[ 85.334010][ T27] audit: type=1400 audit(1577469161.087:38): avc: denied { watch } for pid=9740 comm="restorecond" path="/etc/selinux/restorecond.conf" dev="sda1" ino=2232 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [ 85.554526][ T27] audit: type=1800 audit(1577469161.317:39): pid=9647 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 85.576129][ T27] audit: type=1800 audit(1577469161.317:40): pid=9647 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 [ 86.302197][ T27] audit: type=1400 audit(1577469162.067:41): avc: denied { map } for pid=9826 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.14' (ECDSA) to the list of known hosts. 2019/12/27 17:52:48 fuzzer started syzkaller login: [ 92.857113][ T27] audit: type=1400 audit(1577469168.617:42): avc: denied { map } for pid=9835 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/12/27 17:52:50 dialing manager at 10.128.0.26:40769 2019/12/27 17:52:50 syscalls: 2708 2019/12/27 17:52:50 code coverage: enabled 2019/12/27 17:52:50 comparison tracing: enabled 2019/12/27 17:52:50 extra coverage: enabled 2019/12/27 17:52:50 setuid sandbox: enabled 2019/12/27 17:52:50 namespace sandbox: enabled 2019/12/27 17:52:50 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/27 17:52:50 fault injection: enabled 2019/12/27 17:52:50 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/27 17:52:50 net packet injection: enabled 2019/12/27 17:52:50 net device setup: enabled 2019/12/27 17:52:50 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/12/27 17:52:50 devlink PCI setup: PCI device 0000:00:10.0 is not available 17:56:11 executing program 0: write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000000)={0x43, 0x9, 0x2, {0x200, 0x197d, 0x5, 0x7, 0x800, 0x1000, 0x7, 0x6, 0x9}}, 0x43) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000100)={0x4, 0x3, 0x0, 0x0, r0}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcsa\x00', 0xa2080, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000180)={0x7fffffff, 0x1c, [0x1, 0x3, 0xfffffe00, 0x9, 0x0, 0x2, 0x5]}) write$cgroup_subtree(r1, &(0x7f00000001c0)={[{0x2b, 'cpu'}, {0x2b, 'rdma'}, {0x2d, 'cpu'}, {0x2d, 'memory'}, {0x2d, 'memory'}, {0x2d, 'cpu'}, {0x2d, 'io'}]}, 0x29) ioctl$DRM_IOCTL_FREE_BUFS(r1, 0x4010641a, &(0x7f0000000240)={0x4, &(0x7f0000000200)=[0xda59, 0x0, 0x9, 0x1f]}) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000280)) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x10000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r2, 0xc0385720, &(0x7f0000000300)) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x1000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f, 0x17}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000400)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x659, @empty, 0x8}, r4}}, 0x30) ioctl$TIOCL_GETMOUSEREPORTING(r1, 0x541c, &(0x7f0000000440)) pivot_root(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00') r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000500)='/dev/audio\x00', 0x100, 0x0) fcntl$setsig(r5, 0xa, 0x1) ptrace$setsig(0x4203, 0xffffffffffffffff, 0x2, &(0x7f0000000540)={0x1e, 0xff, 0xffffffff}) ptrace$setregs(0xd, r0, 0x3, &(0x7f00000005c0)="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") ioctl$SIOCSIFMTU(r3, 0x8922, &(0x7f00000015c0)={'rose0\x00', 0x65b}) r6 = syz_init_net_socket$ax25(0x3, 0x3, 0xca) setsockopt(r6, 0xffffffff, 0x1cf5, &(0x7f0000001600)="e733af9871c859f7a4f9480496eaf11f84573b0d02eb75fac361dce190d63cadaa09613c792d38408ccccf6e7ad1bbe0483ef9606414e7e6eadb188e284a4fe0e54951c03d917423c5de86cd11fab0a693e0371c41959495e6f998881187c4d95894d53fab2f14ce51c0e91537ce63c4e61d2b3ae0f5df903262d45d0030100687bca8e9c7185f2206863ab40d59e652346894f95e133961d2fae00fbf14470d00c34ee3e283f6f8e696f557c262e7e796c03bd895ac7dce40fdd3d7e3c0a045f4357e34133d1a39928509709c9b39f745ef847fde464294d743479ad7f2e803cb46d844eea924eac4472cfc33f63a3d8d8ce217c3a2c8e84e2c05654556414eb2f788d2b0499ab5d5d3ab2ccad56227fc6fb0bfe2197bad444d5bfdb07f2df1f4441ae417d5fdb92c5e7ccb0225e18c002591afdcee09e1498f910ee22a1ed25860d102bd572bc6f149c9e8866bf349c6b6fab1a62b6dd707d459fa49ad1b77ddccd84f965f8b09195df8d0f570d7b2202262b8f21a8fdaebdb841d22921dbfe79953a7d548ea893b1aa6f190b5165d33cdbfa81d2aaecb8062b10be1c9c390837c78bf8232947fcacb8d46366ac4a9f158aa58ea70239cdb7b805d02c97c41ce41427c89a39be7565b4c92e63524bca1201269eb8ace42331911dc5e06f970e67106c4edaaa3d22b97a0a8293f178f5e27b1098d070d713a4835c14072c0d58d062c7c66a01cd4e8b83f8bba7e12ecd53d79331c9052cc80a39741488449a6542eb96adf1b238efbfcec347b26a30ac82d7f754dd028e822a0fbf1d0191512cbc312f8d34d4543c0b6fea23c94cb2c98b65e680724112d9189ea924c2576db7d754f6c7aff2312d14fd9f0e53acda0ce18d9da3a0c5a4e6bf63e88a7311e82bb825fdce52b5a1ba6ba4afeeedd7265fee1fab8bbbd2fd56553a8ce3cdf96fca6848efc3a914e74a9072fc20591705671ba99ba5517c87a7862549ecdfb431d3ec6975587fe3e745dc491b72b668e635ffa7b22716934cd492ab84cc3f63cac784909da824aacd5c86ece1e3544582dd97a6b65d8260b75cd0ba75fbd714d1852ad0a938c84fff3072f9ff723275a5795c9dfc228e36e5cd1bb90224b5ac4062254728c7037cae4518a1433dc827b8f95d9ae98b021affbd24297c327642a6f50a0716d1e71bbed2f4e9d2ee70a57a39eaddad69b9c369370c61c43f97ee27e2321890fb2a2d9e7013cb6b568af4c734a2d353185f5ad67602c4d8a70122cc2e4e8fdf0b037c687ade8c140ad88be1fa84d313ccaef0da4aa38c92d280cb0cbc6cfe4b70fe683201e2e3c2f3a2f285db2a1363428a86956490302787021094d234909301ae021e1d77133490fa5ae6440a17e8a6f16d82a50e1e1b349482576fcb2a1516b5cf36fe8f01c4902d9546f7a38f2260531162d37797ab0e8f9d5dcaa523aee986ca6d6405a51ddc9821b3e70fc05f404af21da6e888ca2c1a0692998d7456866c4cbc4b71d4e76586f16652635bd5d173f79fdfe6366723ad5f261009c9d9b4353f4da9372ebc1033ff3889601a9ff752be3f536650fdda1a8e0e4a9cb2a4076b7701e4baf51d6c20b6bb8bb9c54a5a0056e5a8b987dfe39b256a0a20397144ca984a8644c61c9b1141cf4ef645e4bc1d920e827a9d9925ac39b89e2bb4605890f32ce5ba8da05c1f43848822538ebdb211315a909c18954b10aa5d2010db0344bba3aa622f4e7b33ec1d766fc24443d742f8cd715f9db7b2e2869e69f7d64b5ca317fe59adfcf90bcae2457f76a5c0e9a3158c390be582898d5faf408342cb853a5c034673c8042584f4697440c900560e61f3895f91fd90d9f5a0507528df243237f9fff40b7084f03c82413f9b7d29a9114ef706a116d941c8faf2f0f40a8c414426ccc819cb69303ccdc6c0276c14fc9c1e63ad2a83350574635a0953684741eeb24d65d3305fcff75ae888d5224e41442dadbd29c3186118d0c2e29c5dd6aeac0e49fcc5a80b441ec79509c4735fca557ebfc0f882ddb836c9461d27dbc7cc75036c4d8c09db1663937bc91e1a1bfa2a29477ecd484a4725c6a0b34ea8db50915515fbe2938a12455d3073392a6e2b31b66f3ac64f9df00a5c064edd57b03fbdc749956a7643a4dd0b718dc4853c26edcb8aec708dc418875f33cae7a4392bb5086ffc0f98751f6889b2a3d5dd521aaeec336e0aca14ba67290a17526712642be906cdf09c58771dffb8391c1a3cb6d746180b28a002ec6007ac5656513c50979040bba6cebc10396c7a2561471bef14cbce67d69958c6fae1e175a9ae268250a1c37189c2a4e8ec8433b949ae5a64f8d73b0781ed46e25974df3f1f316efa9cc6028512a0c47ec38c2ca8c40055767e8234b11062f7316428817ebdf9b29d738c9d6bd12c82164196e3e6147a8a071fdb546a279687d96100461fd079912deee51e54eaedfef5c2ef8beb1d4f0fc0f94adcf5df8db8e42c6596b1c7f3b2b8a1767c8bc5d7815d4ef0a1eafaeaf9beb23864e2bb16bffc3308bfd1d65588690ca8593b489fd15890a9a2b278a9c57a76459478815aa92f7c88aa9da71a9905b5011b81d93ea62230d6fb5e5b29ba0b31ad48a475a37edf1577f79e8478cd54b530f41504346ae521ef7e52273ff451ecc0ac363e205c0bcf79efccf0f68177e25b4f866bfc2e5d207f32ba760fac9875e9f1557f1a9caa893d095c886dd0925ee8db368816ed73649ab46aac38ea804983dca3abfbf28d79b67d10b34041999d4b5a4e7c89a333ff2ae8b8dad2e64ebbd729b7ff0621f679ab90374e5bcc78b96d3137aa77667f2449992b421ecad54b8c924827f35f07d695c21848e3edabdf4337929deac1d7abc17f5b3517ce08276137751e939fc826951dc9b6c2b76ec22e85e0ec962d138faed1cdebf25fa2825427167382d6f71f416ce16b53fa66cf9c41871c1b6cee8cbd0bd3b81545cabc243bd1c1773eb08e3715c8a61b6977d28b32a32ab9485bda8705bc23c0afbb20301d74a2d85ce23455aa5606606bb95a5cccbbdeb34fb485822dc5aa4301205425c94a5070a685763a9685118873d8817ca7e1f1c791baaa41761576c524b7e876f403d68af35d8b10f10acbe89972209a4f7362580c3bf9f3ebee67cf2f56655ba320e7d540ae15e0909257015536e07f58b38aa3ff1e8aad54d9e5a8c0b55fe464b324e159bff3f378a86cb10967ab4e11b4f8fc721293f33e86189e6a6c2e03f45805951c35f03d302d44f7b53194b4dd189190b9d15f0a7b224440c9d73a1688ad87746f8e23d5cea2478d103e87a0a902046288a9d69b2c7a306b24e3a19c922104d4ff9954137ec3d77acde73128a001b952d47da1202200b3afda1ba0376dfdb9dab58b549a58dc11ac39ac53796b66047420fd9bd718230fdbdad1fefed54e0677e2cc4d201fd4d03348c6216fa7a288f6a2e75c6188e1becb93a575ca112d957096b73291e00a9e3429e9f8dc8c08384160253cf963284ac03a7642ccc07da3be63cbb5e9c0dcd4e93711b1a4e21f2d0622711d589b16a20399cb20d1d4c7de175e885b83f9ed47c64b1fae2b1afcca1264ce5aa86e24e1473142fb77e1bda0eb89ebd91113e1c66a37f7b7885270e1a8d91b50e8e61b003b366108ce7ccc2ec397237cef41c98e00c973346b4e3324ede383d7bcf100b112625bbb29e8d105537a5f3fa8b3756e2e06f426e93f200bd6bcab5ac36eb3eb9582e55878adcea5591afb02bef9e8c36b0e9c3a36285a83e6fe353a266844de615ebc008a9feef8eb7b403ef8c87376fa32aa7e4075e16973666f894903c7ea25fdf4ea6d417919b7a7211e723a3f0d18337630b86d4be6edcc713e385e13db3def4a1a06412ed09533a47ad75f7998a67994c30f88af30f362f94dd3af6b1fe6199b477aff328fd39ba8aba3ddbcaf15dc1b47d8c3c69f6fd1f8d9c1a960a26c7e2396922ef177cd6fefdf5bb33a0d7ac961dd3afb4415bd1773efb4ff8bb0f5b0ad535aa93a463246ef0bf18b4d1c556226d05171f7701de211c0d1b927724ec61957a92e73147eadd78750555db1ca7a0da9dceee1cd77760e526e3edc03c89a35082b4144c5280cbce89af0b3ab90c717aa25914f5f5f2a6a058dd13e298d4248b2c2e3afcef375121af8d8bfc1eeafd65cb98c9441718551db5b6308eeabedd44700618ac6590cba72f81cdb42a81d3f2d9a6f0adbee3558513072fddee733e3ad9ea627169c69211b97147fb004ea42c3857c55a2f182cf8b92fa5f4563787893a85d8f1713bfa0295da88fae68ac4b0aff2d783932baf81a24959c8832bb41e568f659373617049ac9dc37a4cc4676f0129a6732e7e29ce93273fdfa47f10c3eada89ef27978cd6da091d464f81772523579c64078a36437a7182d40b6209308b529401ece963d95cabf00edbd6e64347295f885793cf88ff5753694e31d65858b8a9fcd57634f1f665005364bb041bd6a9c22fd9e436d95dea5f0eed201cfd626e1b012e672a75947576f4ef2f076b40106088db2874ccf0bf999c2244a6b00458a81f7cbd0b4fa9ed0d126f5a004cd76307d517304578de1ac0860c59d65b7cb590453e6e948174b194668ed736e29c5f93a1e04d1935773ebe2d10eb0eacd536465311e31b1c844067159780de6b90989b7027d7338f92d2582a5ac5d96a85c68473fe053c96a446392a4cbb8ebfa42a4ed3703a7553ce8dda7659416607d31417afc668c6d6438bc0c9463ecc41bb74cd9826562c6910d1bb1ca8e936eed4167f999dc115f181553b7332cd1686bcc7bb8bff0b7700f4f3b617d6bd0f50663641dc5e5690c44332f82b15e54eaa070df904ce4db43041ee2010ae6e9139c66a4e265348d4f6f211bc2565108e221582e61cdf5084389127ec9ae050c581fd2742a772b8a0e9d1459ab544c31e437ff2758096dca2323296ad499b12aa8300ecaf5956e2fece27ea547a937dd478b491ab8538e50eed5f88942d3ab2636310d75b82d8326ec9c2023bdd170e51d9459f7b5e6c6601d1d3b4cf51d375c54f72a9450100f37e63115f8783ab2eb8b31075744356538a509ed323289d8bf568aa079cb899024b2ec41588dbc4fd6d9f5f996e47c7f3607f05e97f1701cec706c693663fd42058c24498cba1a66c99e5e1ab9913c44c42b83ada1ebf9fe6eb6c16215b2eed6f54239db76d03dc3d2c117a0caa6f5a872424ec82119cab26a8398591fd219b5b238e395f3570912593b49063ce55b08a8c4e6774e6c7886e401975aa83d2064329e0e48136c870c6940cab5daf993b4241a04125afe9e61b1b77fc28ef4af6cace999733e911059f2e802cc31b893e8dbc5cb987f8429ab07b36e7d092d9ec635ba362d57c835d411da373705f36aa4dfe5f885b9f5e22bdbf5632eebef71b78b6abbee0c73eabd3c19cb27a7f5d31466c5d7dd1e693dd81893569a1bbb2b1ebd4ff02323ab1ffd46d92c83ea87d06b337c36c834399c7d2aa42d6a6ed802be20fe5c06cfe1798e039589f62038d1607b0eb959dc3256780d71fac651f971801e3e7fe74056a7a2ea6909765f5cc6962c223b0782dc6444245002591bb70d8205d68b0ad4b58db776763ad53292377c8c5335ff47bde59c71468ca10fd6c17c57b0ea4a2e818959ef5fce1303583de7d431dd39a980d857f17fa43ec390ef0cc0784d23951c5ce35c52384f62dbd97aafb0f88b843988096d9f4ea7ae96ed11283ae6e75ad5e5229d290b8cdec7129709becca4f6f5dd422c31bcbb518d2ef4b36d0a4", 0x1000) r7 = syz_open_dev$audion(&(0x7f0000002600)='/dev/audio#\x00', 0x6, 0x553201) ioctl$TCSETS(r7, 0x5402, &(0x7f0000002640)={0x6, 0x7fff, 0x8, 0x4, 0xf, "a818acf0e1510459e62cb3e29a8fbed18c5d2f"}) r8 = dup3(0xffffffffffffffff, r3, 0x180000) ioctl$UFFDIO_API(r8, 0xc018aa3f, &(0x7f0000002680)={0xaa, 0x4}) r9 = dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000026c0)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r9, &(0x7f0000002740)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x6}, {0xa, 0x4e24, 0x0, @local, 0x83}, r10, 0x3}}, 0x48) socket$nl_route(0x10, 0x3, 0x0) [ 295.669458][ T27] audit: type=1400 audit(1577469371.427:43): avc: denied { map } for pid=9850 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1038 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 17:56:11 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400, 0x0) ioctl$SG_GET_LOW_DMA(r0, 0x227a, &(0x7f0000000040)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x101840, 0x0) ioctl$UI_DEV_DESTROY(r1, 0x5502) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000100)={0x8, &(0x7f00000000c0)=[{0xff, 0xc4, 0xfc, 0x80000001}, {0x6, 0x4, 0x1, 0xd}, {0x0, 0x0, 0xeb, 0x7}, {0x5254, 0xab, 0x2, 0x8cb2}, {0x3, 0x0, 0x7f, 0x2}, {0x2, 0xff, 0x6, 0x7}, {0x8000, 0x8, 0x81, 0x10000}, {0x6, 0x0, 0x40, 0x101}]}) sync_file_range(r2, 0x7, 0x7fff, 0x4) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$KVM_GET_API_VERSION(r3, 0xae00, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(0xffffffffffffffff, 0x8108551b, &(0x7f0000000180)={0x9, 0x1, "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"}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r4, 0x6) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/checkreqprot\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000340)={0x3, 0x3, 0x8000, 0x2, 0x7, 0xe4a, 0xfffffff8, 0x3, 0x0}, &(0x7f0000000380)=0x20) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f00000003c0)={r6, 0xd2, "65346861b5337b3d2975f8237bcdfd8a6efd84a77dfe6b399e22c25e02d228c67e926ab60108e62d32b4a67f11644e221cee301e0ff82beb9b6305736e07bd2b7eaa8b63be2795c72bd93ba4e749df1962aa79abb5b4b1a758a065dfd852875a5ccc98a991c3f22a24ec47d9d785452fe0d472bf7ce9407f2908e32372dd719e2ce4dc64e1073d38f1d1d936e84cfce48ce4e6031cb6f61a80b9d4ee48fc567a5ef97b975a50048c96e19fba032bbb99b39d492d41b7df45149de0fd5b93dfaa8aca313215d024f2297cfb8e581f5c5214c7"}, &(0x7f00000004c0)=0xda) openat$cgroup_procs(r5, &(0x7f0000000500)='cgroup.threads\x00', 0x2, 0x0) creat(&(0x7f0000000540)='./file0\x00', 0x8) getsockname$ax25(r4, &(0x7f0000000580)={{0x3, @bcast}, [@null, @rose, @netrom, @remote, @remote, @null, @rose, @rose]}, &(0x7f0000000600)=0x48) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000640)={0x7fffffff, 0x7, 0x9, 0x8}) syz_open_dev$sndseq(&(0x7f0000000680)='/dev/snd/seq\x00', 0x0, 0x800) r7 = openat$ttynull(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ttynull\x00', 0x40000, 0x0) ioctl$KDGETMODE(r7, 0x4b3b, &(0x7f0000000700)) openat$vhci(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vhci\x00', 0x8004) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000780)='/dev/vcsu\x00', 0x80000, 0x0) r8 = socket$inet6_sctp(0xa, 0x934e7702fb25f7c4, 0x84) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r8, 0x84, 0x20, &(0x7f00000007c0), &(0x7f0000000800)=0x4) r9 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/mls\x00', 0x0, 0x0) ioctl$PPPIOCSPASS(r9, 0x40107447, &(0x7f00000008c0)={0x4, &(0x7f0000000880)=[{0x7, 0xd, 0x5, 0x3ff}, {0x5, 0xef, 0x3, 0x8}, {0x8000, 0x7, 0xe3, 