 224.771519] default_file_splice_read+0x475/0x890 [ 224.776346] ? iter_file_splice_write+0xbe0/0xbe0 [ 224.781186] ? pipe_lock+0x6e/0x80 [ 224.784713] ? lock_acquire+0x16f/0x3f0 [ 224.788666] ? pipe_lock+0x6e/0x80 [ 224.792186] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 224.797700] ? fsnotify+0x395/0xbd0 [ 224.801326] ? fsnotify+0xbd0/0xbd0 [ 224.804934] ? fsnotify_first_mark+0x210/0x210 [ 224.809495] ? __fget+0x340/0x540 [ 224.812934] ? security_file_permission+0x94/0x320 [ 224.817845] ? rw_verify_area+0x118/0x360 [ 224.821975] ? iter_file_splice_write+0xbe0/0xbe0 [ 224.826802] do_splice_to+0x12a/0x190 [ 224.830595] do_splice+0xf7c/0x1330 [ 224.834204] ? iterate_fd+0x360/0x360 [ 224.837986] ? opipe_prep.part.0+0x2d0/0x2d0 [ 224.842373] ? __fget_light+0x1a9/0x230 [ 224.846328] __x64_sys_splice+0x2c6/0x330 [ 224.850458] do_syscall_64+0x103/0x610 [ 224.854328] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 224.859519] RIP: 0033:0x457e29 [ 224.862707] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 224.881607] RSP: 002b:00007f819c54bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 224.889300] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000457e29 [ 224.896551] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 224.903829] RBP: 000000000073bf00 R08: 0000000000000001 R09: 0000000000000000 [ 224.911078] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f819c54c6d4 [ 224.918331] R13: 00000000004c6c75 R14: 00000000004db870 R15: 00000000ffffffff [ 224.934281] kobject: 'loop0' (00000000c6b58a22): kobject_uevent_env [ 224.943536] kobject: 'loop0' (00000000c6b58a22): fill_kobj_path: path = '/devices/virtual/block/loop0' 13:16:12 executing program 3: r0 = socket(0x2, 0x1, 0x0) poll(&(0x7f0000000640)=[{r0, 0x4}], 0x1, 0x0) 13:16:12 executing program 2: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2400000002031f001cfffd940200000020200a000900010001ec00000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000010307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x8}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x5d5f80cc5264d36d) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000280)=""/91) 13:16:12 executing program 5: r0 = open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) 13:16:12 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x40049409, &(0x7f0000000000)) 13:16:12 executing program 0: open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) 13:16:12 executing program 4: mknod(&(0x7f0000000180)='./file0\x00', 0x1ffb, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x400040002c2, 0x0) close(r0) 13:16:12 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4020940d, &(0x7f0000000000)) [ 224.968093] kobject: 'loop3' (0000000094c62777): kobject_uevent_env [ 225.003719] kobject: 'loop3' (0000000094c62777): fill_kobj_path: path = '/devices/virtual/block/loop3' 13:16:12 executing program 5: r0 = open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) 13:16:12 executing program 3: r0 = open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) [ 225.022791] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 225.051357] kobject: 'loop4' (0000000081812151): kobject_uevent_env 13:16:12 executing program 0: r0 = socket$inet(0x2, 0x3, 0x89) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) 13:16:12 executing program 3: r0 = open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) 13:16:12 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aec9, &(0x7f0000000000)) [ 225.076945] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 225.092966] kobject: 'loop4' (0000000081812151): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 225.117010] kobject: 'loop1' (00000000930985a5): kobject_uevent_env 13:16:12 executing program 0: r0 = socket$inet(0x2, 0x3, 0x89) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) 13:16:12 executing program 2: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2400000002031f001cfffd940200000020200a000900010001ec00000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000010307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x8}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x5d5f80cc5264d36d) 13:16:12 executing program 5: r0 = open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) [ 225.136954] kobject: 'loop1' (00000000930985a5): fill_kobj_path: path = '/devices/virtual/block/loop1' 13:16:12 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0xc0045878, &(0x7f0000000000)) 13:16:12 executing program 0: r0 = socket$inet(0x2, 0x3, 0x89) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) [ 225.192119] kobject: 'loop5' (000000002b0050e0): kobject_uevent_env [ 225.222958] kobject: 'loop5' (000000002b0050e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 225.233989] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 225.250894] kobject: 'loop0' (00000000c6b58a22): kobject_uevent_env [ 225.258048] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 225.269434] kobject: 'loop0' (00000000c6b58a22): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 225.284836] kobject: 'loop3' (0000000094c62777): kobject_uevent_env [ 225.293364] kobject: 'loop3' (0000000094c62777): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 225.303333] kobject: 'loop1' (00000000930985a5): kobject_uevent_env [ 225.309904] kobject: 'loop1' (00000000930985a5): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 225.319988] kobject: 'loop0' (00000000c6b58a22): kobject_uevent_env [ 225.326418] kobject: 'loop0' (00000000c6b58a22): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 225.336327] kobject: 'loop5' (000000002b0050e0): kobject_uevent_env [ 225.343196] kobject: 'loop5' (000000002b0050e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 225.353042] kobject: 'loop2' (00000000821c314e): kobject_uevent_env [ 225.359491] kobject: 'loop2' (00000000821c314e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 225.376075] kobject: 'loop0' (00000000c6b58a22): kobject_uevent_env [ 225.383006] kobject: 'loop0' (00000000c6b58a22): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 225.393083] kobject: 'loop3' (0000000094c62777): kobject_uevent_env [ 225.399565] kobject: 'loop3' (0000000094c62777): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 225.409469] kobject: 'loop5' (000000002b0050e0): kobject_uevent_env [ 225.410029] kobject: 'rx-0' (00000000133d88e9): kobject_cleanup, parent 00000000dfc83b24 [ 225.415899] kobject: 'loop5' (000000002b0050e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 225.426949] kobject: 'rx-0' (00000000133d88e9): auto cleanup 'remove' event [ 225.434006] kobject: 'loop0' (00000000c6b58a22): kobject_uevent_env [ 225.443488] kobject: 'rx-0' (00000000133d88e9): kobject_uevent_env [ 225.447174] kobject: 'loop0' (00000000c6b58a22): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 225.454199] kobject: 'rx-0' (00000000133d88e9): kobject_uevent_env: uevent_suppress caused the event to drop! [ 225.463561] kobject: 'loop2' (00000000821c314e): kobject_uevent_env [ 225.475860] kobject: 'rx-0' (00000000133d88e9): auto cleanup kobject_del [ 225.479631] kobject: 'loop2' (00000000821c314e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 225.486846] kobject: 'rx-0' (00000000133d88e9): calling ktype release [ 225.513878] kobject: 'rx-0': free name [ 225.517852] kobject: 'tx-0' (00000000fb62e2bb): kobject_cleanup, parent 00000000dfc83b24 [ 225.526233] kobject: 'tx-0' (00000000fb62e2bb): auto cleanup 'remove' event [ 225.546826] kobject: 'tx-0' (00000000fb62e2bb): kobject_uevent_env [ 225.554146] kobject: 'tx-0' (00000000fb62e2bb): kobject_uevent_env: uevent_suppress caused the event to drop! [ 225.566647] kobject: 'tx-0' (00000000fb62e2bb): auto cleanup kobject_del [ 225.574270] kobject: 'tx-0' (00000000fb62e2bb): calling ktype release [ 225.581208] kobject: 'tx-0': free name [ 225.585174] kobject: 'queues' (00000000dfc83b24): kobject_cleanup, parent (null) [ 225.605011] kobject: 'queues' (00000000dfc83b24): calling ktype release [ 225.611994] kobject: 'queues' (00000000dfc83b24): kset_release [ 225.620680] kobject: 'queues': free name [ 225.625147] kobject: 'ip6gre0' (00000000b4f292e6): kobject_uevent_env [ 225.632005] kobject: 'ip6gre0' (00000000b4f292e6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 225.669389] kobject: 'ip6gre0' (00000000b4f292e6): kobject_cleanup, parent (null) [ 225.677945] kobject: 'ip6gre0' (00000000b4f292e6): auto cleanup 'remove' event [ 225.685429] kobject: 'ip6gre0' (00000000b4f292e6): kobject_uevent_env [ 225.692046] kobject: 'ip6gre0' (00000000b4f292e6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 225.702504] kobject: 'ip6gre0' (00000000b4f292e6): calling ktype release [ 225.709743] kobject: 'ip6gre0': free name [ 225.714529] kobject: 'rx-0' (000000001017dfad): kobject_cleanup, parent 