0xff}, {0x100, 0x6, 0x81, 0x400}]}) r10 = dup2(r7, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x40082406, &(0x7f0000000900)='keyringmime_type#\'\x00') r11 = open(&(0x7f0000000940)='./file0\x00', 0x200004, 0x10) ioctl$FS_IOC_SETFLAGS(r11, 0x40086602, &(0x7f0000000980)=0x4) [ 295.934189][ T9851] IPVS: ftp: loaded support on port[0] = 21 17:56:11 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xe6ae78d44bdf2ef5, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getgid() write$P9_RGETATTR(r0, &(0x7f00000000c0)={0xa0, 0x19, 0x2, {0x340, {0x10, 0x1}, 0x1, r1, r2, 0x1, 0x6, 0x3, 0x6, 0x6, 0x293, 0x9, 0xffffffffffffffa8, 0x7fff, 0x9d2, 0x7fff, 0x5, 0x7e9, 0xf5, 0x9}}, 0xa0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000180)={0x0, 0x7b, "e216eaae92314cf5cc113ebb420625f5f700ffe88362ed2d70d903b7eeda756765a75d2859ab5f95e3a31ce84b3581ea8dfd0abcd67aee5d87ffeffed1ebb24e444e0032b3a5efacc3421c679467669263c9e7cc6cb6e7fb3746324e3039f097aa68033bcd2f789465c84dc08a6e25c39dc71ec900def2d1c2c94e"}, &(0x7f0000000240)=0x83) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000280)={r3, 0x8}, 0x8) r4 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/nvme-fabrics\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r4, 0x1, &(0x7f0000000300)={0x43, 0x6, 0x8, "99ba13a65bf5d62eba6cd8127f2d719302bca996a3242f3656526fcba9ae76d6852881c1b94da865c6ba86312242c662c73700911c95a33369e4ab295254af0dc598bb"}) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x6d0402, 0x0) fsconfig$FSCONFIG_SET_FLAG(r5, 0x0, &(0x7f00000003c0)='sync\x00', 0x0, 0x0) r6 = socket$inet6(0xa, 0x1, 0x5) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)=0x0) fcntl$lock(r6, 0x26, &(0x7f0000000440)={0x0, 0x0, 0x401, 0x9, r7}) getsockopt$inet_sctp_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000480)={r3, 0x3, 0xff, 0x3, 0x400, 0x20}, &(0x7f00000004c0)=0x14) fsetxattr(r4, &(0x7f0000000500)=@random={'system.', '/dev/vga_arbiter\x00'}, &(0x7f0000000540)='sync\x00', 0x5, 0x2) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000580)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='net/tcp6\x00') getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000680)={0x0, 0x5bf79952, 0x9, 0x2}, &(0x7f00000006c0)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r8, 0x84, 0x6f, &(0x7f0000000800)={r9, 0xd0, &(0x7f0000000700)=[@in={0x2, 0x4e21, @broadcast}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e23, 0x81, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8}, @in6={0xa, 0x4e23, 0x6543, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}, @in={0x2, 0x4e21, @broadcast}, @in={0x2, 0x4e20, @multicast1}, @in6={0xa, 0x4e21, 0x8001, @empty, 0x5}, @in6={0xa, 0x4e20, 0xd7, @remote, 0x5}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e21, @local}]}, &(0x7f0000000840)=0x10) r11 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000880)={0xffffffffffffffff}, 0xc) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r11, 0xc0406618, &(0x7f00000008c0)={{0x2, 0x0, @descriptor="fdf33c84a7a462fa"}}) lsetxattr$security_capability(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x8, 0x3}, {0x400, 0x4}]}, 0x14, 0x2) r12 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$USBDEVFS_DISCSIGNAL(r12, 0x8010550e, &(0x7f0000000b00)={0x1f, &(0x7f0000000a00)="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"}) r13 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/sequencer2\x00', 0x22000, 0x0) r14 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$kcm(r13, &(0x7f0000001600)={&(0x7f0000000b80)=@pppol2tpin6={0x18, 0x1, {0x0, r14, 0x1, 0x4, 0x4, 0x3, {0xa, 0x4e23, 0x11, @local, 0x5fe7}}}, 0x80, &(0x7f00000011c0)=[{&(0x7f0000000c00)="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", 0xfe}, {&(0x7f0000000d00)="fc8abfb5fa286806f773b26ab73084c02496e5fd9b595734254dabad6d7f45af9f0b1b96be3f7b44ea3917d77b3b308ea8d30ceb2072895bb422aced14e41c7fbf98ce2928fab298601ba8e0a1984868c7d70956c2d6f3f9fe92046427970ac060fa24eeadbade47244399846b8c7c3a921a6bcb", 0x74}, {&(0x7f0000000d80)="5aed15003a36dee08e40b3bb0d67abce2746685cba004463107f8bd43dfc5e503cb39bcd838762577be5441de68b03d0cc76f6d674a67abeb1d03c5053c869320f1c91afd760d33d64d2498c741aaf1791f3ae6a957ab4855df005", 0x5b}, {&(0x7f0000000e00)="45f719e5239abbc51892903254d5efaee116fa02a4b80793c98340687828b4ac2cfbbda9d096fc885561a6b0e9c77d909a30f0b1942eae47dac06d4520cd0fcbeeca553f2c7aea95d4bbcb9b2231a46dcfebe2a056eafeb695c869491af73d8bb5c5739bcee5911a5145d6c23a799b628ce6ed2e596d6c2e1773da81c84d89d192d12a29cde64e2c9f8562cf5343a2a9ea2d49e44f89394ab538f935437d4db04ee289d092", 0xa5}, {&(0x7f0000000ec0)="328dd815347cdce7f15015b8af7a5dcf0bdc75abb92733d7d9b3127dcc9bf13646026795202de8069df0cef0c908032f0b6d45ee04d3a8a9f931cdd9e7150ffc3c", 0x41}, {&(0x7f0000000f40)="615d853b6ceb342af1943f1d6d807e300524e92ff3bd77c14277546c93725f2723e1a8f851bf4d0f5cbaaf8d597f2efc20dcd5604b836467bad6a5ebee9a0a1a8acd4dd3421159639ea3c04e792a27bc97cf77ecc8f93e056332bfe23c88dafe7c207de9489189f07765", 0x6a}, {&(0x7f0000000fc0)="25ff0f6b5c4f0c8166764d174ac1c40d89f99f93939c6abf71768020c00b7e346a9f814d6a9acb53a600fa1c734862c88c7064417e48b23a99c99edb389d7eb060a9f9b451defb001e529690fcf7b98f65d80550da3c8d2b92cdc2e86ab75871c135ab22209d4f704d0537649c8e42ec8b9c0d79e3502d8a72132e25ac3d8a7fafca3f9f77efbff997ef61f42e2f9b39cbce3f12f2806288405611736b809b7976bb76d52c503e96c7d94a2b2ccb1efefcc032ec138c94fd1a04df1efc7899cfa4f2ebfb60dd06488d", 0xc9}, {&(0x7f00000010c0)="df4212e4d465731a0667d93117f95b3e2e7c1fa99f6b476add95b705512dea137603948cddfd70490bea26045aedec70f9ad73689a79e0800dc6c3e16177ac8b322ad139595853e45a0a30237c681b061fde8a484ef172c8473fc9657d1b47161d4960e0da1b8949cbfb34fc44579528cbba232335d290315149367c8fd8f618c5cd723a7cfccb2a59beaee7e3bea9808eb28c82f9aff3fc8e66f1529e2d9ba77984099d47836f24bd8229365e7b5ea5d1caa6b6c60d645b03b4e3ffb49be11473d8dd0fe17f1e834121d9ec437b3eea2e79e5d3330011bd60a2cf44", 0xdc}], 0x8, &(0x7f0000001240)=[{0xc8, 0x109, 0x7, "13418fac7f88c589fcd7fa73a87a591fea66481098d07a0f33be9b373a1318e4667bf7177d3cf1df0f4d7f2ac36946c2b0610afef1e0704d2bb948050acca4ef1902a23a7c1f7f529371140a0e0295323bdde47b1b2f64c46540e6c8c19cc1290517822f71d3673bc084516756782fbabb55b387e423f1ab0acd2552687c3f151b81dabfe0baead66bc38b0797b359c0b7c32e3b4abac7e8aef7acfd334eb1af3a91c8057f505bd16d9798398b6728796640"}, {0x90, 0x108, 0x6, "98428699f82563c81f4e5cb2f8b8743dc9d0dabf89d6cf375897d2ed349233262b4ee2a4b5ee7cc8527719b1f2893db8db346f623d21f83ed90b3ae2e7084aab3950ecfaedce6211d4f95305e71e745dfdae119002848e94e3e42453cbe8639781225daa4d74d85c3ebe7cb899b36d6677d98b07a36012e678726b"}, {0xb8, 0x103, 0xfd, "6110644cf1e8a42f047ce0f8f42eb0c97b85a74c4a70916ed43cfb1622c738f8e85a3a2bdc5d35e5d8b3bdfd9f2f4ea4f5184eb3a94da559b6da707f9793ec6dade322526dcab46c909ad359d5cd20d308aaf430ee6bf8a08878e0bf43e7bb1d1b27bab3745b169125ddb45b77721bf33fb20a8386a2a6f0f08c6fc233aa89bc7d7937f5d1cc9b0f07ee6089c6625ea37f0f356ba512d99290c7129cd5f3851a26cc"}, {0x90, 0x104, 0xa633, "55be6a3de7242c053a84058e2e102405b7e75a99ed6f6a02f99e35de52eb406c8fad7b73d70e8566f7cd226c94ba38e20af288b6eff981af70fcdd25118d4c29743d52325595a995ed85fa1aace18fa38e2463a0e4064e7d185f2736fe966a4ab34a5df3f8a410f6bcf56f930c36bd5c49044a3049226b05164e961a0089"}, {0x110, 0x31c, 0x8001, "9eeb5e8e54707d2613ba775c3ec373d76f5b4f282946c45f7f02af8b0e13fa21cb37394a8b7e19b541de52c19fdd618ef54a64131946430af30e4669bc2a7e895d11a1a16ae2009ef1ee77832e76a4483d1d8339fa0cd7689de02a4320d3539922c164e194691184bd55fc54680cdabda338fda61a3baa7ebc6591a1ac7ef46e2682368dda9cedae85e69a3c25cfd7784f098cde092e6c9082c32fc8a8e2f56a896f3ba2c576eb822da8dabfde81db000a157beb570424dfd3627021f45c58cedacd7d995f4588ec51f9b6694b2124cdf87c1ead9e62db17196ef36b06009591c451402e299dfc3185038738ab416875616b874f358ee31209"}], 0x3b0}, 0x4000800) r15 = syz_open_dev$sndctrl(&(0x7f0000001640)='/dev/snd/controlC#\x00', 0x17c, 0x2000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r15, 0xc0096616, &(0x7f0000001680)={0x1, [0x0]}) r16 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/nvme-fabrics\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000001700)={0x3, 0x6, 0x200, 0x62c2, 0x8001, 0xff, 0x7ff, 0x1, r10}, &(0x7f0000001740)=0x20) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r16, 0x84, 0x72, &(0x7f0000001780)={r17, 0xff, 0x3fc0d9e32c9d349d}, 0xc) [ 296.098771][ T9851] chnl_net:caif_netlink_parms(): no params data found [ 296.142724][ T9854] IPVS: ftp: loaded support on port[0] = 21 [ 296.269414][ T9851] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.291946][ T9851] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.300266][ T9851] device bridge_slave_0 entered promiscuous mode [ 296.323999][ T9856] IPVS: ftp: loaded support on port[0] = 21 [ 296.337721][ T9851] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.345288][ T9851] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.361849][ T9851] device bridge_slave_1 entered promiscuous mode 17:56:12 executing program 3: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0xb78a0745398ce450, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req={0x7fffffff, 0x1, 0x3}, 0x10) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req={0x3, 0x6, 0x2, 0x69}, 0x10) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000140)={0x0, 0x401, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000100)={0x990a68, 0x9, [], @string=&(0x7f00000000c0)=0x6}}) io_uring_enter(r1, 0x10001, 0xfffff000, 0x1, &(0x7f0000000180)={0x47d}, 0x8) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000002, 0x90030, r2, 0x0) getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)=0x0) setfsuid(r3) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0x820, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000300)) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000340)='/dev/video37\x00', 0x2, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x9, 0x20000) fsync(r5) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000440)={{0x4, 0x4, 0x80000001, 0xb02, 'syz0\x00', 0x8a11}, 0x0, 0x562273b20d8fa65e, 0x9, 0x0, 0x5, 0x9, 'syz0\x00', &(0x7f00000003c0)=['/dev/loop#\x00', 'mime_typewlan0lselinux\x00', '/dev/btrfs-control\x00', '\'self*', '/dev/loop#\x00'], 0x46, [], [0x9, 0x1441, 0x1c92, 0x9]}) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ubi_ctrl\x00', 0x100, 0x0) ftruncate(r6, 0xfffffffffffffff7) r7 = openat$vimc0(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r7, 0xc0485661, &(0x7f0000000600)={0x0, 0x2, @stop_pts=0x4}) r8 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r8, 0x0, 0x61, &(0x7f00000006c0)={'filter\x00', 0x1b, "56999928a937e530b5b1e388c7a7f2586d3830622b09c345369af6"}, &(0x7f0000000700)=0x3f) r9 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm-control\x00', 0xb01901, 0x0) ioctl$IMSETDEVNAME(r9, 0x80184947, &(0x7f0000000780)={0x6, 'syz1\x00'}) ioctl$EVIOCGABS0(r8, 0x80184540, &(0x7f00000007c0)=""/4096) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f00000017c0), 0x4) r10 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(r10, 0x401c5820, &(0x7f0000001840)={0x6, 0x0, 0x7, 0xffffff53, 0x3}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000018c0)={0x44ce7b79, 0x8482b0b62089abb4, 0x4, 0x0, 0x1, {0x77359400}, {0x3, 0x2, 0x31, 0xdc, 0x0, 0x3, "3e4d1359"}, 0x1, 0x4, @planes=&(0x7f0000001880)={0x9, 0x5, @mem_offset=0x2, 0x9eff}, 0xea, 0x0, 0xffffffffffffffff}) ioctl$VIDIOC_ENUM_FREQ_BANDS(r11, 0xc0405665, &(0x7f0000001940)={0x6, 0xf34de97cde3266d7, 0x4, 0x32, 0xfff, 0xffff8001, 0x8}) r12 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001980)='/dev/btrfs-control\x00', 0x4000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001a00)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000019c0)={0xffffffffffffffff}, 0x111, 0x53f88393a7f573f4}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r12, &(0x7f0000001a40)={0x6, 0x118, 0xfa00, {{0x3, 0x14c, "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", 0x2, 0x16, 0x6, 0x1f, 0x1c, 0x9, 0x7c}, r13}}, 0x120) [ 296.485931][ T9851] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 296.515312][ T9851] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 296.559217][ T9854] chnl_net:caif_netlink_parms(): no params data found [ 296.598289][ T9851] team0: Port device team_slave_0 added [ 296.633829][ T9851] team0: Port device team_slave_1 added [ 296.739059][ T9856] chnl_net:caif_netlink_parms(): no params data found [ 296.748672][ T9860] IPVS: ftp: loaded support on port[0] = 21 [ 296.769323][ T9854] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.781186][ T9854] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.788809][ T9854] device bridge_slave_0 entered promiscuous mode [ 296.825535][ T9854] bridge0: port 2(bridge_slave_1) entered blocking state 17:56:12 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r0, 0x641e) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000040)=0x8000, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x80, 0x81, 0x20, 0x4a, 0x0, 0x1e69, 0x9258d7c4cc8ae420, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8001, 0xef1e857f263ba671, @perf_config_ext={0x60000000000000, 0x800000000000000}, 0x0, 0x5, 0x9, 0x0, 0x1, 0x1ff, 0xffff}, r1, 0xf, 0xffffffffffffffff, 0x0) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/context\x00', 0x2, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, &(0x7f0000000180)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x1, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80002}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0xa0, r3, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x50, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xaba4}]}]}, @TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x203}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x10000}]}]}, 0xa0}}, 0x40010) r4 = openat(r2, &(0x7f0000000400)='./file0\x00', 0x6101, 0x10) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000440)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xc8, "de16ac", "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"}}, 0x110) r5 = syz_open_dev$mouse(&(0x7f0000000580)='/dev/input/mouse#\x00', 0x4, 0x40) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r5, &(0x7f0000000740)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000700)={&(0x7f0000000640)={0xa0, r6, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x4c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9f4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x40800000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000001}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xcb8c}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x68}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x40}, 0x80) r7 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000780)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r7, 0xc0506617, &(0x7f00000007c0)={{0x2, 0x0, @identifier="0ca4fd931f929f91d4f1cae26325f006"}, 0x90, [], "d2ed8aeaae5cfdb9c79c5e70be02bd82025d95a5a9e92f00778e483bdccec8f01d83048fbfd99a6a331312d185f63eb815b2aa6379edf9c7ca6d61a140ac62ba060afe8b1bdeae9012cb2164ba944df2064cd59c5f79a2ffd5546fa2f52b4bc33735e720947357095f73a2f5eff8af4e58062a85f67a575bd7cc00fea5220c98b7b5ae1f49e346542ffc1cb540c6983a"}) r8 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000008c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCL_SELLOADLUT(r8, 0x541c, &(0x7f0000000900)={0x5, 0x5, 0x1, 0x6, 0xffff}) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000940)='/selinux/user\x00', 0x2, 0x0) r9 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000980)='/dev/vcsu\x00', 0x309842, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r9, 0x40086408, &(0x7f00000009c0)={0xe9, 0x20}) r10 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r10, 0x400454cb, 0x0) r11 = syz_open_dev$vcsn(&(0x7f0000000a40)='/dev/vcs#\x00', 0xffffffffffffff80, 0x101000) shutdown(r11, 0x1) r12 = openat$null(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/null\x00', 0x8000, 0x0) ioctl$IMCLEAR_L2(r12, 0x80044946, &(0x7f0000000ac0)=0x6) write$midi(0xffffffffffffffff, &(0x7f0000000b00)="8501413d2ff7a4c846b9d41dcd067b238ccb34878cc636068132c7e9fc7520b3186a757d2da890519c2724195d39abbb2736477013ec7682", 0x38) [ 296.833886][ T9854] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.842985][ T9854] device bridge_slave_1 entered promiscuous mode [ 296.914008][ T9851] device hsr_slave_0 entered promiscuous mode [ 296.971449][ T9851] device hsr_slave_1 entered promiscuous mode [ 297.103291][ T9854] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 297.137724][ T9854] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 297.162153][ T9856] bridge0: port 1(bridge_slave_0) entered blocking state [ 297.169245][ T9856] bridge0: port 1(bridge_slave_0) entered disabled state [ 297.169549][ T27] audit: type=1400 audit(1577469372.927:44): avc: denied { create } for pid=9851 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 297.207490][ T27] audit: type=1400 audit(1577469372.967:45): avc: denied { write } for pid=9851 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 297.211377][ T9856] device bridge_slave_0 entered promiscuous mode [ 297.236165][ T27] audit: type=1400 audit(1577469372.967:46): avc: denied { read } for pid=9851 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 17:56:13 executing program 5: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000040)='\'&GPL&\x00', 0x7) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x141100, 0x0) r2 = dup2(r0, r1) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsu\x00', 0x200000, 0x0) ioctl$EVIOCRMFF(r3, 0x40044581, &(0x7f0000000100)=0x5) r4 = creat(&(0x7f0000000140)='./file0\x00', 0xce) ioctl$KVM_INTERRUPT(r4, 0x4004ae86, &(0x7f0000000180)=0x20) r5 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0xc000, 0x111080) ioctl$KVM_SET_MSRS(r5, 0x4008ae89, &(0x7f0000000200)={0x6, 0x0, [{0x296, 0x0, 0xd66}, {0x4000009e, 0x0, 0x6}, {0xa06, 0x0, 0x80000001}, {0x1de, 0x0, 0xf0a8}, {0x610, 0x0, 0x6}, {0x9a1, 0x0, 0x100}]}) keyctl$invalidate(0x15, 0x0) r6 = accept4$alg(r4, 0x0, 0x0, 0xc2d33e1702b39eb7) read$alg(r6, &(0x7f0000000280)=""/171, 0xab) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x122a27ce87a2d167, 0x0) ioctl$PIO_CMAP(r7, 0x4b71, &(0x7f0000000380)={0x0, 0x6, 0x10001, 0x80000001, 0x1433123b, 0x8}) ioctl$sock_inet_SIOCSIFPFLAGS(r3, 0x8934, &(0x7f00000003c0)={'rose0\x00', 0x82}) r8 = fcntl$dupfd(r4, 0x406, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_EVENTS(r8, 0x84, 0xb, &(0x7f0000000400)={0x7, 0x40, 0x3, 0x3f, 0x27, 0x1, 0x2, 0x7f, 0x1, 0x46, 0xff, 0x9, 0x4}, 0xe) ioctl$IMCLEAR_L2(r2, 0x80044946, &(0x7f0000000440)=0x7fff) r9 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_int(r9, 0x0, 0x32, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r10 = syz_open_dev$vcsu(&(0x7f0000000540)='/dev/vcsu#\x00', 0x100000000, 0x40040) ioctl$TIOCL_SCROLLCONSOLE(r10, 0x541c, &(0x7f0000000580)={0xd, 0x401}) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000600)={0x9c0000, 0x800, 0x80, 0xffffffffffffffff, 0x0, &(0x7f00000005c0)={0x9909c8, 0xf252, [], @ptr=0x2}}) openat$cgroup_subtree(r11, &(0x7f0000000640)='cgroup.subtree_control\x00', 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000680)='/proc/self/attr/exec\x00', 0x2, 0x0) mmap$dsp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xe, 0x4000010, r8, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x1) r12 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/vga_arbiter\x00', 0x60400, 0x0) ioctl$void(r12, 0xa8a1) [ 297.274680][ T9851] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 297.284387][ T9862] IPVS: ftp: loaded support on port[0] = 21 [ 297.338105][ T9856] bridge0: port 2(bridge_slave_1) entered blocking state [ 297.346281][ T9856] bridge0: port 2(bridge_slave_1) entered disabled state [ 297.354430][ T9856] device bridge_slave_1 entered promiscuous mode [ 297.385503][ T9851] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 297.460007][ T9854] team0: Port device team_slave_0 added [ 297.470204][ T9854] team0: Port device team_slave_1 added [ 297.481788][ T9851] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 297.539444][ T9851] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 297.622273][ T9856] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 297.656363][ T9864] IPVS: ftp: loaded support on port[0] = 21 [ 297.679086][ T9856] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 297.712218][ T9856] team0: Port device team_slave_0 added [ 297.738640][ T9856] team0: Port device team_slave_1 added [ 297.794092][ T9854] device hsr_slave_0 entered promiscuous mode [ 297.851093][ T9854] device hsr_slave_1 entered promiscuous mode [ 297.920658][ T9854] debugfs: Directory 'hsr0' with parent '/' already present! [ 298.083918][ T9856] device hsr_slave_0 entered promiscuous mode [ 298.151275][ T9856] device hsr_slave_1 entered promiscuous mode [ 298.230697][ T9856] debugfs: Directory 'hsr0' with parent '/' already present! [ 298.250819][ T9860] chnl_net:caif_netlink_parms(): no params data found [ 298.311747][ T9854] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 298.429974][ T9856] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 298.504125][ T9854] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 298.584295][ T9856] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 298.643696][ T9854] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 298.722056][ T9862] chnl_net:caif_netlink_parms(): no params data found [ 298.741875][ T9860] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.748938][ T9860] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.756881][ T9860] device bridge_slave_0 entered promiscuous mode [ 298.764837][ T9856] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 298.824115][ T9854] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 298.913885][ T9860] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.921148][ T9860] bridge0: port 2(bridge_slave_1) entered disabled state [ 298.928825][ T9860] device bridge_slave_1 entered promiscuous mode [ 298.936062][ T9856] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 299.029787][ T9864] chnl_net:caif_netlink_parms(): no params data found [ 299.067904][ T9860] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 299.079485][ T9862] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.091359][ T9862] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.099045][ T9862] device bridge_slave_0 entered promiscuous mode [ 299.109011][ T9862] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.116582][ T9862] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.124787][ T9862] device bridge_slave_1 entered promiscuous mode [ 299.146307][ T9860] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 299.182401][ T9851] 8021q: adding VLAN 0 to HW filter on device bond0 [ 299.212630][ T9860] team0: Port device team_slave_0 added [ 299.225830][ T9864] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.233978][ T9864] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.241760][ T9864] device bridge_slave_0 entered promiscuous mode [ 299.250934][ T9862] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 299.264108][ T9862] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 299.278921][ T9860] team0: Port device team_slave_1 added [ 299.284980][ T9864] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.292685][ T9864] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.300369][ T9864] device bridge_slave_1 entered promiscuous mode [ 299.336406][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 299.345243][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 299.372563][ T9864] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 299.385472][ T9862] team0: Port device team_slave_0 added [ 299.394866][ T9851] 8021q: adding VLAN 0 to HW filter on device team0 [ 299.418683][ T9864] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 299.434057][ T9862] team0: Port device team_slave_1 added [ 299.464933][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 299.475315][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 299.484207][ T2662] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.491529][ T2662] bridge0: port 1(bridge_slave_0) entered forwarding state [ 299.502959][ T9864] team0: Port device team_slave_0 added [ 299.542819][ T9860] device hsr_slave_0 entered promiscuous mode [ 299.581078][ T9860] device hsr_slave_1 entered promiscuous mode [ 299.620700][ T9860] debugfs: Directory 'hsr0' with parent '/' already present! [ 299.659319][ T9864] team0: Port device team_slave_1 added [ 299.668012][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 299.676487][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 299.685647][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 299.694025][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.701120][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 299.709542][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 299.718626][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 299.782653][ T9862] device hsr_slave_0 entered promiscuous mode [ 299.831594][ T9862] device hsr_slave_1 entered promiscuous mode [ 299.890703][ T9862] debugfs: Directory 'hsr0' with parent '/' already present! [ 299.954126][ T9864] device hsr_slave_0 entered promiscuous mode [ 300.001594][ T9864] device hsr_slave_1 entered promiscuous mode [ 300.041623][ T9864] debugfs: Directory 'hsr0' with parent '/' already present! [ 300.062982][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 300.071959][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 300.080195][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 300.089996][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 300.099000][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 300.115648][ T9854] 8021q: adding VLAN 0 to HW filter on device bond0 [ 300.162044][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 300.170308][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 300.179444][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 300.188325][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 300.206527][ T9860] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 300.256518][ T9856] 8021q: adding VLAN 0 to HW filter on device bond0 [ 300.268829][ T9851] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 300.303892][ T9860] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 300.342540][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 300.350267][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 300.364113][ T9854] 8021q: adding VLAN 0 to HW filter on device team0 [ 300.372897][ T9856] 8021q: adding VLAN 0 to HW filter on device team0 [ 300.390157][ T9864] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 300.412713][ T9860] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 300.453295][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 300.464725][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 300.472583][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 300.486712][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 300.495442][ T2662] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.502536][ T2662] bridge0: port 1(bridge_slave_0) entered forwarding state [ 300.511378][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 300.547179][ T9864] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 300.572338][ T9860] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 300.635901][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 300.644941][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 300.653535][ T3087] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.660620][ T3087] bridge0: port 1(bridge_slave_0) entered forwarding state [ 300.668174][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 300.676985][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 300.685496][ T3087] bridge0: port 2(bridge_slave_1) entered blocking state [ 300.692593][ T3087] bridge0: port 2(bridge_slave_1) entered forwarding state [ 300.700197][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 300.711949][ T9862] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 300.753557][ T9862] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 300.793373][ T9864] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 300.844356][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 300.855197][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 300.873260][ T9862] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 300.913866][ T9864] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 300.976612][ T9851] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 300.984625][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 300.993402][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 301.001752][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.008774][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 301.016724][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 301.025731][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 301.034561][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 301.052788][ T9862] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 301.120195][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 301.128804][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 301.142115][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 301.150343][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 301.159271][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 301.167736][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 301.176464][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 301.185226][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 301.193336][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 301.207105][ T9854] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 301.218832][ T9854] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 301.247725][ T27] audit: type=1400 audit(1577469377.007:47): avc: denied { associate } for pid=9851 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 301.288428][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 301.311314][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 301.319625][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 301.328067][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 