000000001b0fdb88 [ 225.722837] kobject: 'rx-0' (000000001017dfad): auto cleanup 'remove' event [ 225.729957] kobject: 'rx-0' (000000001017dfad): kobject_uevent_env [ 225.736266] kobject: 'rx-0' (000000001017dfad): kobject_uevent_env: uevent_suppress caused the event to drop! [ 225.746333] kobject: 'rx-0' (000000001017dfad): auto cleanup kobject_del [ 225.753198] kobject: 'rx-0' (000000001017dfad): calling ktype release [ 225.759801] kobject: 'rx-0': free name [ 225.763753] kobject: 'tx-0' (0000000028b9f139): kobject_cleanup, parent 000000001b0fdb88 [ 225.772011] kobject: 'tx-0' (0000000028b9f139): auto cleanup 'remove' event [ 225.779108] kobject: 'tx-0' (0000000028b9f139): kobject_uevent_env [ 225.786525] kobject: 'tx-0' (0000000028b9f139): kobject_uevent_env: uevent_suppress caused the event to drop! [ 225.796628] kobject: 'tx-0' (0000000028b9f139): auto cleanup kobject_del [ 225.803594] kobject: 'tx-0' (0000000028b9f139): calling ktype release [ 225.810189] kobject: 'tx-0': free name 13:16:13 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 13:16:13 executing program 3: r0 = open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) 13:16:13 executing program 5: r0 = open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) 13:16:13 executing program 0: r0 = socket$inet(0x2, 0x3, 0x89) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) 13:16:13 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0xc0045878, &(0x7f0000000000)) 13:16:13 executing program 2: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2400000002031f001cfffd940200000020200a000900010001ec00000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000010307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x8}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x5d5f80cc5264d36d) [ 225.814091] kobject: 'queues' (000000001b0fdb88): kobject_cleanup, parent (null) [ 225.822509] kobject: 'queues' (000000001b0fdb88): calling ktype release [ 225.829365] kobject: 'queues' (000000001b0fdb88): kset_release [ 225.835324] kobject: 'queues': free name [ 225.840109] kobject: 'ip6tnl0' (00000000511f7af0): kobject_uevent_env [ 225.846690] kobject: 'ip6tnl0' (00000000511f7af0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 225.859477] kobject: 'loop4' (0000000081812151): kobject_uevent_env 13:16:13 executing program 3: open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) [ 225.873315] kobject: 'loop4' (0000000081812151): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 225.889645] kobject: 'ip6tnl0' (00000000511f7af0): kobject_cleanup, parent (null) 13:16:13 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0xc0189436, &(0x7f0000000000)) 13:16:13 executing program 0: setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 13:16:13 executing program 5: r0 = open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) [ 225.916759] kobject: 'loop3' (0000000094c62777): kobject_uevent_env [ 225.942616] kobject: 'ip6tnl0' (00000000511f7af0): auto cleanup 'remove' event [ 225.947873] kobject: 'loop3' (0000000094c62777): fill_kobj_path: path = '/devices/virtual/block/loop3' 13:16:13 executing program 2: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2400000002031f001cfffd940200000020200a000900010001ec00000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000010307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x8}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x5d5f80cc5264d36d) [ 225.968843] kobject: 'loop1' (00000000930985a5): kobject_uevent_env [ 225.982656] kobject: 'ip6tnl0' (00000000511f7af0): kobject_uevent_env [ 226.005237] kobject: 'ip6tnl0' (00000000511f7af0): kobject_uevent_env: uevent_suppress caused the event to drop! 13:16:13 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 13:16:13 executing program 5: r0 = open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) 13:16:13 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0xc020660b, &(0x7f0000000000)) 13:16:13 executing program 3: open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) [ 226.007860] kobject: 'loop1' (00000000930985a5): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 226.042554] ptrace attach of "/root/syz-executor.2"[8434] was attempted by "/root/syz-executor.2"[8435] [ 226.051997] kobject: 'loop0' (00000000c6b58a22): kobject_uevent_env [ 226.058783] kobject: 'loop0' (00000000c6b58a22): fill_kobj_path: path = '/devices/virtual/block/loop0' 13:16:13 executing program 0: setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 13:16:13 executing program 5: r0 = open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) 13:16:13 executing program 3: open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 13:16:13 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x2}) [ 226.085667] kobject: 'loop5' (000000002b0050e0): kobject_uevent_env [ 226.087260] kobject: 'ip6tnl0' (00000000511f7af0): calling ktype release [ 226.118709] kobject: 'loop5' (000000002b0050e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 226.124859] kobject: 'ip6tnl0': free name 13:16:13 executing program 2: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2400000002031f001cfffd940200000020200a000900010001ec00000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000010307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x8}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000280)=""/91) 13:16:13 executing program 0: setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 13:16:13 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 226.137503] kobject: 'loop2' (00000000821c314e): kobject_uevent_env [ 226.159613] kobject: 'loop2' (00000000821c314e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 226.160408] kobject: 'rx-0' (0000000050062b6d): kobject_cleanup, parent 0000000049ea4cd0 [ 226.177533] kobject: 'loop4' (0000000081812151): kobject_uevent_env 13:16:13 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x204}) 13:16:13 executing program 5: r0 = open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) 13:16:13 executing program 0: r0 = socket$inet(0x2, 0x0, 0x89) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) 13:16:13 executing program 3: open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) [ 226.215840] kobject: 'loop4' (0000000081812151): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 226.222549] kobject: 'rx-0' (0000000050062b6d): auto cleanup 'remove' event [ 226.251921] kobject: 'loop5' (000000002b0050e0): kobject_uevent_env [ 226.258163] kobject: 'rx-0' (0000000050062b6d): kobject_uevent_env 13:16:13 executing program 5: r0 = open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) 13:16:13 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 13:16:13 executing program 3: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) [ 226.266634] kobject: 'rx-0' (0000000050062b6d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 226.278486] kobject: 'loop5' (000000002b0050e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 226.304949] kobject: 'rx-0' (0000000050062b6d): auto cleanup kobject_del 13:16:13 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x402}) [ 226.320823] kobject: 'rx-0' (0000000050062b6d): calling ktype release [ 226.325840] kobject: 'loop3' (0000000094c62777): kobject_uevent_env [ 226.352148] kobject: 'rx-0': free name [ 226.355167] kobject: 'loop3' (0000000094c62777): fill_kobj_path: path = '/devices/virtual/block/loop3' 13:16:13 executing program 0: r0 = socket$inet(0x2, 0x0, 0x89) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) [ 226.370938] kobject: 'tx-0' (00000000c017c385): kobject_cleanup, parent 0000000049ea4cd0 [ 226.376702] kobject: 'loop0' (00000000c6b58a22): kobject_uevent_env [ 226.395314] kobject: 'loop0' (00000000c6b58a22): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 226.408528] kobject: 'tx-0' (00000000c017c385): auto cleanup 'remove' event [ 226.418102] kobject: 'tx-0' (00000000c017c385): kobject_uevent_env [ 226.424085] kobject: 'loop5' (000000002b0050e0): kobject_uevent_env [ 226.425413] kobject: 'tx-0' (00000000c017c385): kobject_uevent_env: uevent_suppress caused the event to drop! [ 226.439057] kobject: 'loop5' (000000002b0050e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 226.448466] kobject: 'tx-0' (00000000c017c385): auto cleanup kobject_del [ 226.454860] kobject: 'loop3' (0000000094c62777): kobject_uevent_env [ 226.464450] kobject: 'loop3' (0000000094c62777): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 226.469357] kobject: 'tx-0' (00000000c017c385): calling ktype release [ 226.475333] kobject: 'loop2' (00000000821c314e): kobject_uevent_env [ 226.489325] kobject: 'tx-0': free name [ 226.490609] kobject: 'loop2' (00000000821c314e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 226.493234] kobject: 