301.336557][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 301.346164][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 301.388482][ T9856] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 301.400784][ T9856] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 301.413422][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 301.421811][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 301.430079][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 301.438705][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 301.447271][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 301.456656][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 301.517282][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 301.532806][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 17:56:17 executing program 0: syz_read_part_table(0x4000000005245, 0x0, &(0x7f0000000000)) [ 301.557374][ T9870] QAT: Invalid ioctl [ 301.566522][ T9854] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 301.578362][ T9862] 8021q: adding VLAN 0 to HW filter on device bond0 [ 301.588443][ T9870] QAT: Invalid ioctl [ 301.659110][ T9856] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 301.686738][ T9860] 8021q: adding VLAN 0 to HW filter on device bond0 [ 301.703522][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 301.715307][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 301.740845][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 301.748670][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 301.794008][ T9864] 8021q: adding VLAN 0 to HW filter on device bond0 [ 301.816067][ T9862] 8021q: adding VLAN 0 to HW filter on device team0 [ 301.839112][ T9860] 8021q: adding VLAN 0 to HW filter on device team0 [ 301.856321][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 301.866259][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 301.887781][ T9864] 8021q: adding VLAN 0 to HW filter on device team0 [ 301.939393][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 301.950192][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 17:56:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x4000) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000380), &(0x7f00000003c0)=0xc) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="e4ffffffaad1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRES32=r4, @ANYBLOB="000000000000000008000a0014000000"], 0x28}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002a00)=0x14) connect$packet(r3, &(0x7f00000004c0)={0x11, 0x6, r6, 0x1, 0x81}, 0x14) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="280000001000250800000000000000000a000000", @ANYRES32=r6, @ANYBLOB="000000000008000008000a0000000000b272a2043d4df05e02b9b23aff81b9bb7d30605a5e6e166870358b7e98938cd04e161c181ba13e9d507fd2dad264a84c76f71f3e18816bfe46838da6840044fbec6319c1a63c1009504f369839dc01b8123a1ded948a03b92fd6b2aa08e2f17ba7412161c0bedbc97af48296a49846bff1aebc8bfea2143a7c000000000000005e3b90135c234521869e737e61d5232ad170ee9f4ffcad1ce3b2081b02744f838e17382af8339c010b3cd78283190cb34b209c67fb338dfe3f55d317a21c0cf34dd8bfd2dfc471b7326e5b21ccfcce794aad554ce25d7b52b96984452ea9c1212243"], 0x28}}, 0x0) 17:56:17 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe, 0x0, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 302.051107][ T3019] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.058203][ T3019] bridge0: port 1(bridge_slave_0) entered forwarding state [ 302.081877][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 302.098603][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 302.109001][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 302.147645][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 302.176053][ T3019] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.183202][ T3019] bridge0: port 1(bridge_slave_0) entered forwarding state 17:56:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$FBIOGET_VSCREENINFO(r2, 0x4600, &(0x7f0000000000)) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x60, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x6}, 0x0, 0x0, 0x7, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETFILTEREBPF(r3, 0x6611, 0x0) [ 302.191118][ T27] audit: type=1400 audit(1577469377.947:48): avc: denied { prog_load } for pid=9893 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 302.253047][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 302.289771][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 302.298819][ T3019] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.305954][ T3019] bridge0: port 2(bridge_slave_1) entered forwarding state [ 302.321778][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 302.323375][ T27] audit: type=1400 audit(1577469378.087:49): avc: denied { open } for pid=9901 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 302.372437][ T9892] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 302.382085][ T27] audit: type=1400 audit(1577469378.087:50): avc: denied { kernel } for pid=9901 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 302.406707][ T9897] batman_adv: batadv0: Adding interface: erspan0 17:56:18 executing program 0: r0 = socket$inet6(0xa, 0x4000000080002, 0x88) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x20000, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r1, 0x5385, &(0x7f00000001c0)={0x10, ""/16}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24, 0x0, @ipv4={[], [], @initdev}}, 0x1c) r2 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x1763, 0x40000) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e20, 0x6, @rand_addr="d87b33715ed5094fe1fb301856baf08f", 0xfffff800}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xe}}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e20, 0x7ff, @dev={0xfe, 0x80, [], 0x27}, 0x9}, @in={0x2, 0x4e21, @broadcast}, @in={0x2, 0x4e22, @local}, @in={0x2, 0x4e23, @broadcast}, @in={0x2, 0x4e20, @loopback}], 0xa8) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x2, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40001ab, 0x0) [ 302.421595][ T9897] batman_adv: batadv0: The MTU of interface erspan0 is too small (1450) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 302.455434][ T9897] batman_adv: batadv0: Interface activated: erspan0 17:56:18 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) sendto$inet(r0, &(0x7f0000000200)="ee", 0xff37, 0x80, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffa}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r4, 0xc06c4124, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}) listen(r0, 0x7) accept$inet(r0, 0x0, 0x0) [ 302.471345][ T9899] batman_adv: batadv0: Interface deactivated: erspan0 [ 302.478172][ T9899] batman_adv: batadv0: Removing interface: erspan0 [ 302.581905][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 302.589856][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 302.597935][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 302.609192][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 302.618727][ T3087] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.625826][ T3087] bridge0: port 2(bridge_slave_1) entered forwarding state [ 302.636764][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 302.646025][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 302.655054][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 302.663851][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 302.672773][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 302.683020][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 302.692473][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 302.701483][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 302.709639][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 302.718937][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 302.728000][ T3087] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.735121][ T3087] bridge0: port 1(bridge_slave_0) entered forwarding state [ 302.749884][ T9862] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 302.763221][ T9862] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 17:56:18 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="72d08acc715ed0776428"], 0xfffffffffffffe12) close(r2) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd6e) r3 = socket$inet6(0xa, 0x80003, 0x6b) delete_module(&(0x7f0000000040)='selinux\x00', 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) [ 302.780612][ T9897] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 302.799246][ T9899] batman_adv: batadv0: Adding interface: erspan0 [ 302.833413][ T9899] batman_adv: batadv0: The MTU of interface erspan0 is too small (1450) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 302.860212][ T9899] batman_adv: batadv0: Interface activated: erspan0 [ 302.868754][ T9915] batman_adv: batadv0: Interface deactivated: erspan0 [ 302.878179][ T9915] batman_adv: batadv0: Removing interface: erspan0 [ 302.879072][ T9927] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9927 comm=syz-executor.2 [ 302.899316][ T9927] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9927 comm=syz-executor.2 [ 302.912541][ T9927] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9927 comm=syz-executor.2 [ 302.925729][ T9927] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9927 comm=syz-executor.2 [ 302.938751][ T9927] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9927 comm=syz-executor.2 [ 302.953259][ T9927] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9927 comm=syz-executor.2 [ 302.966381][ T9927] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9927 comm=syz-executor.2 [ 302.979458][ C1] [ 302.979462][ C1] ===================================== [ 302.979464][ C1] WARNING: bad unlock balance detected! [ 302.979469][ C1] 5.5.0-rc3-syzkaller #0 Not tainted [ 302.979471][ C1] ------------------------------------- [ 302.979475][ C1] syz-executor.2/9927 is trying to release lock (&dev->qdisc_xmit_lock_key) at: [ 302.979555][ C1] [] sch_direct_xmit+0x3fa/0xd30 [ 302.979559][ C1] but there are no more locks to release! [ 302.979562][ C1] [ 302.979562][ C1] other info that might help us debug this: [ 302.979568][ C1] 8 locks held by syz-executor.2/9927: [ 302.979571][ C1] #0: ffff8880a462a460 (&pipe->mutex/1){+.+.}, at: pipe_lock+0x65/0x80 [ 302.979639][ C1] #1: ffffffff8999aca0 (console_lock){+.+.}, at: vprintk_emit+0x283/0x700 [ 302.979691][ C1] #2: ffffc90000da8d50 ((&idev->mc_dad_timer)){+.-.}, at: call_timer_fn+0xe0/0x780 [ 302.979731][ C1] #3: ffffffff899a5680 (rcu_read_lock){....}, at: mld_sendpack+0x180/0xed0 [ 302.979776][ C1] #4: ffffffff899a5640 (rcu_read_lock_bh){....}, at: ip6_finish_output2+0x214/0x25c0 [ 302.979815][ C1] #5: ffffffff899a5640 (rcu_read_lock_bh){....}, at: __dev_queue_xmit+0x20a/0x35c0 [ 302.979846][ C1] #6: ffff888087d65250 (&dev->qdisc_tx_busylock_key#14){+...}, at: __dev_queue_xmit+0x2412/0x35c0 [ 302.979859][ C1] #7: ffff888087d65138 (&dev->qdisc_running_key#14){+...}, at: dev_queue_xmit+0x18/0x20 [ 302.979872][ C1] [ 302.979872][ C1] stack backtrace: [ 302.979880][ C1] CPU: 1 PID: 9927 Comm: syz-executor.2 Not tainted 5.5.0-rc3-syzkaller #0 [ 302.979885][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.979887][ C1] Call Trace: [ 302.979890][ C1] [ 302.979926][ C1] dump_stack+0x197/0x210 [ 302.979934][ C1] ? sch_direct_xmit+0x3fa/0xd30 [ 302.979954][ C1] print_unlock_imbalance_bug.cold+0x114/0x123 [ 302.979961][ C1] ? sch_direct_xmit+0x3fa/0xd30 [ 302.979967][ C1] lock_release+0x5f2/0x960 [ 302.979986][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 302.980015][ C1] ? lock_downgrade+0x920/0x920 [ 302.980022][ C1] ? dev_hard_start_xmit+0x345/0x9b0 [ 302.980045][ C1] _raw_spin_unlock+0x16/0x40 [ 302.980052][ C1] sch_direct_xmit+0x3fa/0xd30 [ 302.980074][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.980081][ C1] ? dev_watchdog+0xca0/0xca0 [ 302.980087][ C1] ? lock_acquire+0xf0/0x410 [ 302.980095][ C1] __dev_queue_xmit+0x2707/0x35c0 [ 302.980118][ C1] ? __kasan_check_read+0x11/0x20 [ 302.980124][ C1] ? __lock_acquire+0x16f2/0x4a00 [ 302.980131][ C1] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 302.980138][ C1] ? __kasan_check_read+0x11/0x20 [ 302.980144][ C1] ? mark_lock+0xc2/0x1220 [ 302.980150][ C1] ? mark_held_locks+0xa4/0xf0 [ 302.980157][ C1] ? ip6_finish_output2+0xc98/0x25c0 [ 302.980164][ C1] ? __ip6_finish_output+0x444/0xaa0 [ 302.980171][ C1] ? ip6_finish_output2+0xc98/0x25c0 [ 302.980178][ C1] dev_queue_xmit+0x18/0x20 [ 302.980184][ C1] ? dev_queue_xmit+0x18/0x20 [ 302.980193][ C1] ip6_finish_output2+0xfbe/0x25c0 [ 302.980206][ C1] ? ip6_frag_next+0xb20/0xb20 [ 302.980215][ C1] ? lock_downgrade+0x920/0x920 [ 302.980226][ C1] ? rcu_read_lock_held+0x9c/0xb0 [ 302.980236][ C1] ? __kasan_check_read+0x11/0x20 [ 302.980251][ C1] __ip6_finish_output+0x444/0xaa0 [ 302.980263][ C1] ? __ip6_finish_output+0x444/0xaa0 [ 302.980276][ C1] ip6_finish_output+0x38/0x1f0 [ 302.980286][ C1] ip6_output+0x25e/0x880 [ 302.980294][ C1] ? ip6_finish_output+0x1f0/0x1f0 [ 302.980316][ C1] ? __local_bh_enable_ip+0x15a/0x270 [ 302.980324][ C1] ? __ip6_finish_output+0xaa0/0xaa0 [ 302.980347][ C1] ? xfrm_lookup+0x38/0x50 [ 302.980356][ C1] mld_sendpack+0x9c2/0xed0 [ 302.980365][ C1] ? nf_hook.constprop.0+0x560/0x560 [ 302.980374][ C1] ? mld_send_initial_cr.part.0+0x102/0x160 [ 302.980380][ C1] ? __local_bh_enable_ip+0x15a/0x270 [ 302.980389][ C1] mld_send_initial_cr.part.0+0x114/0x160 [ 302.980397][ C1] mld_dad_timer_expire+0x42/0x230 [ 302.980405][ C1] call_timer_fn+0x1ac/0x780 [ 302.980413][ C1] ? mld_send_initial_cr.part.0+0x160/0x160 [ 302.980420][ C1] ? msleep_interruptible+0x150/0x150 [ 302.980428][ C1] ? run_timer_softirq+0x6b1/0x1790 [ 302.980441][ C1] ? trace_hardirqs_on+0x67/0x240 [ 302.980449][ C1] ? mld_send_initial_cr.part.0+0x160/0x160 [ 302.980456][ C1] ? mld_send_initial_cr.part.0+0x160/0x160 [ 302.980464][ C1] run_timer_softirq+0x6c3/0x1790 [ 302.980472][ C1] ? add_timer+0x930/0x930 [ 302.980480][ C1] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 302.980487][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 302.980501][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 302.980513][ C1] ? trace_hardirqs_on+0x67/0x240 [ 302.980526][ C1] __do_softirq+0x262/0x98c [ 302.980554][ C1] ? sched_clock_cpu+0x1b/0x1b0 [ 302.980566][ C1] irq_exit+0x19b/0x1e0 [ 302.980578][ C1] smp_apic_timer_interrupt+0x1a3/0x610 [ 302.980591][ C1] apic_timer_interrupt+0xf/0x20 [ 302.980595][ C1] [ 302.980607][ C1] RIP: 0010:console_unlock+0xbb8/0xf00 [ 302.980619][ C1] Code: 93 89 48 c1 e8 03 42 80 3c 30 00 0f 85 e4 02 00 00 48 83 3d d1 0c 35 08 00 0f 84 91 01 00 00 e8 de 05 17 00 48 8b 7d 98 57 9d <0f> 1f 44 00 00 e9 6d ff ff ff e8 c9 05 17 00 48 8b 7d 08 c7 05 6b [ 302.980625][ C1] RSP: 0018:ffffc900026b74f0 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 302.980636][ C1] RAX: 0000000000040000 RBX: 0000000000000200 RCX: ffffc9000e832000 [ 302.980643][ C1] RDX: 0000000000040000 RSI: ffffffff815e2812 RDI: 0000000000000246 [ 302.980650][ C1] RBP: ffffc900026b7578 R08: 1ffffffff1659bac R09: fffffbfff1659bad [ 302.980657][ C1] R10: fffffbfff1659bac R11: ffffffff8b2cdd67 R12: 0000000000000000 [ 302.980664][ C1] R13: ffffffff84a75980 R14: dffffc0000000000 R15: ffffffff8a0e4310 [ 302.980699][ C1] ? netconsole_netdev_event+0x2a0/0x2a0 [ 302.980714][ C1] ? console_unlock+0xbb2/0xf00 [ 302.980731][ C1] vprintk_emit+0x2a0/0x700 [ 302.980746][ C1] vprintk_default+0x28/0x30 [ 302.980762][ C1] vprintk_func+0x7e/0x189 [ 302.980774][ C1] printk+0xba/0xed [ 302.980787][ C1] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 302.980801][ C1] ? _raw_spin_unlock_irqrestore+0x9f/0xe0 [ 302.980812][ C1] ? ___ratelimit+0x60/0x595 [ 302.980848][ C1] selinux_netlink_send.cold+0x126/0x168 [ 302.980861][ C1] ? selinux_fs_context_parse_param+0x160/0x160 [ 302.980892][ C1] ? _copy_from_iter_full+0x255/0x870 [ 302.980923][ C1] security_netlink_send+0x6b/0xb0 [ 302.980973][ C1] netlink_sendmsg+0x8a2/0xea0 [ 302.980993][ C1] ? netlink_unicast+0x7d0/0x7d0 [ 302.981040][ C1] ? tomoyo_socket_sendmsg+0x26/0x30 [ 302.981054][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.981065][ C1] ? security_socket_sendmsg+0x8d/0xc0 [ 302.981078][ C1] ? netlink_unicast+0x7d0/0x7d0 [ 302.981123][ C1] sock_sendmsg+0xd7/0x130 [ 302.981135][ C1] kernel_sendmsg+0x44/0x50 [ 302.981147][ C1] sock_no_sendpage+0x116/0x150 [ 302.981157][ C1] ? sock_kzfree_s+0x70/0x70 [ 302.981172][ C1] ? __kasan_check_read+0x11/0x20 [ 302.981183][ C1] ? mark_lock+0xc2/0x1220 [ 302.981196][ C1] kernel_sendpage+0x92/0xf0 [ 302.981206][ C1] ? sock_kzfree_s+0x70/0x70 [ 302.981218][ C1] sock_sendpage+0x8b/0xc0 [ 302.981247][ C1] pipe_to_sendpage+0x2da/0x3c0 [ 302.981259][ C1] ? kernel_sendpage+0xf0/0xf0 [ 302.981270][ C1] ? direct_splice_actor+0x190/0x190 [ 302.981313][ C1] ? __put_page+0x10a/0x3b0 [ 302.981327][ C1] ? anon_pipe_buf_release+0x1e1/0x380 [ 302.981338][ C1] __splice_from_pipe+0x3ee/0x7c0 [ 302.981348][ C1] ? direct_splice_actor+0x190/0x190 [ 302.981361][ C1] ? direct_splice_actor+0x190/0x190 [ 302.981391][ C1] splice_from_pipe+0x108/0x170 [ 302.981402][ C1] ? splice_shrink_spd+0xd0/0xd0 [ 302.981418][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.981430][ C1] ? security_file_permission+0x8f/0x380 [ 302.981440][ C1] ? rcu_read_lock_held+0x9c/0xb0 [ 302.981453][ C1] generic_splice_sendpage+0x3c/0x50 [ 302.981464][ C1] ? splice_from_pipe+0x170/0x170 [ 302.981475][ C1] do_splice+0xba4/0x1680 [ 302.981493][ C1] ? ksys_dup3+0x3e0/0x3e0 [ 302.981503][ C1] ? opipe_prep.part.0+0x300/0x300 [ 302.981512][ C1] ? __fget_light+0x1a9/0x230 [ 302.981525][ C1] __x64_sys_splice+0x2c6/0x330 [ 302.981547][ C1] do_syscall_64+0xfa/0x790 [ 302.981560][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.981569][ C1] RIP: 0033:0x45a919 [ 302.981581][ C1] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 302.981586][ C1] RSP: 002b:00007f0997967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 302.981597][ C1] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 000000000045a919 [ 302.981603][ C1] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 302.981611][ C1] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 302.981618][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f09979686d4 [ 302.981625][ C1] R13: 00000000004cb466 R14: 00000000004e3f28 R15: 00000000ffffffff [ 303.863563][ T9927] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9927 comm=syz-executor.2 [ 303.877234][ T9927] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9927 comm=syz-executor.2 [ 303.890398][ T9927] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9927 comm=syz-executor.2 [ 303.924186][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 17:56:19 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000ff3cf784a56b1c757c068169961cec96adffffff0000000000000000000000000000000000000052"]) getpid() ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000180)) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) ftruncate(r1, 0x8200) openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x100, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) r3 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r3, &(0x7f0000007e00), 0x400000000000058, 0x0) [ 303.932968][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 303.945667][ T4177] kobject: 'loop1' (00000000b183da1d): kobject_uevent_env [ 303.953363][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 303.961560][ T4177] kobject: 'loop1' (00000000b183da1d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 303.973823][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 303.982932][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 304.000423][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 304.013817][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 304.030957][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 304.039564][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 304.048720][ T3087] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.055804][ T3087] bridge0: port 2(bridge_slave_1) entered forwarding state [ 304.080443][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 304.089576][ C1] hrtimer: interrupt took 24572 ns [ 304.100427][ T9862] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 304.112549][ T9862] kobject: 'vlan0' (00000000f07a1ce5): kobject_add_internal: parent: 'mesh', set: '' 17:56:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xf, &(0x7f0000000000)={&(0x7f00000022c0)=ANY=[@ANYBLOB="2050ff000301ffff8385efe24400000000000000000c00acc78b000000000000"], 0x20}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$VT_OPENQRY(r3, 0x5600, &(0x7f0000000040)) [ 304.169206][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 304.181211][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 304.189155][ T4177] kobject: 'loop2' (000000008fbeae37): kobject_uevent_env [ 304.199765][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 304.212037][ T4177] kobject: 'loop2' (000000008fbeae37): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 304.213150][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 304.228808][ T4177] kobject: 'loop0' (000000002a78f5c6): kobject_uevent_env [ 304.240331][ T4177] kobject: 'loop0' (000000002a78f5c6): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 304.241402][ T27] audit: type=1400 audit(1577469380.007:51): avc: denied { create } for pid=9936 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 304.280873][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 304.289309][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 304.304924][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 304.305367][ T4177] kobject: 'loop1' (00000000b183da1d): kobject_uevent_env [ 304.312829][ T27] audit: type=1400 audit(1577469380.037:52): avc: denied { write } for pid=9936 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 304.313336][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 304.332888][ T4177] kobject: 'loop1' (00000000b183da1d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 304.349615][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 304.379094][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 304.387741][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 304.396309][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 304.404672][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 304.414157][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 304.422470][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 304.430772][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 304.442245][ T9864] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 304.450485][ T9860] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 304.462136][ T9860] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 304.482979][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 304.490929][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 304.502546][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 304.507568][ T4177] kobject: 'loop2' (000000008fbeae37): kobject_uevent_env [ 304.513247][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 304.523065][ T4177] kobject: 'loop2' (000000008fbeae37): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 304.527893][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 304.553465][ T9860] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 304.567321][ T9860] kobject: 'vlan0' (00000000bf40454e): kobject_add_internal: parent: 'mesh', set: '' [ 304.590955][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 304.598400][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 304.613255][ T9864] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 304.621662][ T9864] kobject: 'vlan0' (0000000065432aaf): kobject_add_internal: parent: 'mesh', set: '' [ 304.658619][ T4177] kobject: 'loop4' (00000000b1c06a2c): kobject_uevent_env [ 304.666347][ T4177] kobject: 'loop4' (00000000b1c06a2c): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 304.687644][ T9952] QAT: Invalid ioctl [ 304.696915][ T9952] QAT: Invalid ioctl [ 304.716173][ T4177] kobject: 'loop3' (00000000d8682b6b): kobject_uevent_env [ 304.734815][ T4177] kobject: 'loop3' (00000000d8682b6b): fill_kobj_path: path = '/devices/virtual/block/loop3' 17:56:20 executing program 3: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0xb78a0745398ce450, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req={0x7fffffff, 0x1, 0x3}, 0x10) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req={0x3, 0x6, 0x2, 0x69}, 0x10) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000140)={0x0, 0x401, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000100)={0x990a68, 0x9, [], @string=&(0x7f00000000c0)=0x6}}) io_uring_enter(r1, 0x10001, 0xfffff000, 0x1, &(0x7f0000000180)={0x47d}, 0x8) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000002, 0x90030, r2, 0x0) getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)=0x0) setfsuid(r3) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0x820, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000300)) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000340)='/dev/video37\x00', 0x2, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x9, 0x20000) fsync(r5) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000440)={{0x4, 0x4, 0x80000001, 0xb02, 'syz0\x00', 0x8a11}, 0x0, 0x562273b20d8fa65e, 0x9, 0x0, 0x5, 0x9, 'syz0\x00', &(0x7f00000003c0)=['/dev/loop#\x00', 'mime_typewlan0lselinux\x00', '/dev/btrfs-control\x00', '\'self*', '/dev/loop#\x00'], 0x46, [], [0x9, 0x1441, 0x1c92, 0x9]}) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ubi_ctrl\x00', 0x100, 0x0) ftruncate(r6, 0xfffffffffffffff7) r7 = openat$vimc0(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r7, 0xc0485661, &(0x7f0000000600)={0x0, 0x2, @stop_pts=0x4}) r8 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r8, 0x0, 0x61, &(0x7f00000006c0)={'filter\x00', 0x1b, "56999928a937e530b5b1e388c7a7f2586d3830622b09c345369af6"}, &(0x7f0000000700)=0x3f) r9 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm-control\x00', 0xb01901, 0x0) ioctl$IMSETDEVNAME(r9, 0x80184947, &(0x7f0000000780)={0x6, 'syz1\x00'}) ioctl$EVIOCGABS0(r8, 0x80184540, &(0x7f00000007c0)=""/4096) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f00000017c0), 0x4) r10 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(r10, 0x401c5820, &(0x7f0000001840)={0x6, 0x0, 0x7, 0xffffff53, 0x3}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000018c0)={0x44ce7b79, 0x8482b0b62089abb4, 0x4, 0x0, 0x1, {0x77359400}, {0x3, 0x2, 0x31, 0xdc, 0x0, 0x3, "3e4d1359"}, 0x1, 0x4, @planes=&(0x7f0000001880)={0x9, 0x5, @mem_offset=0x2, 0x9eff}, 0xea, 0x0, 0xffffffffffffffff}) ioctl$VIDIOC_ENUM_FREQ_BANDS(r11, 0xc0405665, &(0x7f0000001940)={0x6, 0xf34de97cde3266d7, 0x4, 0x32, 0xfff, 0xffff8001, 0x8}) r12 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001980)='/dev/btrfs-control\x00', 0x4000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001a00)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000019c0)={0xffffffffffffffff}, 0x111, 0x53f88393a7f573f4}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r12, &(0x7f0000001a40)={0x6, 0x118, 0xfa00, {{0x3, 0x14c, "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", 0x2, 0x16, 0x6, 0x1f, 0x1c, 0x9, 0x7c}, r13}}, 0x120) 17:56:20 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r0, 0x641e) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000040)=0x8000, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x80, 0x81, 0x20, 0x4a, 0x0, 0x1e69, 0x9258d7c4cc8ae420, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8001, 0xef1e857f263ba671, @perf_config_ext={0x60000000000000, 0x800000000000000}, 0x0, 0x5, 0x9, 0x0, 0x1, 0x1ff, 0xffff}, r1, 0xf, 0xffffffffffffffff, 0x0) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/context\x00', 0x2, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, &(0x7f0000000180)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x1, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80002}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0xa0, r3, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x50, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xaba4}]}]}, @TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x203}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x10000}]}]}, 0xa0}}, 0x40010) r4 = openat(r2, &(0x7f0000000400)='./file0\x00', 0x6101, 0x10) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000440)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xc8, "de16ac", "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"}}, 0x110) r5 = syz_open_dev$mouse(&(0x7f0000000580)='/dev/input/mouse#\x00', 0x4, 0x40) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r5, &(0x7f0000000740)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000700)={&(0x7f0000000640)={0xa0, r6, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x4c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9f4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x40800000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000001}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xcb8c}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x68}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x40}, 0x80) r7 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000780)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r7, 0xc0506617, &(0x7f00000007c0)={{0x2, 0x0, @identifier="0ca4fd931f929f91d4f1cae26325f006"}, 0x90, [], "d2ed8aeaae5cfdb9c79c5e70be02bd82025d95a5a9e92f00778e483bdccec8f01d83048fbfd99a6a331312d185f63eb815b2aa6379edf9c7ca6d61a140ac62ba060afe8b1bdeae9012cb2164ba944df2064cd59c5f79a2ffd5546fa2f52b4bc33735e720947357095f73a2f5eff8af4e58062a85f67a575bd7cc00fea5220c98b7b5ae1f49e346542ffc1cb540c6983a"}) r8 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000008c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCL_SELLOADLUT(r8, 0x541c, &(0x7f0000000900)={0x5, 0x5, 0x1, 0x6, 0xffff}) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000940)='/selinux/user\x00', 0x2, 0x0) r9 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000980)='/dev/vcsu\x00', 0x309842, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r9, 0x40086408, &(0x7f00000009c0)={0xe9, 0x20}) r10 