'queues' (0000000049ea4cd0): kobject_cleanup, parent (null) [ 226.493242] kobject: 'queues' (0000000049ea4cd0): calling ktype release [ 226.493252] kobject: 'queues' (0000000049ea4cd0): kset_release [ 226.515039] kobject: 'loop4' (0000000081812151): kobject_uevent_env [ 226.520550] kobject: 'queues': free name [ 226.524015] kobject: 'loop4' (0000000081812151): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 226.531074] kobject: 'sit0' (00000000e49eb5ce): kobject_uevent_env [ 226.537412] kobject: 'loop1' (00000000930985a5): kobject_uevent_env [ 226.544168] kobject: 'sit0' (00000000e49eb5ce): kobject_uevent_env: uevent_suppress caused the event to drop! 13:16:14 executing program 2: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2400000002031f001cfffd940200000020200a000900010001ec00000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000010307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x8}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000280)=""/91) 13:16:14 executing program 3: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) 13:16:14 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x3f00}) 13:16:14 executing program 5: r0 = open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) 13:16:14 executing program 0: r0 = socket$inet(0x2, 0x0, 0x89) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) 13:16:14 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 226.552989] kobject: 'loop1' (00000000930985a5): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 226.576826] kobject: 'loop5' (000000002b0050e0): kobject_uevent_env [ 226.583526] kobject: 'loop5' (000000002b0050e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 226.593365] kobject: 'loop3' (0000000094c62777): kobject_uevent_env [ 226.610880] kobject: 'sit0' (00000000e49eb5ce): kobject_cleanup, parent (null) 13:16:14 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x2000000}) 13:16:14 executing program 5: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 13:16:14 executing program 3: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) [ 226.639445] kobject: 'loop3' (0000000094c62777): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 226.640275] kobject: 'sit0' (00000000e49eb5ce): auto cleanup 'remove' event [ 226.659954] kobject: 'loop5' (000000002b0050e0): kobject_uevent_env [ 226.672048] kobject: 'loop5' (000000002b0050e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 226.680583] kobject: 'sit0' (00000000e49eb5ce): kobject_uevent_env 13:16:14 executing program 2: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2400000002031f001cfffd940200000020200a000900010001ec00000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000010307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x8}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000280)=""/91) 13:16:14 executing program 3: open(0x0, 0x80040, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) 13:16:14 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x2040000}) 13:16:14 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 13:16:14 executing program 0: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) [ 226.705009] kobject: 'loop4' (0000000081812151): kobject_uevent_env [ 226.709481] kobject: 'sit0' (00000000e49eb5ce): kobject_uevent_env: uevent_suppress caused the event to drop! [ 226.736863] kobject: 'loop4' (0000000081812151): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 226.740200] kobject: 'sit0' (00000000e49eb5ce): calling ktype release 13:16:14 executing program 5: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) [ 226.781007] kobject: 'loop3' (0000000094c62777): kobject_uevent_env [ 226.789275] ptrace attach of "/root/syz-executor.2"[8522] was attempted by "/root/syz-executor.2"[8523] [ 226.795385] kobject: 'loop3' (0000000094c62777): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 226.814661] kobject: 'sit0': free name 13:16:14 executing program 3: open(0x0, 0x80040, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) 13:16:14 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x20000000}) 13:16:14 executing program 0: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) 13:16:14 executing program 5: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) [ 226.823432] kobject: 'rx-0' (00000000985016de): kobject_cleanup, parent 00000000fd48fee4 [ 226.836059] kobject: 'loop1' (00000000930985a5): kobject_uevent_env [ 226.846550] kobject: 'rx-0' (00000000985016de): auto cleanup 'remove' event [ 226.855238] kobject: 'loop1' (00000000930985a5): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 226.867563] kobject: 'loop3' (0000000094c62777): kobject_uevent_env 13:16:14 executing program 2: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2400000002031f001cfffd940200000020200a000900010001ec00000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000010307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x8}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x5d5f80cc5264d36d) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000280)=""/91) 13:16:14 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 13:16:14 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x3f000000}) 13:16:14 executing program 5: r0 = open(0x0, 0x80040, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) [ 226.886047] kobject: 'loop3' (0000000094c62777): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 226.897767] kobject: 'rx-0' (00000000985016de): kobject_uevent_env [ 226.911403] kobject: 'loop5' (000000002b0050e0): kobject_uevent_env [ 226.925057] kobject: 'rx-0' (00000000985016de): kobject_uevent_env: uevent_suppress caused the event to drop! 13:16:14 executing program 3: open(0x0, 0x80040, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) [ 226.946825] kobject: 'loop5' (000000002b0050e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 226.963790] kobject: 'rx-0' (00000000985016de): auto cleanup kobject_del [ 226.969036] kobject: 'loop1' (00000000930985a5): kobject_uevent_env [ 226.983617] kobject: 'loop1' (00000000930985a5): fill_kobj_path: path = '/devices/virtual/block/loop1' 13:16:14 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x2000000000}) 13:16:14 executing program 0: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) 13:16:14 executing program 5: r0 = open(0x0, 0x80040, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) 13:16:14 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 226.997365] kobject: 'rx-0' (00000000985016de): calling ktype release [ 227.015720] kobject: 'loop4' (0000000081812151): kobject_uevent_env [ 227.026515] kobject: 'rx-0': free name [ 227.031233] kobject: 'loop4' (0000000081812151): fill_kobj_path: path = '/devices/virtual/block/loop4' 13:16:14 executing program 3: open(&(0x7f00007e2ff8)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) [ 227.044017] kobject: 'tx-0' (000000004dd008bb): kobject_cleanup, parent 00000000fd48fee4 13:16:14 executing program 5: r0 = open(0x0, 0x80040, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) 13:16:14 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x200000000000000}) [ 227.079151] kobject: 'tx-0' (000000004dd008bb): auto cleanup 'remove' event [ 227.092908] kobject: 'loop0' (00000000c6b58a22): kobject_uevent_env [ 227.106743] kobject: 'loop0' (00000000c6b58a22): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 227.124087] kobject: 'tx-0' (000000004dd008bb): kobject_uevent_env [ 227.133702] kobject: 'tx-0' (000000004dd008bb): kobject_uevent_env: uevent_suppress caused the event to drop! [ 227.156397] kobject: 'loop2' (00000000821c314e): kobject_uevent_env [ 227.168460] kobject: 'tx-0' (000000004dd008bb): auto cleanup kobject_del [ 227.171989] kobject: 'loop2' (00000000821c314e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 227.175983] kobject: 'tx-0' (000000004dd008bb): calling ktype release [ 227.189727] kobject: 'loop1' (00000000930985a5): kobject_uevent_env [ 227.192447] kobject: 'tx-0': free name [ 227.197855] kobject: 'loop1' (00000000930985a5): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 227.202293] kobject: 'queues' (00000000fd48fee4): kobject_cleanup, parent (null) [ 227.213854] kobject: 'loop3' (0000000094c62777): kobject_uevent_env [ 227.219959] kobject: 'queues' (00000000fd48fee4): calling ktype release [ 227.226112] kobject: 'loop3' (0000000094c62777): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 227.226420] kobject: 'loop2' (00000000821c314e): kobject_uevent_env [ 227.233259] kobject: 'queues' (00000000fd48fee4): kset_release [ 227.245087] kobject: 'loop2' (00000000821c314e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 227.249210] kobject: 'queues': free name [ 227.255440] kobject: 'loop3' (0000000094c62777): kobject_uevent_env [ 227.264954] kobject: 'ip6_vti0' (00000000646cd658): kobject_uevent_env [ 