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r10, 0x400454cb, 0x0) r11 = syz_open_dev$vcsn(&(0x7f0000000a40)='/dev/vcs#\x00', 0xffffffffffffff80, 0x101000) shutdown(r11, 0x1) r12 = openat$null(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/null\x00', 0x8000, 0x0) ioctl$IMCLEAR_L2(r12, 0x80044946, &(0x7f0000000ac0)=0x6) write$midi(0xffffffffffffffff, &(0x7f0000000b00)="8501413d2ff7a4c846b9d41dcd067b238ccb34878cc636068132c7e9fc7520b3186a757d2da890519c2724195d39abbb2736477013ec7682", 0x38) [ 304.780707][ T9952] QAT: Invalid ioctl [ 304.787707][ T4177] kobject: 'loop5' (00000000e99ccbc0): kobject_uevent_env [ 304.798693][ T4177] kobject: 'loop5' (00000000e99ccbc0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 304.802553][ T9961] QAT: Invalid ioctl 17:56:20 executing program 5: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000040)='\'&GPL&\x00', 0x7) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x141100, 0x0) r2 = dup2(r0, r1) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsu\x00', 0x200000, 0x0) ioctl$EVIOCRMFF(r3, 0x40044581, &(0x7f0000000100)=0x5) r4 = creat(&(0x7f0000000140)='./file0\x00', 0xce) ioctl$KVM_INTERRUPT(r4, 0x4004ae86, &(0x7f0000000180)=0x20) r5 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0xc000, 0x111080) ioctl$KVM_SET_MSRS(r5, 0x4008ae89, &(0x7f0000000200)={0x6, 0x0, [{0x296, 0x0, 0xd66}, {0x4000009e, 0x0, 0x6}, {0xa06, 0x0, 0x80000001}, {0x1de, 0x0, 0xf0a8}, {0x610, 0x0, 0x6}, {0x9a1, 0x0, 0x100}]}) keyctl$invalidate(0x15, 0x0) r6 = accept4$alg(r4, 0x0, 0x0, 0xc2d33e1702b39eb7) read$alg(r6, &(0x7f0000000280)=""/171, 0xab) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x122a27ce87a2d167, 0x0) ioctl$PIO_CMAP(r7, 0x4b71, &(0x7f0000000380)={0x0, 0x6, 0x10001, 0x80000001, 0x1433123b, 0x8}) ioctl$sock_inet_SIOCSIFPFLAGS(r3, 0x8934, &(0x7f00000003c0)={'rose0\x00', 0x82}) r8 = fcntl$dupfd(r4, 0x406, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_EVENTS(r8, 0x84, 0xb, &(0x7f0000000400)={0x7, 0x40, 0x3, 0x3f, 0x27, 0x1, 0x2, 0x7f, 0x1, 0x46, 0xff, 0x9, 0x4}, 0xe) ioctl$IMCLEAR_L2(r2, 0x80044946, &(0x7f0000000440)=0x7fff) r9 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_int(r9, 0x0, 0x32, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r10 = syz_open_dev$vcsu(&(0x7f0000000540)='/dev/vcsu#\x00', 0x100000000, 0x40040) ioctl$TIOCL_SCROLLCONSOLE(r10, 0x541c, &(0x7f0000000580)={0xd, 0x401}) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000600)={0x9c0000, 0x800, 0x80, 0xffffffffffffffff, 0x0, &(0x7f00000005c0)={0x9909c8, 0xf252, [], @ptr=0x2}}) openat$cgroup_subtree(r11, &(0x7f0000000640)='cgroup.subtree_control\x00', 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000680)='/proc/self/attr/exec\x00', 0x2, 0x0) mmap$dsp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xe, 0x4000010, r8, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x1) r12 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/vga_arbiter\x00', 0x60400, 0x0) ioctl$void(r12, 0xa8a1) 17:56:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000040)="1c8fc9ccda34ef75d07923774d8ed0e79207af01b77dffa86f1da916f48f412eb3053f19773f66e844970b08820fcc7f622d00"/60}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r0, &(0x7f0000000040)}, 0x20) 17:56:20 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000ff3cf784a56b1c757c068169961cec96adffffff0000000000000000000000000000000000000052"]) getpid() ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000180)) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) ftruncate(r1, 0x8200) openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x100, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) r3 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r3, &(0x7f0000007e00), 0x400000000000058, 0x0) 17:56:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0xf, &(0x7f0000000000)={&(0x7f00000022c0)=ANY=[@ANYBLOB="2050ff000301ffff8385efe24400000000000000000c00acc78b000000000000"], 0x20}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$VT_OPENQRY(r3, 0x5600, &(0x7f0000000040)) [ 304.864637][ T4177] kobject: 'loop4' (00000000b1c06a2c): kobject_uevent_env [ 304.872333][ T9969] QAT: Invalid ioctl [ 304.882316][ T9969] QAT: Invalid ioctl [ 304.883089][ T4177] kobject: 'loop4' (00000000b1c06a2c): fill_kobj_path: path = '/devices/virtual/block/loop4' 17:56:20 executing program 3: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0xb78a0745398ce450, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req={0x7fffffff, 0x1, 0x3}, 0x10) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req={0x3, 0x6, 0x2, 0x69}, 0x10) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000140)={0x0, 0x401, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000100)={0x990a68, 0x9, [], @string=&(0x7f00000000c0)=0x6}}) io_uring_enter(r1, 0x10001, 0xfffff000, 0x1, &(0x7f0000000180)={0x47d}, 0x8) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000002, 0x90030, r2, 0x0) getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)=0x0) setfsuid(r3) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0x820, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000300)) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000340)='/dev/video37\x00', 0x2, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x9, 0x20000) fsync(r5) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000440)={{0x4, 0x4, 0x80000001, 0xb02, 'syz0\x00', 0x8a11}, 0x0, 0x562273b20d8fa65e, 0x9, 0x0, 0x5, 0x9, 'syz0\x00', &(0x7f00000003c0)=['/dev/loop#\x00', 'mime_typewlan0lselinux\x00', '/dev/btrfs-control\x00', '\'self*', '/dev/loop#\x00'], 0x46, [], [0x9, 0x1441, 0x1c92, 0x9]}) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ubi_ctrl\x00', 0x100, 0x0) ftruncate(r6, 0xfffffffffffffff7) r7 = openat$vimc0(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r7, 0xc0485661, &(0x7f0000000600)={0x0, 0x2, @stop_pts=0x4}) r8 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r8, 0x0, 0x61, &(0x7f00000006c0)={'filter\x00', 0x1b, "56999928a937e530b5b1e388c7a7f2586d3830622b09c345369af6"}, &(0x7f0000000700)=0x3f) r9 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm-control\x00', 0xb01901, 0x0) ioctl$IMSETDEVNAME(r9, 0x80184947, &(0x7f0000000780)={0x6, 'syz1\x00'}) ioctl$EVIOCGABS0(r8, 0x80184540, &(0x7f00000007c0)=""/4096) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f00000017c0), 0x4) r10 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(r10, 0x401c5820, &(0x7f0000001840)={0x6, 0x0, 0x7, 0xffffff53, 0x3}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000018c0)={0x44ce7b79, 0x8482b0b62089abb4, 0x4, 0x0, 0x1, {0x77359400}, {0x3, 0x2, 0x31, 0xdc, 0x0, 0x3, "3e4d1359"}, 0x1, 0x4, @planes=&(0x7f0000001880)={0x9, 0x5, @mem_offset=0x2, 0x9eff}, 0xea, 0x0, 0xffffffffffffffff}) ioctl$VIDIOC_ENUM_FREQ_BANDS(r11, 0xc0405665, &(0x7f0000001940)={0x6, 0xf34de97cde3266d7, 0x4, 0x32, 0xfff, 0xffff8001, 0x8}) r12 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001980)='/dev/btrfs-control\x00', 0x4000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001a00)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000019c0)={0xffffffffffffffff}, 0x111, 0x53f88393a7f573f4}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r12, &(0x7f0000001a40)={0x6, 0x118, 0xfa00, {{0x3, 0x14c, "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", 0x2, 0x16, 0x6, 0x1f, 0x1c, 0x9, 0x7c}, r13}}, 0x120) [ 304.923308][ T27] audit: type=1400 audit(1577469380.687:53): avc: denied { map_create } for pid=9972 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 17:56:20 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000ff3cf784a56b1c757c068169961cec96adffffff0000000000000000000000000000000000000052"]) getpid() ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000180)) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) ftruncate(r1, 0x8200) openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x100, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) r3 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r3, &(0x7f0000007e00), 0x400000000000058, 0x0) [ 304.974728][ T4177] kobject: 'loop5' (00000000e99ccbc0): kobject_uevent_env [ 305.013609][ T4177] kobject: 'loop5' (00000000e99ccbc0): fill_kobj_path: path = '/devices/virtual/block/loop5' 17:56:20 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000ff3cf784a56b1c757c068169961cec96adffffff0000000000000000000000000000000000000052"]) getpid() ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000180)) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) ftruncate(r1, 0x8200) openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x100, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) r3 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r3, &(0x7f0000007e00), 0x400000000000058, 0x0) 17:56:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) getpgid(0x0) r2 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x5) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x1) r4 = dup2(r3, r2) ppoll(&(0x7f0000000200)=[{r4}], 0x1, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82f8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000440)={'team0\x00'}) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg$kcm(r8, &(0x7f0000000580)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000fc0)=""/131, 0x83}], 0x1}, 0x0) recvmsg$can_j1939(r8, &(0x7f0000000e40)={&(0x7f0000000900)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000740)=""/40, 0x28}, {&(0x7f0000000a00)=""/145, 0x91}, {&(0x7f0000002580)=""/4096, 0x1000}, {&(0x7f0000000ac0)=""/76, 0x4c}, {&(0x7f0000000c40)=""/173, 0xad}, {&(0x7f0000000d00)=""/138, 0x8a}], 0x6, &(0x7f0000003580)=""/4096, 0x1000}, 0x102) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e80)=0x0) sendmsg$nl_route(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=ANY=[@ANYBLOB="701400001100000229bd7000ffdbdf250000dd00e990fa56ccb7e31aee1ac9660c163e07722a476dcc9a4e6a1ac89d01f1bab4c9ede0265eecc668981519415a44f7f68f16d1999ff81cbb152b", @ANYRES32=r9, @ANYBLOB="000400000402040008001300", @ANYRES32=r10, @ANYBLOB="08002c005f00000008001f00040000000c000100aaaaaaaaaaaa00002c0012000c00010062726964676500001c00020008000900bc080000080016001f0000000800020008000000"], 0x5}, 0x1, 0x0, 0x0, 0x8000}, 0x4040090) r11 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r11, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r11, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r12 = gettid() waitid(0x83b895581628fca4, r12, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r13 = socket$inet6(0xa, 0x3, 0x6) r14 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r13, r14, &(0x7f0000000240)=0x202, 0x4000000000dc) [ 305.048620][ T27] audit: type=1400 audit(1577469380.727:54): avc: denied { map_read map_write } for pid=9972 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 305.082079][ T4177] kobject: 'loop3' (00000000d8682b6b): kobject_uevent_env 17:56:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000040)="1c8fc9ccda34ef75d07923774d8ed0e79207af01b77dffa86f1da916f48f412eb3053f19773f66e844970b08820fcc7f622d00"/60}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r0, &(0x7f0000000040)}, 0x20) 17:56:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000040)="1c8fc9ccda34ef75d07923774d8ed0e79207af01b77dffa86f1da916f48f412eb3053f19773f66e844970b08820fcc7f622d00"/60}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r0, &(0x7f0000000040)}, 0x20) [ 305.123392][ T4177] kobject: 'loop3' (00000000d8682b6b): fill_kobj_path: path = '/devices/virtual/block/loop3' 17:56:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000040)="1c8fc9ccda34ef75d07923774d8ed0e79207af01b77dffa86f1da916f48f412eb3053f19773f66e844970b08820fcc7f622d00"/60}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r0, &(0x7f0000000040)}, 0x20) [ 305.194153][ T4177] kobject: 'loop2' (000000008fbeae37): kobject_uevent_env [ 305.246031][ T4177] kobject: 'loop2' (000000008fbeae37): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 305.279598][ T9990] bridge0: port 3(gretap0) entered blocking state [ 305.290596][ C0] protocol 88fb is buggy, dev hsr_slave_0 17:56:21 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000ff3cf784a56b1c757c068169961cec96adffffff0000000000000000000000000000000000000052"]) getpid() ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000180)) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) ftruncate(r1, 0x8200) openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x100, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) r3 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r3, &(0x7f0000007e00), 0x400000000000058, 0x0) [ 305.296405][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 305.318753][ T9990] bridge0: port 3(gretap0) entered disabled state 17:56:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000040)="1c8fc9ccda34ef75d07923774d8ed0e79207af01b77dffa86f1da916f48f412eb3053f19773f66e844970b08820fcc7f622d00"/60}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r0, &(0x7f0000000040)}, 0x20) 17:56:21 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") getsockopt$inet6_int(r0, 0x29, 0x1d, &(0x7f0000b67000), &(0x7f0000000140)=0x4) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000013c0)='/selinux/status\x00', 0x0, 0x0) fstat(r0, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001480)={{{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, @in=@empty, 0x4e23, 0x400, 0x4e22, 0x67c, 0xa, 0x20, 0x80, 0xf8, 0x0, r2}, {0x0, 0x7f, 0x9, 0xae83, 0x8, 0x3ff, 0x200, 0x2}, {0x6, 0x6, 0x100000000, 0x84}, 0x7fff, 0x0, 0x2, 0x0, 0x1, 0x2}, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4d3, 0xff}, 0x8, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3504, 0x2, 0x1, 0x7, 0x101, 0x7, 0x1667}}, 0xe8) [ 305.360373][ T4177] kobject: 'loop4' (00000000b1c06a2c): kobject_uevent_env [ 305.393712][ T9990] kobject: 'brport' (00000000c95904f1): kobject_add_internal: parent: 'gretap0', set: '' [ 305.431181][ T4177] kobject: 'loop4' (00000000b1c06a2c): fill_kobj_path: path = '/devices/virtual/block/loop4' 17:56:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r0, &(0x7f0000000040)}, 0x20) [ 305.479863][ T4177] kobject: 'loop0' (000000002a78f5c6): kobject_uevent_env [ 305.481936][ T9990] device gretap0 entered promiscuous mode [ 305.517088][ T4177] kobject: 'loop0' (000000002a78f5c6): fill_kobj_path: path = '/devices/virtual/block/loop0' 17:56:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x64586a753041c863}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="fc00000048000703ab092500090007000a060000000000000000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf1587c3b41", 0xfc) socket$nl_generic(0x10, 0x3, 0x10) [ 305.519340][ T9990] bridge0: port 3(gretap0) entered blocking state [ 305.533918][ T9990] bridge0: port 3(gretap0) entered forwarding state [ 305.564274][ T4177] kobject: 'loop5' (00000000e99ccbc0): kobject_uevent_env 17:56:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r0, &(0x7f0000000040)}, 0x20) [ 305.588089][ T4177] kobject: 'loop5' (00000000e99ccbc0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 305.613466][ T9990] kobject: 'brport' (00000000c95904f1): kobject_uevent_env 