227.270756] kobject: 'loop3' (0000000094c62777): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 227.275153] kobject: 'ip6_vti0' (00000000646cd658): kobject_uevent_env: uevent_suppress caused the event to drop! [ 227.282665] kobject: 'loop1' (00000000930985a5): kobject_uevent_env [ 227.307976] kobject: 'loop1' (00000000930985a5): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 227.317869] kobject: 'loop4' (0000000081812151): kobject_uevent_env 13:16:14 executing program 2: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2400000002031f001cfffd940200000020200a000900010001ec00000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000010307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x8}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x5d5f80cc5264d36d) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000280)=""/91) 13:16:14 executing program 0: socket$inet(0x2, 0x3, 0x89) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 13:16:14 executing program 3: open(&(0x7f00007e2ff8)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) 13:16:14 executing program 5: r0 = open(&(0x7f00007e2ff8)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) 13:16:14 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x204000000000000}) 13:16:14 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 227.324365] kobject: 'ip6_vti0' (00000000646cd658): kobject_cleanup, parent (null) [ 227.331749] kobject: 'loop4' (0000000081812151): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 227.332972] kobject: 'ip6_vti0' (00000000646cd658): auto cleanup 'remove' event 13:16:14 executing program 5: r0 = open(&(0x7f00007e2ff8)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) 13:16:15 executing program 3: open(&(0x7f00007e2ff8)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) 13:16:15 executing program 0: socket$inet(0x2, 0x3, 0x89) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 227.385792] kobject: 'loop0' (00000000c6b58a22): kobject_uevent_env [ 227.395264] ptrace attach of "/root/syz-executor.2"[8596] was attempted by "/root/syz-executor.2"[8597] [ 227.398263] kobject: 'ip6_vti0' (00000000646cd658): kobject_uevent_env [ 227.420082] kobject: 'ip6_vti0' (00000000646cd658): kobject_uevent_env: uevent_suppress caused the event to drop! 13:16:15 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x3f00000000000000}) 13:16:15 executing program 2: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2400000002031f001cfffd940200000020200a000900010001ec00000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000010307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x8}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x5d5f80cc5264d36d) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000280)=""/91) 13:16:15 executing program 5: r0 = open(&(0x7f00007e2ff8)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) [ 227.434002] kobject: 'ip6_vti0' (00000000646cd658): calling ktype release [ 227.436773] kobject: 'loop0' (00000000c6b58a22): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 227.452999] kobject: 'ip6_vti0': free name [ 227.464644] kobject: 'loop3' (0000000094c62777): kobject_uevent_env 13:16:15 executing program 0: socket$inet(0x2, 0x3, 0x89) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 13:16:15 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 13:16:15 executing program 3: open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) r0 = open(0x0, 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) [ 227.480261] kobject: 'rx-0' (000000004cd25fc0): kobject_cleanup, parent 00000000082ad57f [ 227.498412] kobject: 'rx-0' (000000004cd25fc0): auto cleanup 'remove' event [ 227.515420] kobject: 'loop3' (0000000094c62777): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 227.522091] kobject: 'rx-0' (000000004cd25fc0): kobject_uevent_env 13:16:15 executing program 5: r0 = open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) r1 = open(0x0, 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) 13:16:15 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x0, 0x2}) 13:16:15 executing program 3: open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) r0 = open(0x0, 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) 13:16:15 executing program 0: write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCMBIC(r0, 0x5417, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000280)=""/246) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000100)=0x0) signalfd4(r1, &(0x7f00000004c0)={0x3}, 0x8, 0x800) io_cancel(r3, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x9, r0, &(0x7f0000000380)="c9ad4dde359b4ace6ccec5a47cce6089eee953448b68b70262c289a022728fcea5e69c45dc4b9fc26b25893be20caa83cc7b8bc72d5e5411419af7c6e8c243d1d2e52f59286559f81a25699ba773085227f1c4417cb4233a2afd4691d0dce06de06b52231caa0c86f75743a6d49fab5c4abb37e3a26b10fe806d4faf486efa2bccdadff93e715b3b1bfaca92f4f4688e559379a3a5abe9b3103aeecd747fe10fafd53042f21a0d3d08e9592f08c9cc423015b71eaa34b2c8961025f038135ad7b54391705f20a331ebe3", 0xca, 0x8, 0x0, 0x3}, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='net/sockstat\x00') ioctl$sock_SIOCOUTQ(r4, 0x5411, &(0x7f0000000480)) [ 227.549955] kobject: 'loop1' (00000000930985a5): kobject_uevent_env [ 227.558211] kobject: 'rx-0' (000000004cd25fc0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 227.569056] kobject: 'loop1' (00000000930985a5): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 227.581422] kobject: 'rx-0' (000000004cd25fc0): auto cleanup kobject_del [ 227.593569] kobject: 'rx-0' (000000004cd25fc0): calling ktype release 13:16:15 executing program 5: r0 = open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) r1 = open(0x0, 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) 13:16:15 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x0, 0x204}) 13:16:15 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 227.606131] kobject: 'loop0' (00000000c6b58a22): kobject_uevent_env [ 227.613570] kobject: 'rx-0': free name [ 227.621364] kobject: 'loop0' (00000000c6b58a22): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 227.640708] kobject: 'tx-0' (00000000b4c6fa9c): kobject_cleanup, parent 00000000082ad57f [ 227.667721] kobject: 'loop2' (00000000821c314e): kobject_uevent_env [ 227.671660] kobject: 'tx-0' (00000000b4c6fa9c): auto cleanup 'remove' event [ 227.678731] kobject: 'loop2' (00000000821c314e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 227.691374] kobject: 'tx-0' (00000000b4c6fa9c): kobject_uevent_env [ 227.696831] kobject: 'loop4' (0000000081812151): kobject_uevent_env [ 227.705712] kobject: 'tx-0' (00000000b4c6fa9c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 227.706950] kobject: 'loop4' (0000000081812151): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 227.723869] kobject: 'tx-0' (00000000b4c6fa9c): auto cleanup kobject_del [ 227.731541] kobject: 'loop1' (00000000930985a5): kobject_uevent_env [ 227.738691] kobject: 'loop1' (00000000930985a5): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 227.741652] kobject: 'tx-0' (00000000b4c6fa9c): calling ktype release [ 227.755009] kobject: 'tx-0': free name [ 227.758997] kobject: 'queues' (00000000082ad57f): kobject_cleanup, parent (null) [ 227.762292] kobject: 'loop3' (0000000094c62777): kobject_uevent_env [ 227.774159] kobject: 'loop3' (0000000094c62777): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 227.780737] kobject: 'queues' (00000000082ad57f): calling ktype release [ 227.784331] kobject: 'loop1' (00000000930985a5): kobject_uevent_env [ 227.795418] kobject: 'queues' (00000000082ad57f): kset_release [ 227.797078] kobject: 'loop1' (00000000930985a5): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 227.802913] kobject: 'queues': free name 13:16:15 executing program 2: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2400000002031f001cfffd940200000020200a000900010001ec00000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000010307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x8}) ptrace$cont(0x7, r2, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x5d5f80cc5264d36d) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000280)=""/91) 13:16:15 executing program 3: open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) r0 = open(0x0, 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) 13:16:15 executing program 5: r0 = open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) r1 = open(0x0, 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) 13:16:15 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x0, 0x402}) 13:16:15 executing program 0: write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCMBIC(r0, 0x5417, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000280)=""/246) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000100)=0x0) signalfd4(r1, &(0x7f00000004c0)={0x3}, 