17:56:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r0, &(0x7f0000000040)}, 0x20) [ 305.634217][ T4177] kobject: 'loop0' (000000002a78f5c6): kobject_uevent_env [ 305.654420][ T9990] kobject: 'brport' (00000000c95904f1): kobject_uevent_env: filter function caused the event to drop! [ 305.659142][ T4177] kobject: 'loop0' (000000002a78f5c6): fill_kobj_path: path = '/devices/virtual/block/loop0' 17:56:21 executing program 4: r0 = socket$packet(0x11, 0x282549468a89e4ee, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0xe0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) r13 = dup2(r12, r11) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) r14 = syz_open_dev$tty1(0xc, 0x4, 0x2) r15 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r16, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000001740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r13, @ANYBLOB=',=', @ANYRESHEX=r14, @ANYBLOB=',privport,fsname=/dev/kvm\x00,fowner=', @ANYRESDEC=r16, @ANYBLOB=',\x00']) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$VIDIOC_G_FMT(r10, 0xc0d05604, &(0x7f00000012c0)={0x8, @pix={0xfffffffe, 0xfffff001, 0x0, 0x5, 0x9, 0x101, 0xa, 0x10000, 0x1, 0x1, 0x1, 0x2}}) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000001500)=ANY=[@ANYBLOB="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"/528]) r17 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r17, r2) openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x103801, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x2b}}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000001480)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000200)="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", 0xfffffed9, 0x40, 0x0, 0x159b05d6a4f0d28c) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r10, 0xc008551c, &(0x7f0000000140)=ANY=[@ANYBLOB="c92bd8a2b783dc43b463d42500001000000000000000b3ba0000080000004092bb00"]) socket$can_bcm(0x1d, 0x2, 0x2) [ 305.745532][ T4177] kobject: 'loop1' (00000000b183da1d): kobject_uevent_env [ 305.779073][T10014] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 305.789626][ T4177] kobject: 'loop1' (00000000b183da1d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 305.820792][ T4177] kobject: 'loop0' (000000002a78f5c6): kobject_uevent_env [ 305.827966][ T4177] kobject: 'loop0' (000000002a78f5c6): fill_kobj_path: path = '/devices/virtual/block/loop0' 17:56:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) getpgid(0x0) r2 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x5) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x1) r4 = dup2(r3, r2) ppoll(&(0x7f0000000200)=[{r4}], 0x1, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82f8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000440)={'team0\x00'}) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg$kcm(r8, &(0x7f0000000580)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000fc0)=""/131, 0x83}], 0x1}, 0x0) recvmsg$can_j1939(r8, &(0x7f0000000e40)={&(0x7f0000000900)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000740)=""/40, 0x28}, {&(0x7f0000000a00)=""/145, 0x91}, {&(0x7f0000002580)=""/4096, 0x1000}, {&(0x7f0000000ac0)=""/76, 0x4c}, {&(0x7f0000000c40)=""/173, 0xad}, {&(0x7f0000000d00)=""/138, 0x8a}], 0x6, &(0x7f0000003580)=""/4096, 0x1000}, 0x102) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e80)=0x0) sendmsg$nl_route(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=ANY=[@ANYBLOB="701400001100000229bd7000ffdbdf250000dd00e990fa56ccb7e31aee1ac9660c163e07722a476dcc9a4e6a1ac89d01f1bab4c9ede0265eecc668981519415a44f7f68f16d1999ff81cbb152b", @ANYRES32=r9, @ANYBLOB="000400000402040008001300", @ANYRES32=r10, @ANYBLOB="08002c005f00000008001f00040000000c000100aaaaaaaaaaaa00002c0012000c00010062726964676500001c00020008000900bc080000080016001f0000000800020008000000"], 0x5}, 0x1, 0x0, 0x0, 0x8000}, 0x4040090) r11 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r11, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r11, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r12 = gettid() waitid(0x83b895581628fca4, r12, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r13 = socket$inet6(0xa, 0x3, 0x6) r14 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r13, r14, &(0x7f0000000240)=0x202, 0x4000000000dc) 17:56:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r0, &(0x7f0000000040)}, 0x20) 17:56:21 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") getsockopt$inet6_int(r0, 0x29, 0x1d, &(0x7f0000b67000), &(0x7f0000000140)=0x4) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000013c0)='/selinux/status\x00', 0x0, 0x0) fstat(r0, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001480)={{{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, @in=@empty, 0x4e23, 0x400, 0x4e22, 0x67c, 0xa, 0x20, 0x80, 0xf8, 0x0, r2}, {0x0, 0x7f, 0x9, 0xae83, 0x8, 0x3ff, 0x200, 0x2}, {0x6, 0x6, 0x100000000, 0x84}, 0x7fff, 0x0, 0x2, 0x0, 0x1, 0x2}, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4d3, 0xff}, 0x8, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3504, 0x2, 0x1, 0x7, 0x101, 0x7, 0x1667}}, 0xe8) 17:56:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r0, &(0x7f0000000040)}, 0x20) 17:56:21 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000ff3cf784a56b1c757c068169961cec96adffffff0000000000000000000000000000000000000052"]) getpid() ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000180)) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) ftruncate(r1, 0x8200) openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x100, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) r3 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r3, &(0x7f0000007e00), 0x400000000000058, 0x0) [ 305.850165][ T4177] kobject: 'loop4' (00000000b1c06a2c): kobject_uevent_env [ 305.862275][ T4177] kobject: 'loop4' (00000000b1c06a2c): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 305.865764][T10014] kobject: 'kvm' (00000000ca696e4f): kobject_uevent_env [ 305.874028][ T4177] kobject: 'loop0' (000000002a78f5c6): kobject_uevent_env [ 305.889296][ T4177] kobject: 'loop0' (000000002a78f5c6): fill_kobj_path: path = '/devices/virtual/block/loop0' 17:56:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r0, &(0x7f0000000040)}, 0x20) 17:56:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000040)="1c8fc9ccda34ef75d07923774d8ed0e79207af01b77dffa86f1da916f48f412eb3053f19773f66e844970b08820fcc7f622d00"/60}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) [ 305.937331][ T4177] kobject: 'loop3' (00000000d8682b6b): kobject_uevent_env [ 305.942012][T10014] kobject: 'kvm' (00000000ca696e4f): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 305.960435][ T4177] kobject: 'loop3' (00000000d8682b6b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 305.976327][T10013] kobject: 'kvm' (00000000ca696e4f): kobject_uevent_env 17:56:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) getpgid(0x0) r2 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x5) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x1) r4 = dup2(r3, r2) ppoll(&(0x7f0000000200)=[{r4}], 0x1, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82f8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000440)={'team0\x00'}) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg$kcm(r8, &(0x7f0000000580)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000fc0)=""/131, 0x83}], 0x1}, 0x0) recvmsg$can_j1939(r8, &(0x7f0000000e40)={&(0x7f0000000900)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000740)=""/40, 0x28}, {&(0x7f0000000a00)=""/145, 0x91}, {&(0x7f0000002580)=""/4096, 0x1000}, {&(0x7f0000000ac0)=""/76, 0x4c}, {&(0x7f0000000c40)=""/173, 0xad}, {&(0x7f0000000d00)=""/138, 0x8a}], 0x6, &(0x7f0000003580)=""/4096, 0x1000}, 0x102) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e80)=0x0) sendmsg$nl_route(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=ANY=[@ANYBLOB="701400001100000229bd7000ffdbdf250000dd00e990fa56ccb7e31aee1ac9660c163e07722a476dcc9a4e6a1ac89d01f1bab4c9ede0265eecc668981519415a44f7f68f16d1999ff81cbb152b", @ANYRES32=r9, @ANYBLOB="000400000402040008001300", @ANYRES32=r10, @ANYBLOB="08002c005f00000008001f00040000000c000100aaaaaaaaaaaa00002c0012000c00010062726964676500001c00020008000900bc080000080016001f0000000800020008000000"], 0x5}, 0x1, 0x0, 0x0, 0x8000}, 0x4040090) r11 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r11, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r11, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r12 = gettid() waitid(0x83b895581628fca4, r12, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r13 = socket$inet6(0xa, 0x3, 0x6) r14 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r13, r14, &(0x7f0000000240)=0x202, 0x4000000000dc) 17:56:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) getpgid(0x0) r2 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x5) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x1) r4 = dup2(r3, r2) ppoll(&(0x7f0000000200)=[{r4}], 0x1, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82f8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000440)={'team0\x00'}) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg$kcm(r8, &(0x7f0000000580)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000fc0)=""/131, 0x83}], 0x1}, 0x0) recvmsg$can_j1939(r8, &(0x7f0000000e40)={&(0x7f0000000900)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000740)=""/40, 0x28}, {&(0x7f0000000a00)=""/145, 0x91}, {&(0x7f0000002580)=""/4096, 0x1000}, {&(0x7f0000000ac0)=""/76, 0x4c}, {&(0x7f0000000c40)=""/173, 0xad}, {&(0x7f0000000d00)=""/138, 0x8a}], 0x6, &(0x7f0000003580)=""/4096, 0x1000}, 0x102) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e80)=0x0) sendmsg$nl_route(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=ANY=[@ANYBLOB="701400001100000229bd7000ffdbdf250000dd00e990fa56ccb7e31aee1ac9660c163e07722a476dcc9a4e6a1ac89d01f1bab4c9ede0265eecc668981519415a44f7f68f16d1999ff81cbb152b", @ANYRES32=r9, @ANYBLOB="000400000402040008001300", @ANYRES32=r10, @ANYBLOB="08002c005f00000008001f00040000000c000100aaaaaaaaaaaa00002c0012000c00010062726964676500001c00020008000900bc080000080016001f0000000800020008000000"], 0x5}, 0x1, 0x0, 0x0, 0x8000}, 0x4040090) r11 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r11, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r11, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r12 = gettid() waitid(0x83b895581628fca4, r12, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r13 = socket$inet6(0xa, 0x3, 0x6) r14 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r13, r14, &(0x7f0000000240)=0x202, 0x4000000000dc) [ 306.004873][ T4177] kobject: 'loop0' (000000002a78f5c6): kobject_uevent_env [ 306.017478][T10013] kobject: 'kvm' (00000000ca696e4f): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 306.039717][ T4177] kobject: 'loop0' (000000002a78f5c6): fill_kobj_path: path = '/devices/virtual/block/loop0' 17:56:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) 17:56:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000040)="1c8fc9ccda34ef75d07923774d8ed0e79207af01b77dffa86f1da916f48f412eb3053f19773f66e844970b08820fcc7f622d00"/60}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) [ 306.105204][ T4177] kobject: 'loop1' (00000000b183da1d): kobject_uevent_env [ 306.141530][T10032] bridge0: port 3(gretap0) entered blocking state [ 306.164940][ T4177] kobject: 'loop1' (00000000b183da1d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 306.176807][T10032] bridge0: port 3(gretap0) entered disabled state [ 306.208967][T10032] kobject: 'brport' (00000000516b5409): kobject_add_internal: parent: 'gretap0', set: '' [ 306.209633][ T4177] kobject: 'loop5' (00000000e99ccbc0): kobject_uevent_env [ 306.229557][ T4177] kobject: 'loop5' (00000000e99ccbc0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 306.245557][T10032] device gretap0 entered promiscuous mode [ 306.264188][ T4177] kobject: 'loop2' (000000008fbeae37): kobject_uevent_env [ 306.275826][T10032] bridge0: port 3(gretap0) entered blocking state [ 306.282443][T10032] bridge0: port 3(gretap0) entered forwarding state [ 306.293303][ T4177] kobject: 'loop2' (000000008fbeae37): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 306.304845][ T4177] kobject: 'loop0' (000000002a78f5c6): kobject_uevent_env [ 306.313629][ T4177] kobject: 'loop0' (000000002a78f5c6): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 306.319387][T10032] kobject: 'brport' (00000000516b5409): kobject_uevent_env [ 306.325204][ T4177] kobject: 'loop3' (00000000d8682b6b): kobject_uevent_env [ 306.332085][T10032] kobject: 'brport' (00000000516b5409): kobject_uevent_env: filter function caused the event to drop! [ 306.341532][ T4177] kobject: 'loop3' (00000000d8682b6b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 306.366960][ T4177] kobject: 'loop5' (00000000e99ccbc0): kobject_uevent_env [ 306.374194][ T4177] kobject: 'loop5' (00000000e99ccbc0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 306.386666][ T4177] kobject: 'loop2' (000000008fbeae37): kobject_uevent_env [ 306.394028][ T4177] kobject: 'loop2' (000000008fbeae37): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 306.405216][ T4177] kobject: 'loop2' (000000008fbeae37): kobject_uevent_env [ 306.413920][ T4177] kobject: 'loop2' (000000008fbeae37): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 306.425162][ T4177] kobject: 'loop1' (00000000b183da1d): kobject_uevent_env [ 306.432451][ T4177] kobject: 'loop1' (00000000b183da1d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 306.464963][T10014] kobject: 'kvm' (00000000ca696e4f): kobject_uevent_env [ 306.516611][T10014] kobject: 'kvm' (00000000ca696e4f): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 306.646860][T10014] kobject: 'kvm' (00000000ca696e4f): kobject_uevent_env [ 306.688277][ T4177] kobject: 'loop5' (00000000e99ccbc0): kobject_uevent_env [ 306.704545][ T4177] kobject: 'loop5' (00000000e99ccbc0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 306.724287][T10014] kobject: 'kvm' (00000000ca696e4f): fill_kobj_path: path = '/devices/virtual/misc/kvm' 17:56:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) getpgid(0x0) r2 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x5) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x1) r4 = dup2(r3, r2) ppoll(&(0x7f0000000200)=[{r4}], 0x1, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82f8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000440)={'team0\x00'}) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg$kcm(r8, &(0x7f0000000580)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000fc0)=""/131, 0x83}], 0x1}, 0x0) recvmsg$can_j1939(r8, &(0x7f0000000e40)={&(0x7f0000000900)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000740)=""/40, 0x28}, {&(0x7f0000000a00)=""/145, 0x91}, {&(0x7f0000002580)=""/4096, 0x1000}, {&(0x7f0000000ac0)=""/76, 0x4c}, {&(0x7f0000000c40)=""/173, 0xad}, {&(0x7f0000000d00)=""/138, 0x8a}], 0x6, &(0x7f0000003580)=""/4096, 0x1000}, 