0x8, 0x800) io_cancel(r3, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x9, r0, &(0x7f0000000380)="c9ad4dde359b4ace6ccec5a47cce6089eee953448b68b70262c289a022728fcea5e69c45dc4b9fc26b25893be20caa83cc7b8bc72d5e5411419af7c6e8c243d1d2e52f59286559f81a25699ba773085227f1c4417cb4233a2afd4691d0dce06de06b52231caa0c86f75743a6d49fab5c4abb37e3a26b10fe806d4faf486efa2bccdadff93e715b3b1bfaca92f4f4688e559379a3a5abe9b3103aeecd747fe10fafd53042f21a0d3d08e9592f08c9cc423015b71eaa34b2c8961025f038135ad7b54391705f20a331ebe3", 0xca, 0x8, 0x0, 0x3}, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='net/sockstat\x00') ioctl$sock_SIOCOUTQ(r4, 0x5411, &(0x7f0000000480)) 13:16:15 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 227.803217] kobject: 'ip_vti0' (00000000de84513a): kobject_uevent_env [ 227.825522] kobject: 'ip_vti0' (00000000de84513a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 227.837499] kobject: 'loop0' (00000000c6b58a22): kobject_uevent_env [ 227.848839] kobject: 'loop0' (00000000c6b58a22): fill_kobj_path: path = '/devices/virtual/block/loop0' 13:16:15 executing program 5: r0 = open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) 13:16:15 executing program 3: open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) [ 227.877261] kobject: 'loop4' (0000000081812151): kobject_uevent_env [ 227.883829] kobject: 'ip_vti0' (00000000de84513a): kobject_cleanup, parent (null) [ 227.895414] kobject: 'ip_vti0' (00000000de84513a): auto cleanup 'remove' event [ 227.900885] ptrace attach of "/root/syz-executor.2"[8652] was attempted by "/root/syz-executor.2"[8653] [ 227.914728] kobject: 'loop4' (0000000081812151): fill_kobj_path: path = '/devices/virtual/block/loop4' 13:16:15 executing program 2: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2400000002031f001cfffd940200000020200a000900010001ec00000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000010307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x8}) ptrace$cont(0x7, r2, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x5d5f80cc5264d36d) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000280)=""/91) 13:16:15 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x0, 0x3f00}) [ 227.934296] kobject: 'ip_vti0' (00000000de84513a): kobject_uevent_env [ 227.941518] kobject: 'loop3' (0000000094c62777): kobject_uevent_env [ 227.947997] kobject: 'ip_vti0' (00000000de84513a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 227.967157] kobject: 'loop3' (0000000094c62777): fill_kobj_path: path = '/devices/virtual/block/loop3' 13:16:15 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 13:16:15 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x0, 0x2000000}) 13:16:15 executing program 0: write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCMBIC(r0, 0x5417, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000280)=""/246) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000100)=0x0) signalfd4(r1, &(0x7f00000004c0)={0x3}, 0x8, 0x800) io_cancel(r3, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x9, r0, &(0x7f0000000380)="c9ad4dde359b4ace6ccec5a47cce6089eee953448b68b70262c289a022728fcea5e69c45dc4b9fc26b25893be20caa83cc7b8bc72d5e5411419af7c6e8c243d1d2e52f59286559f81a25699ba773085227f1c4417cb4233a2afd4691d0dce06de06b52231caa0c86f75743a6d49fab5c4abb37e3a26b10fe806d4faf486efa2bccdadff93e715b3b1bfaca92f4f4688e559379a3a5abe9b3103aeecd747fe10fafd53042f21a0d3d08e9592f08c9cc423015b71eaa34b2c8961025f038135ad7b54391705f20a331ebe3", 0xca, 0x8, 0x0, 0x3}, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='net/sockstat\x00') ioctl$sock_SIOCOUTQ(r4, 0x5411, &(0x7f0000000480)) [ 227.975228] ptrace attach of "/root/syz-executor.2"[8660] was attempted by "/root/syz-executor.2"[8661] [ 227.976754] kobject: 'ip_vti0' (00000000de84513a): calling ktype release [ 228.013732] kobject: 'loop1' (00000000930985a5): kobject_uevent_env 13:16:15 executing program 5: r0 = open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) 13:16:15 executing program 2: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2400000002031f001cfffd940200000020200a000900010001ec00000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000010307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x8}) ptrace$cont(0x7, r2, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x5d5f80cc5264d36d) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000280)=""/91) 13:16:15 executing program 3: open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) [ 228.045522] kobject: 'loop1' (00000000930985a5): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 228.059132] kobject: 'ip_vti0': free name [ 228.066540] kobject: 'batman_adv' (000000000dc7f4c3): kobject_uevent_env [ 228.076296] kobject: 'loop0' (00000000c6b58a22): kobject_uevent_env [ 228.082838] kobject: 'batman_adv' (000000000dc7f4c3): kobject_uevent_env: filter function caused the event to drop! 13:16:15 executing program 5: r0 = open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) [ 228.096014] kobject: 'loop0' (00000000c6b58a22): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 228.105707] kobject: 'batman_adv' (000000000dc7f4c3): kobject_cleanup, parent (null) [ 228.120102] kobject: 'loop3' (0000000094c62777): kobject_uevent_env [ 228.131964] kobject: 'loop3' (0000000094c62777): fill_kobj_path: path = '/devices/virtual/block/loop3' 13:16:15 executing program 3: open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 13:16:15 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 13:16:15 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x0, 0x2040000}) [ 228.144761] kobject: 'batman_adv' (000000000dc7f4c3): calling ktype release [ 228.152687] kobject: (000000000dc7f4c3): dynamic_kobj_release [ 228.161779] kobject: 'loop5' (000000002b0050e0): kobject_uevent_env [ 228.172566] kobject: 'loop5' (000000002b0050e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 228.178045] kobject: 'batman_adv': free name 13:16:15 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x0, 0x20000000}) [ 228.192794] kobject: 'rx-0' (00000000c8feed04): kobject_cleanup, parent 00000000085f9881 [ 228.204677] kobject: 'rx-0' (00000000c8feed04): auto cleanup 'remove' event [ 228.212349] kobject: 'rx-0' (00000000c8feed04): kobject_uevent_env [ 228.218800] kobject: 'rx-0' (00000000c8feed04): kobject_uevent_env: uevent_suppress caused the event to drop! [ 228.226726] kobject: 'loop1' (00000000930985a5): kobject_uevent_env [ 228.231747] kobject: 'rx-0' (00000000c8feed04): auto cleanup kobject_del 13:16:15 executing program 5: open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 13:16:15 executing program 3: write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCMBIC(r0, 0x5417, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000280)=""/246) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000100)=0x0) signalfd4(r1, &(0x7f00000004c0)={0x3}, 0x8, 0x800) io_cancel(r3, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x9, r0, &(0x7f0000000380)="c9ad4dde359b4ace6ccec5a47cce6089eee953448b68b70262c289a022728fcea5e69c45dc4b9fc26b25893be20caa83cc7b8bc72d5e5411419af7c6e8c243d1d2e52f59286559f81a25699ba773085227f1c4417cb4233a2afd4691d0dce06de06b52231caa0c86f75743a6d49fab5c4abb37e3a26b10fe806d4faf486efa2bccdadff93e715b3b1bfaca92f4f4688e559379a3a5abe9b3103aeecd747fe10fafd53042f21a0d3d08e9592f08c9cc423015b71eaa34b2c8961025f038135ad7b54391705f20a331ebe3", 0xca, 0x8, 0x0, 0x3}, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='net/sockstat\x00') ioctl$sock_SIOCOUTQ(r4, 0x5411, &(0x7f0000000480)) [ 228.245366] kobject: 'rx-0' (00000000c8feed04): calling ktype release [ 228.259906] kobject: 'loop1' (00000000930985a5): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 228.262538] kobject: 'rx-0': free name [ 228.275633] kobject: 'tx-0' (000000004abfe530): kobject_cleanup, parent 00000000085f9881 [ 228.287567] kobject: 'tx-0' (000000004abfe530): auto cleanup 'remove' event 13:16:15 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 13:16:15 executing program 0: write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCMBIC(r0, 0x5417, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000280)=""/246) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000100)=0x0) signalfd4(r1, &(0x7f00000004c0)={0x3}, 0x8, 0x800) io_cancel(r3, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x9, r0, &(0x7f0000000380)="c9ad4dde359b4ace6ccec5a47cce6089eee953448b68b70262c289a022728fcea5e69c45dc4b9fc26b25893be20caa83cc7b8bc72d5e5411419af7c6e8c243d1d2e52f59286559f81a25699ba773085227f1c4417cb4233a2afd4691d0dce06de06b52231caa0c86f75743a6d49fab5c4abb37e3a26b10fe806d4faf486efa2bccdadff93e715b3b1bfaca92f4f4688e559379a3a5abe9b3103aeecd747fe10fafd53042f21a0d3d08e9592f08c9cc423015b71eaa34b2c8961025f038135ad7b54391705f20a331ebe3", 0xca, 0x8, 0x0, 0x3}, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='net/sockstat\x00') ioctl$sock_SIOCOUTQ(r4, 0x5411, &(0x7f0000000480)) 13:16:15 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x0, 0x3f000000}) [ 228.296237] kobject: 'tx-0' (000000004abfe530): kobject_uevent_env [ 228.310337] kobject: 'loop4' (0000000081812151): kobject_uevent_env [ 228.322034] kobject: 'tx-0' (000000004abfe530): kobject_uevent_env: uevent_suppress caused the event to drop! [ 228.329558] kobject: 'loop4' (0000000081812151): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 228.353987] kobject: 'tx-0' (000000004abfe530): auto cleanup kobject_del [ 228.360591] kobject: 'loop5' (000000002b0050e0): kobject_uevent_env [ 228.365127] kobject: 'tx-0' (000000004abfe530): calling ktype release [ 228.372025] kobject: 'loop5' (000000002b0050e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 228.376548] kobject: 'tx-0': free name [ 228.387707] kobject: 'queues' (00000000085f9881): kobject_cleanup, parent (null) [ 228.395210] kobject: 'loop3' (0000000094c62777): kobject_uevent_env [ 228.399675] kobject: 'queues' (00000000085f9881): calling ktype release [ 228.412330] kobject: 'queues' (00000000085f9881): kset_release [ 228.418670] kobject: 'queues': free name [ 228.422827] kobject: 'loop3' (0000000094c62777): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 228.423176] kobject: 'loop0' (00000000c6b58a22): kobject_uevent_env [ 228.435044] kobject: 'erspan0' (000000001c0e275e): kobject_uevent_env 13:16:16 executing program 2: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2400000002031f001cfffd940200000020200a000900010001ec00000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000010307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x5d5f80cc5264d36d) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000280)=""/91) 13:16:16 executing program 5: open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 13:16:16 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x0, 0x2000000000}) [ 228.445732] kobject: 'loop0' (00000000c6b58a22): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 228.455842] kobject: 'erspan0' (000000001c0e275e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 228.469638] kobject: 'loop1' (00000000930985a5): kobject_uevent_env [ 228.476181] kobject: 'loop1' (00000000930985a5): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 228.495303] kobject: 'loop5' (000000002b0050e0): kobject_uevent_env 13:16:16 executing program 3: write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCMBIC(r0, 0x5417, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000280)=""/246) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000100)=0x0) signalfd4(r1, &(0x7f00000004c0)={0x3}, 0x8, 0x800) io_cancel(r3, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x9, r0, &(0x7f0000000380)="c9ad4dde359b4ace6ccec5a47cce6089eee953448b68b70262c289a022728fcea5e69c45dc4b9fc26b25893be20caa83cc7b8bc72d5e5411419af7c6e8c243d1d2e52f59286559f81a25699ba773085227f1c4417cb4233a2afd4691d0dce06de06b52231caa0c86f75743a6d49fab5c4abb37e3a26b10fe806d4faf486efa2bccdadff93e715b3b1bfaca92f4f4688e559379a3a5abe9b3103aeecd747fe10fafd53042f21a0d3d08e9592f08c9cc423015b71eaa34b2c8961025f038135ad7b54391705f20a331ebe3", 0xca, 0x8, 0x0, 0x3}, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='net/sockstat\x00') ioctl$sock_SIOCOUTQ(r4, 0x5411, &(0x7f0000000480)) [ 228.501901] kobject: 'erspan0' (000000001c0e275e): kobject_cleanup, parent (null) [ 228.512954] kobject: 'erspan0' (000000001c0e275e): auto cleanup 'remove' event [ 228.538313] kobject: 'loop5' (000000002b0050e0): fill_kobj_path: path = '/devices/virtual/block/loop5' 13:16:16 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 13:16:16 executing program 5: open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 13:16:16 executing program 0: write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCMBIC(r0, 0x5417, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000280)=""/246) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000100)=0x0) signalfd4(r1, &(0x7f00000004c0)={0x3}, 0x8, 0x800) io_cancel(r3, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x9, r0, &(0x7f0000000380)="c9ad4dde359b4ace6ccec5a47cce6089eee953448b68b70262c289a022728fcea5e69c45dc4b9fc26b25893be20caa83cc7b8bc72d5e5411419af7c6e8c243d1d2e52f59286559f81a25699ba773085227f1c4417cb4233a2afd4691d0dce06de06b52231caa0c86f75743a6d49fab5c4abb37e3a26b10fe806d4faf486efa2bccdadff93e715b3b1bfaca92f4f4688e559379a3a5abe9b3103aeecd747fe10fafd53042f21a0d3d08e9592f08c9cc423015b71eaa34b2c8961025f038135ad7b54391705f20a331ebe3", 0xca, 0x8, 0x0, 0x3}, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) syz_open_procfs(0x0, &(0x7f0000000200)='net/sockstat\x00') 13:16:16 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x0, 0x200000000000000}) [ 228.540054] ptrace attach of "/root/syz-executor.2"[8715] was attempted by "/root/syz-executor.2"[8716] [ 228.549322] kobject: 'erspan0' (000000001c0e275e): kobject_uevent_env [ 228.580184] kobject: 'erspan0' (000000001c0e275e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 228.596893] kobject: 'loop0' (00000000c6b58a22): kobject_uevent_env 13:16:16 executing program 2: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2400000002031f001cfffd940200000020200a000900010001ec00000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000010307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x5d5f80cc5264d36d) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000280)=""/91) 13:16:16 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x0, 0x204000000000000}) 13:16:16 executing program 5: write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCMBIC(r0, 0x5417, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000280)=""/246) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000100)=0x0) signalfd4(r1, &(0x7f00000004c0)={0x3}, 0x8, 0x800) io_cancel(r3, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x9, r0, &(0x7f0000000380)="c9ad4dde359b4ace6ccec5a47cce6089eee953448b68b70262c289a022728fcea5e69c45dc4b9fc26b25893be20caa83cc7b8bc72d5e5411419af7c6e8c243d1d2e52f59286559f81a25699ba773085227f1c4417cb4233a2afd4691d0dce06de06b52231caa0c86f75743a6d49fab5c4abb37e3a26b10fe806d4faf486efa2bccdadff93e715b3b1bfaca92f4f4688e559379a3a5abe9b3103aeecd747fe10fafd53042f21a0d3d08e9592f08c9cc423015b71eaa34b2c8961025f038135ad7b54391705f20a331ebe3", 0xca, 0x8, 0x0, 0x3}, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='net/sockstat\x00') ioctl$sock_SIOCOUTQ(r4, 0x5411, &(0x7f0000000480)) [ 228.607193] kobject: 'loop0' (00000000c6b58a22): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 228.619495] kobject: 'erspan0' (000000001c0e275e): calling ktype release [ 228.628722] kobject: 'erspan0': free name [ 228.634469] kobject: 'loop4' (0000000081812151): kobject_uevent_env [ 228.642108] kobject: 'batman_adv' (00000000ed903d53): kobject_uevent_env 13:16:16 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 228.655863] kobject: 'loop4' (0000000081812151): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 228.658862] __nla_parse: 24 callbacks suppressed [ 228.658870] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 228.669112] kobject: 'loop3' (0000000094c62777): kobject_uevent_env [ 228.678766] kobject: 'batman_adv' (00000000ed903d53): kobject_uevent_env: filter function caused the event to drop! [ 228.681491] kobject: 'loop3' (0000000094c62777): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 228.694715] kobject: 'batman_adv' (00000000ed903d53): kobject_cleanup, parent (null) [ 228.721991] kobject: 'loop5' (000000002b0050e0): kobject_uevent_env [ 228.728543] kobject: 'loop5' (000000002b0050e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 228.738267] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 228.744227] kobject: 'batman_adv' (00000000ed903d53): calling ktype release 13:16:16 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 13:16:16 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x0, 0x3f00000000000000}) 13:16:16 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 228.753134] kobject: 'loop1' (00000000930985a5): kobject_uevent_env [ 228.765186] kobject: 'loop1' (00000000930985a5): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 228.773828] kobject: (00000000ed903d53): dynamic_kobj_release [ 228.775866] kobject: 'loop3' (0000000094c62777): kobject_uevent_env [ 228.793663] kobject: 'loop3' (0000000094c62777): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 228.798536] kobject: 'batman_adv': free name [ 228.810727] kobject: 'loop0' (00000000c6b58a22): kobject_uevent_env [ 228.818101] kobject: 'loop0' (00000000c6b58a22): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 228.828322] kobject: 'loop5' (000000002b0050e0): kobject_uevent_env [ 228.832126] kobject: 'rx-0' (0000000004525312): kobject_cleanup, parent 000000003eecd8dc [ 228.838109] kobject: 'loop5' (000000002b0050e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 228.853000] kobject: 'loop1' (00000000930985a5): kobject_uevent_env 13:16:16 executing program 3: write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCMBIC(r0, 0x5417, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000280)=""/246) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000100)=0x0) signalfd4(r1, &(0x7f00000004c0)={0x3}, 0x8, 0x800) io_cancel(r3, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x9, r0, &(0x7f0000000380)="c9ad4dde359b4ace6ccec5a47cce6089eee953448b68b70262c289a022728fcea5e69c45dc4b9fc26b25893be20caa83cc7b8bc72d5e5411419af7c6e8c243d1d2e52f59286559f81a25699ba773085227f1c4417cb4233a2afd4691d0dce06de06b52231caa0c86f75743a6d49fab5c4abb37e3a26b10fe806d4faf486efa2bccdadff93e715b3b1bfaca92f4f4688e559379a3a5abe9b3103aeecd747fe10fafd53042f21a0d3d08e9592f08c9cc423015b71eaa34b2c8961025f038135ad7b54391705f20a331ebe3", 0xca, 0x8, 0x0, 0x3}, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='net/sockstat\x00') ioctl$sock_SIOCOUTQ(r4, 0x5411, &(0x7f0000000480)) 13:16:16 executing program 0: write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCMBIC(r0, 0x5417, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000280)=""/246) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000100)=0x0) signalfd4(r1, &(0x7f00000004c0)={0x3}, 0x8, 0x800) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x9, r0, &(0x7f0000000380)="c9ad4dde359b4ace6ccec5a47cce6089eee953448b68b70262c289a022728fcea5e69c45dc4b9fc26b25893be20caa83cc7b8bc72d5e5411419af7c6e8c243d1d2e52f59286559f81a25699ba773085227f1c4417cb4233a2afd4691d0dce06de06b52231caa0c86f75743a6d49fab5c4abb37e3a26b10fe806d4faf486efa2bccdadff93e715b3b1bfaca92f4f4688e559379a3a5abe9b3103aeecd747fe10fafd53042f21a0d3d08e9592f08c9cc423015b71eaa34b2c8961025f038135ad7b54391705f20a331ebe3", 0xca, 0x8, 0x0, 0x3}, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/sockstat\x00') 13:16:16 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x0, 0x0, 0x2}) 13:16:16 executing program 5: write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCMBIC(r0, 0x5417, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000280)=""/246) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000100)=0x0) signalfd4(r1, &(0x7f00000004c0)={0x3}, 0x8, 0x800) io_cancel(r3, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x9, r0, &(0x7f0000000380)="c9ad4dde359b4ace6ccec5a47cce6089eee953448b68b70262c289a022728fcea5e69c45dc4b9fc26b25893be20caa83cc7b8bc72d5e5411419af7c6e8c243d1d2e52f59286559f81a25699ba773085227f1c4417cb4233a2afd4691d0dce06de06b52231caa0c86f75743a6d49fab5c4abb37e3a26b10fe806d4faf486efa2bccdadff93e715b3b1bfaca92f4f4688e559379a3a5abe9b3103aeecd747fe10fafd53042f21a0d3d08e9592f08c9cc423015b71eaa34b2c8961025f038135ad7b54391705f20a331ebe3", 0xca, 0x8, 0x0, 0x3}, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='net/sockstat\x00') ioctl$sock_SIOCOUTQ(r4, 0x5411, &(0x7f0000000480)) [ 228.857395] kobject: 'rx-0' (0000000004525312): auto cleanup 'remove' event [ 228.867548] kobject: 'rx-0' (0000000004525312): kobject_uevent_env [ 228.869656] kobject: 'loop1' (00000000930985a5): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 228.879930] kobject: 'rx-0' (0000000004525312): kobject_uevent_env: uevent_suppress caused the event to drop! [ 228.883978] kobject: 'loop4' (0000000081812151): kobject_uevent_env 13:16:16 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 228.925410] kobject: 'loop4' (0000000081812151): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 228.930525] kobject: 'rx-0' (0000000004525312): auto cleanup kobject_del [ 228.942878] kobject: 'rx-0' (0000000004525312): calling ktype release [ 228.946042] kobject: 'loop3' (0000000094c62777): kobject_uevent_env [ 228.958057] kobject: 'loop3' (0000000094c62777): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 228.962788] kobject: 'rx-0': free name [ 228.971150] kobject: 'loop5' (000000002b0050e0): kobject_uevent_env [ 228.973357] kobject: 'tx-0' (00000000b8ae6400): kobject_cleanup, parent 000000003eecd8dc [ 228.983428] kobject: 'loop5' (000000002b0050e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 228.995689] kobject: 'tx-0' (00000000b8ae6400): auto cleanup 'remove' event [ 228.998870] kobject: 'loop1' (00000000930985a5): kobject_uevent_env [ 229.003230] kobject: 'tx-0' (00000000b8ae6400): kobject_uevent_env [ 229.011987] kobject: 'loop1' (00000000930985a5): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 229.016324] kobject: 'tx-0' (00000000b8ae6400): kobject_uevent_env: uevent_suppress caused the event to drop! [ 229.026316] kobject: 'loop0' (00000000c6b58a22): kobject_uevent_env [ 229.035933] kobject: 'tx-0' (00000000b8ae6400): auto cleanup kobject_del [ 229.045337] kobject: 'loop0' (00000000c6b58a22): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 229.049828] kobject: 'tx-0' (00000000b8ae6400): calling ktype release [ 229.062759] kobject: 'loop4' (0000000081812151): kobject_uevent_env [ 229.071910] kobject: 'loop4' (0000000081812151): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 229.075372] kobject: 'tx-0': free name [ 229.084164] kobject: 'loop5' (000000002b0050e0): kobject_uevent_env [ 229.091985] kobject: 'loop5' (000000002b0050e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 229.097178] kobject: 'queues' (000000003eecd8dc): kobject_cleanup, parent (null) [ 229.106352] kobject: 'loop3' (0000000094c62777): kobject_uevent_env [ 229.113105] kobject: 'queues' (000000003eecd8dc): calling ktype release [ 229.116543] kobject: 'loop3' (0000000094c62777): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 229.125586] kobject: 'queues' (000000003eecd8dc): kset_release [ 229.135511] kobject: 'loop1' (00000000930985a5): kobject_uevent_env [ 229.138876] kobject: 'queues': free name [ 229.147457] kobject: 'loop1' (00000000930985a5): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 229.150259] kobject: 'gretap0' (000000008e3f53a4): kobject_uevent_env [ 229.163435] kobject: 'loop1' (00000000930985a5): kobject_uevent_env [ 229.168635] kobject: 'gretap0' (000000008e3f53a4): kobject_uevent_env: uevent_suppress caused the event to drop! [ 229.179045] kobject: 'loop1' (00000000930985a5): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 229.192740] kobject: 'loop0' (00000000c6b58a22): kobject_uevent_env [ 229.201832] kobject: 'loop0' (00000000c6b58a22): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 229.212000] kobject: 'loop5' (000000002b0050e0): kobject_uevent_env 13:16:16 executing program 2: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2400000002031f001cfffd940200000020200a000900010001ec00000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000010307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x5d5f80cc5264d36d) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000280)=""/91) 13:16:16 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x0, 0x0, 0x204}) 13:16:16 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 13:16:16 executing program 0: write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCMBIC(r0, 0x5417, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000280)=""/246) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000100)) signalfd4(r1, &(0x7f00000004c0)={0x3}, 0x8, 0x800) syz_open_procfs(0x0, &(0x7f0000000200)='net/sockstat\x00') 13:16:16 executing program 5: write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCMBIC(r0, 0x5417, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000280)=""/246) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000100)=0x0) signalfd4(r1, &(0x7f00000004c0)={0x3}, 0x8, 0x800) io_cancel(r3, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x9, r0, &(0x7f0000000380)="c9ad4dde359b4ace6ccec5a47cce6089eee953448b68b70262c289a022728fcea5e69c45dc4b9fc26b25893be20caa83cc7b8bc72d5e5411419af7c6e8c243d1d2e52f59286559f81a25699ba773085227f1c4417cb4233a2afd4691d0dce06de06b52231caa0c86f75743a6d49fab5c4abb37e3a26b10fe806d4faf486efa2bccdadff93e715b3b1bfaca92f4f4688e559379a3a5abe9b3103aeecd747fe10fafd53042f21a0d3d08e9592f08c9cc423015b71eaa34b2c8961025f038135ad7b54391705f20a331ebe3", 0xca, 0x8, 0x0, 0x3}, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='net/sockstat\x00') ioctl$sock_SIOCOUTQ(r4, 0x5411, &(0x7f0000000480)) 13:16:16 executing program 3: write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCMBIC(r0, 0x5417, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000280)=""/246) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000100)=0x0) signalfd4(r1, &(0x7f00000004c0)={0x3}, 0x8, 0x800) io_cancel(r3, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x9, r0, &(0x7f0000000380)="c9ad4dde359b4ace6ccec5a47cce6089eee953448b68b70262c289a022728fcea5e69c45dc4b9fc26b25893be20caa83cc7b8bc72d5e5411419af7c6e8c243d1d2e52f59286559f81a25699ba773085227f1c4417cb4233a2afd4691d0dce06de06b52231caa0c86f75743a6d49fab5c4abb37e3a26b10fe806d4faf486efa2bccdadff93e715b3b1bfaca92f4f4688e559379a3a5abe9b3103aeecd747fe10fafd53042f21a0d3d08e9592f08c9cc423015b71eaa34b2c8961025f038135ad7b54391705f20a331ebe3", 0xca, 0x8, 0x0, 0x3}, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) syz_open_procfs(0x0, &(0x7f0000000200)='net/sockstat\x00') [ 229.218489] kobject: 'loop5' (000000002b0050e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 229.239215] kobject: 'gretap0' (000000008e3f53a4): kobject_cleanup, parent (null) [ 229.262070] kobject: 'loop3' (0000000094c62777): kobject_uevent_env [ 229.267878] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 13:16:16 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x0, 0x0, 0x402}) [ 229.268526] kobject: 'loop3' (0000000094c62777): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 229.268858] kobject: 'loop5' (000000002b0050e0): kobject_uevent_env [ 229.279483] kobject: 'gretap0' (000000008e3f53a4): auto cleanup 'remove' event [ 229.288978] kobject: 'loop5' (000000002b0050e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 229.308406] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 229.315432] kobject: 'loop3' (0000000094c62777): kobject_uevent_env 13:16:16 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 13:16:16 executing program 2: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2400000002031f001cfffd940200000020200a000900010001ec00000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000010307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x5d5f80cc5264d36d) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000280)=""/91) [ 229.325208] kobject: 'gretap0' (000000008e3f53a4): kobject_uevent_env [ 229.325356] kobject: 'loop3' (0000000094c62777): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 229.338154] ptrace attach of "/root/syz-executor.2"[8775] was attempted by "/root/syz-executor.2"[8776] [ 229.344385] kobject: 'loop1' (00000000930985a5): kobject_uevent_env [ 229.357400] kobject: 'loop1' (00000000930985a5): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 229.361071] kobject: 'gretap0' (000000008e3f53a4): kobject_uevent_env: uevent_suppress caused the event to drop! [ 229.391692] kobject: 'gretap0' (000000008e3f53a4): calling ktype release [ 229.392964] kobject: 'loop3' (0000000094c62777): kobject_uevent_env [ 229.398869] kobject: 'gretap0': free name [ 229.414472] kobject: 'rx-0' (00000000794b7246): kobject_cleanup, parent 00000000bb824f22 [ 229.417299] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 229.424786] kobject: 'rx-0' (00000000794b7246): auto cleanup 'remove' event 13:16:17 executing program 3: write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCMBIC(r0, 0x5417, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000280)=""/246) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000100)=0x0) signalfd4(r1, &(0x7f00000004c0)={0x3}, 0x8, 0x800) io_cancel(r3, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x9, r0, &(0x7f0000000380)="c9ad4dde359b4ace6ccec5a47cce6089eee953448b68b70262c289a022728fcea5e69c45dc4b9fc26b25893be20caa83cc7b8bc72d5e5411419af7c6e8c243d1d2e52f59286559f81a25699ba773085227f1c4417cb4233a2afd4691d0dce06de06b52231caa0c86f75743a6d49fab5c4abb37e3a26b10fe806d4faf486efa2bccdadff93e715b3b1bfaca92f4f4688e559379a3a5abe9b3103aeecd747fe10fafd53042f21a0d3d08e9592f08c9cc423015b71eaa34b2c8961025f038135ad7b54391705f20a331ebe3", 0xca, 0x8, 0x0, 0x3}, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) 13:16:17 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x0, 0x0, 0x3f00}) [ 229.438757] kobject: 'rx-0' (00000000794b7246): kobject_uevent_env [ 229.445533] kobject: 'rx-0' (00000000794b7246): kobject_uevent_env: uevent_suppress caused the event to drop! [ 229.455969] kobject: 'rx-0' (00000000794b7246): auto cleanup kobject_del [ 229.467405] kobject: 'rx-0' (00000000794b7246): calling ktype release [ 229.472239] kobject: 'loop3' (0000000094c62777): fill_kobj_path: path = '/devices/virtual/block/loop3' 13:16:17 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 229.496657] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 229.498327] kobject: 'rx-0': free name [ 229.509917] kobject: 'loop5' (000000002b0050e0): kobject_uevent_env [ 229.514167] kobject: 'tx-0' (00000000c7586ef2): kobject_cleanup, parent 00000000bb824f22 [ 229.516377] kobject: 'loop5' (000000002b0050e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 229.526031] kobject: 'tx-0' (00000000c7586ef2): auto cleanup 'remove' event 13:16:17 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x0, 0x0, 0x2000000}) 13:16:17 executing program 0: write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCMBIC(r0, 0x5417, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000280)=""/246) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000100)) syz_open_procfs(0x0, &(0x7f0000000200)='net/sockstat\x00') [ 229.546768] kobject: 'loop0' (00000000c6b58a22): kobject_uevent_env [ 229.549377] kobject: 'tx-0' (00000000c7586ef2): kobject_uevent_env [ 229.561693] kobject: 'tx-0' (00000000c7586ef2): kobject_uevent_env: uevent_suppress caused the event to drop! [ 229.567513] kobject: 'loop0' (00000000c6b58a22): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 229.590907] kobject: 'loop1' (00000000930985a5): kobject_uevent_env [ 229.597768] kobject: 'loop1' (00000000930985a5): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 229.608421] kobject: 'tx-0' (00000000c7586ef2): auto cleanup kobject_del [ 229.611349] kobject: 'loop5' (000000002b0050e0): kobject_uevent_env [ 229.624908] kobject: 'loop5' (000000002b0050e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 229.627175] kobject: 'tx-0' (00000000c7586ef2): calling ktype release [ 229.635428] kobject: 'loop1' (00000000930985a5): kobject_uevent_env 13:16:17 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x0, 0x0, 0x2040000}) 13:16:17 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 229.650038] kobject: 'tx-0': free name [ 229.652291] kobject: 'loop1' (00000000930985a5): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 229.664988] kobject: 'loop2' (00000000821c314e): kobject_uevent_env [ 229.672923] kobject: 'queues' (00000000bb824f22): kobject_cleanup, parent (null) [ 229.684512] kobject: 'loop2' (00000000821c314e): fill_kobj_path: path = '/devices/virtual/block/loop2' 13:16:17 executing program 5: write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCMBIC(r0, 0x5417, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000280)=""/246) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000100)=0x0) signalfd4(r1, &(0x7f00000004c0)={0x3}, 0x8, 0x800) io_cancel(r3, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x9, r0, &(0x7f0000000380)="c9ad4dde359b4ace6ccec5a47cce6089eee953448b68b70262c289a022728fcea5e69c45dc4b9fc26b25893be20caa83cc7b8bc72d5e5411419af7c6e8c243d1d2e52f59286559f81a25699ba773085227f1c4417cb4233a2afd4691d0dce06de06b52231caa0c86f75743a6d49fab5c4abb37e3a26b10fe806d4faf486efa2bccdadff93e715b3b1bfaca92f4f4688e559379a3a5abe9b3103aeecd747fe10fafd53042f21a0d3d08e9592f08c9cc423015b71eaa34b2c8961025f038135ad7b54391705f20a331ebe3", 0xca, 0x8, 0x0, 0x3}, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) syz_open_procfs(0x0, &(0x7f0000000200)='net/sockstat\x00') 13:16:17 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 13:16:17 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x0, 0x0, 0x20000000}) [ 229.692078] kobject: 'queues' (00000000bb824f22): calling ktype release [ 229.716907] kobject: 'loop3' (0000000094c62777): kobject_uevent_env [ 229.722571] kobject: 'queues' (00000000bb824f22): kset_release [ 229.735292] kobject: 'queues': free name [ 229.738476] kobject: 'loop3' (0000000094c62777): fill_kobj_path: path = '/devices/virtual/block/loop3' 13:16:17 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 229.744223] kobject: 'gre0' (000000003a99ccc9): kobject_uevent_env [ 229.755184] kobject: 'loop5' (000000002b0050e0): kobject_uevent_env [ 229.770538] kobject: 'loop5' (000000002b0050e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 229.773846] kobject: 'gre0' (000000003a99ccc9): kobject_uevent_env: uevent_suppress caused the event to drop! [ 229.787016] kobject: 'loop0' (00000000c6b58a22): kobject_uevent_env 13:16:17 executing program 2: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2400000002031f001cfffd940200000020200a000900010001ec00000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000010307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x5d5f80cc5264d36d) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000280)=""/91) 13:16:17 executing program 3: write$P9_RVERSION