0x102) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e80)=0x0) sendmsg$nl_route(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=ANY=[@ANYBLOB="701400001100000229bd7000ffdbdf250000dd00e990fa56ccb7e31aee1ac9660c163e07722a476dcc9a4e6a1ac89d01f1bab4c9ede0265eecc668981519415a44f7f68f16d1999ff81cbb152b", @ANYRES32=r9, @ANYBLOB="000400000402040008001300", @ANYRES32=r10, @ANYBLOB="08002c005f00000008001f00040000000c000100aaaaaaaaaaaa00002c0012000c00010062726964676500001c00020008000900bc080000080016001f0000000800020008000000"], 0x5}, 0x1, 0x0, 0x0, 0x8000}, 0x4040090) r11 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r11, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r11, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r12 = gettid() waitid(0x83b895581628fca4, r12, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r13 = socket$inet6(0xa, 0x3, 0x6) r14 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r13, r14, &(0x7f0000000240)=0x202, 0x4000000000dc) 17:56:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000040)="1c8fc9ccda34ef75d07923774d8ed0e79207af01b77dffa86f1da916f48f412eb3053f19773f66e844970b08820fcc7f622d00"/60}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) 17:56:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) 17:56:22 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000ff3cf784a56b1c757c068169961cec96adffffff0000000000000000000000000000000000000052"]) getpid() ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000180)) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) ftruncate(r1, 0x8200) openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x100, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) r3 = socket$inet6(0xa, 0x3, 0x6) sendmmsg(r3, &(0x7f0000007e00), 0x400000000000058, 0x0) 17:56:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) getpgid(0x0) r2 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x5) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x1) r4 = dup2(r3, r2) ppoll(&(0x7f0000000200)=[{r4}], 0x1, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82f8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000440)={'team0\x00'}) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg$kcm(r8, &(0x7f0000000580)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000fc0)=""/131, 0x83}], 0x1}, 0x0) recvmsg$can_j1939(r8, &(0x7f0000000e40)={&(0x7f0000000900)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000740)=""/40, 0x28}, {&(0x7f0000000a00)=""/145, 0x91}, {&(0x7f0000002580)=""/4096, 0x1000}, {&(0x7f0000000ac0)=""/76, 0x4c}, {&(0x7f0000000c40)=""/173, 0xad}, {&(0x7f0000000d00)=""/138, 0x8a}], 0x6, &(0x7f0000003580)=""/4096, 0x1000}, 0x102) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e80)=0x0) sendmsg$nl_route(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=ANY=[@ANYBLOB="701400001100000229bd7000ffdbdf250000dd00e990fa56ccb7e31aee1ac9660c163e07722a476dcc9a4e6a1ac89d01f1bab4c9ede0265eecc668981519415a44f7f68f16d1999ff81cbb152b", @ANYRES32=r9, @ANYBLOB="000400000402040008001300", @ANYRES32=r10, @ANYBLOB="08002c005f00000008001f00040000000c000100aaaaaaaaaaaa00002c0012000c00010062726964676500001c00020008000900bc080000080016001f0000000800020008000000"], 0x5}, 0x1, 0x0, 0x0, 0x8000}, 0x4040090) r11 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r11, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r11, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r12 = gettid() waitid(0x83b895581628fca4, r12, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r13 = socket$inet6(0xa, 0x3, 0x6) r14 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r13, r14, &(0x7f0000000240)=0x202, 0x4000000000dc) 17:56:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) getpgid(0x0) r2 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x5) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x1) r4 = dup2(r3, r2) ppoll(&(0x7f0000000200)=[{r4}], 0x1, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82f8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000440)={'team0\x00'}) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg$kcm(r8, &(0x7f0000000580)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000fc0)=""/131, 0x83}], 0x1}, 0x0) recvmsg$can_j1939(r8, &(0x7f0000000e40)={&(0x7f0000000900)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000740)=""/40, 0x28}, {&(0x7f0000000a00)=""/145, 0x91}, {&(0x7f0000002580)=""/4096, 0x1000}, {&(0x7f0000000ac0)=""/76, 0x4c}, {&(0x7f0000000c40)=""/173, 0xad}, {&(0x7f0000000d00)=""/138, 0x8a}], 0x6, &(0x7f0000003580)=""/4096, 0x1000}, 0x102) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e80)=0x0) sendmsg$nl_route(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=ANY=[@ANYBLOB="701400001100000229bd7000ffdbdf250000dd00e990fa56ccb7e31aee1ac9660c163e07722a476dcc9a4e6a1ac89d01f1bab4c9ede0265eecc668981519415a44f7f68f16d1999ff81cbb152b", @ANYRES32=r9, @ANYBLOB="000400000402040008001300", @ANYRES32=r10, @ANYBLOB="08002c005f00000008001f00040000000c000100aaaaaaaaaaaa00002c0012000c00010062726964676500001c00020008000900bc080000080016001f0000000800020008000000"], 0x5}, 0x1, 0x0, 0x0, 0x8000}, 0x4040090) r11 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r11, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r11, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r12 = gettid() waitid(0x83b895581628fca4, r12, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r13 = socket$inet6(0xa, 0x3, 0x6) r14 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r13, r14, &(0x7f0000000240)=0x202, 0x4000000000dc) 17:56:22 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000040)="1c8fc9ccda34ef75d07923774d8ed0e79207af01b77dffa86f1da916f48f412eb3053f19773f66e844970b08820fcc7f622d00"/60}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r0, &(0x7f0000000040)}, 0x20) [ 306.798585][ T4177] kobject: 'loop4' (00000000b1c06a2c): kobject_uevent_env 17:56:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) [ 306.854048][ T4177] kobject: 'loop4' (00000000b1c06a2c): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 306.890816][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 306.896600][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 306.937596][ T4177] kobject: 'loop2' (000000008fbeae37): kobject_uevent_env [ 306.962303][ T4177] kobject: 'loop2' (000000008fbeae37): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 306.970599][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 306.972712][ C0] protocol 88fb is buggy, dev hsr_slave_0 17:56:22 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000ff3cf784a56b1c757c068169961cec96adffffff0000000000000000000000000000000000000052"]) getpid() ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000180)) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) ftruncate(r1, 0x8200) openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x100, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) r3 = socket$inet6(0xa, 0x3, 0x6) sendmmsg(r3, &(0x7f0000007e00), 0x400000000000058, 0x0) 17:56:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) getpgid(0x0) r2 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x5) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x1) r4 = dup2(r3, r2) ppoll(&(0x7f0000000200)=[{r4}], 0x1, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82f8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000440)={'team0\x00'}) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg$kcm(r8, &(0x7f0000000580)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000fc0)=""/131, 0x83}], 0x1}, 0x0) recvmsg$can_j1939(r8, &(0x7f0000000e40)={&(0x7f0000000900)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000740)=""/40, 0x28}, {&(0x7f0000000a00)=""/145, 0x91}, {&(0x7f0000002580)=""/4096, 0x1000}, {&(0x7f0000000ac0)=""/76, 0x4c}, {&(0x7f0000000c40)=""/173, 0xad}, {&(0x7f0000000d00)=""/138, 0x8a}], 0x6, &(0x7f0000003580)=""/4096, 0x1000}, 0x102) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e80)=0x0) sendmsg$nl_route(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=ANY=[@ANYBLOB="701400001100000229bd7000ffdbdf250000dd00e990fa56ccb7e31aee1ac9660c163e07722a476dcc9a4e6a1ac89d01f1bab4c9ede0265eecc668981519415a44f7f68f16d1999ff81cbb152b", @ANYRES32=r9, @ANYBLOB="000400000402040008001300", @ANYRES32=r10, @ANYBLOB="08002c005f00000008001f00040000000c000100aaaaaaaaaaaa00002c0012000c00010062726964676500001c00020008000900bc080000080016001f0000000800020008000000"], 0x5}, 0x1, 0x0, 0x0, 0x8000}, 0x4040090) r11 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r11, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r11, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r12 = gettid() waitid(0x83b895581628fca4, r12, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r13 = socket$inet6(0xa, 0x3, 0x6) r14 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r13, r14, &(0x7f0000000240)=0x202, 0x4000000000dc) [ 306.978335][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 306.984066][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 307.024182][T10076] bridge0: port 3(gretap0) entered blocking state 17:56:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) getpgid(0x0) r2 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x5) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x1) r4 = dup2(r3, r2) ppoll(&(0x7f0000000200)=[{r4}], 0x1, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82f8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000440)={'team0\x00'}) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg$kcm(r8, &(0x7f0000000580)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000fc0)=""/131, 0x83}], 0x1}, 0x0) recvmsg$can_j1939(r8, &(0x7f0000000e40)={&(0x7f0000000900)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000740)=""/40, 0x28}, {&(0x7f0000000a00)=""/145, 0x91}, {&(0x7f0000002580)=""/4096, 0x1000}, {&(0x7f0000000ac0)=""/76, 0x4c}, {&(0x7f0000000c40)=""/173, 0xad}, {&(0x7f0000000d00)=""/138, 0x8a}], 0x6, &(0x7f0000003580)=""/4096, 0x1000}, 0x102) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e80)=0x0) sendmsg$nl_route(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=ANY=[@ANYBLOB="701400001100000229bd7000ffdbdf250000dd00e990fa56ccb7e31aee1ac9660c163e07722a476dcc9a4e6a1ac89d01f1bab4c9ede0265eecc668981519415a44f7f68f16d1999ff81cbb152b", @ANYRES32=r9, @ANYBLOB="000400000402040008001300", @ANYRES32=r10, @ANYBLOB="08002c005f00000008001f00040000000c000100aaaaaaaaaaaa00002c0012000c00010062726964676500001c00020008000900bc080000080016001f0000000800020008000000"], 0x5}, 0x1, 0x0, 0x0, 0x8000}, 0x4040090) r11 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r11, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r11, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r12 = gettid() waitid(0x83b895581628fca4, r12, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r13 = socket$inet6(0xa, 0x3, 0x6) sendfile(r13, 0xffffffffffffffff, &(0x7f0000000240)=0x202, 0x4000000000dc) 17:56:22 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000040)="1c8fc9ccda34ef75d07923774d8ed0e79207af01b77dffa86f1da916f48f412eb3053f19773f66e844970b08820fcc7f622d00"/60}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r0, &(0x7f0000000040)}, 0x20) [ 307.039606][T10076] bridge0: port 3(gretap0) entered disabled state [ 307.081952][ T4177] kobject: 'loop1' (00000000b183da1d): kobject_uevent_env [ 307.089328][ T4177] kobject: 'loop1' (00000000b183da1d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 307.123083][T10076] kobject: 'brport' (00000000ce641855): kobject_add_internal: parent: 'gretap0', set: '' [ 307.158462][ T4177] kobject: 'loop3' (00000000d8682b6b): kobject_uevent_env [ 307.181787][T10076] device gretap0 entered promiscuous mode [ 307.189058][T10076] bridge0: port 3(gretap0) entered blocking state [ 307.194956][ T4177] kobject: 'loop3' (00000000d8682b6b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 307.195804][T10076] bridge0: port 3(gretap0) entered forwarding state [ 307.209863][ T4177] kobject: 'loop5' (00000000e99ccbc0): kobject_uevent_env [ 307.221710][T10076] kobject: 'brport' (00000000ce641855): kobject_uevent_env [ 307.228545][ T4177] kobject: 'loop5' (00000000e99ccbc0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 307.238797][T10076] kobject: 'brport' (00000000ce641855): kobject_uevent_env: filter function caused the event to drop! [ 307.254204][ T4177] kobject: 'loop0' (000000002a78f5c6): kobject_uevent_env [ 307.273842][ T4177] kobject: 'loop0' (000000002a78f5c6): fill_kobj_path: path = '/devices/virtual/block/loop0' 17:56:23 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000ff3cf784a56b1c757c068169961cec96adffffff0000000000000000000000000000000000000052"]) getpid() ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000180)) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) ftruncate(r1, 0x8200) openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x100, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) r3 = socket$inet6(0xa, 0x3, 0x6) sendmmsg(r3, &(0x7f0000007e00), 0x400000000000058, 0x0) 17:56:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) getpgid(0x0) r2 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x5) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x1) r4 = dup2(r3, r2) ppoll(&(0x7f0000000200)=[{r4}], 0x1, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82f8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000440)={'team0\x00'}) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg$kcm(r8, &(0x7f0000000580)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000fc0)=""/131, 0x83}], 0x1}, 0x0) recvmsg$can_j1939(r8, &(0x7f0000000e40)={&(0x7f0000000900)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000740)=""/40, 0x28}, {&(0x7f0000000a00)=""/145, 0x91}, {&(0x7f0000002580)=""/4096, 0x1000}, {&(0x7f0000000ac0)=""/76, 0x4c}, {&(0x7f0000000c40)=""/173, 0xad}, {&(0x7f0000000d00)=""/138, 0x8a}], 0x6, &(0x7f0000003580)=""/4096, 0x1000}, 0x102) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e80)=0x0) sendmsg$nl_route(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=ANY=[@ANYBLOB="701400001100000229bd7000ffdbdf250000dd00e990fa56ccb7e31aee1ac9660c163e07722a476dcc9a4e6a1ac89d01f1bab4c9ede0265eecc668981519415a44f7f68f16d1999ff81cbb152b", @ANYRES32=r9, @ANYBLOB="000400000402040008001300", @ANYRES32=r10, @ANYBLOB="08002c005f00000008001f00040000000c000100aaaaaaaaaaaa00002c0012000c00010062726964676500001c00020008000900bc080000080016001f0000000800020008000000"], 0x5}, 0x1, 0x0, 0x0, 0x8000}, 0x4040090) r11 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r11, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r11, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r12 = gettid() waitid(0x83b895581628fca4, r12, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r13 = socket$inet6(0xa, 0x3, 0x6) sendfile(r13, 0xffffffffffffffff, &(0x7f0000000240)=0x202, 0x4000000000dc) 17:56:23 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000ff3cf784a56b1c757c068169961cec96adffffff0000000000000000000000000000000000000052"]) getpid() ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000180)) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) ftruncate(r1, 0x8200) openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x100, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) r3 = socket$inet6(0xa, 0x3, 0x6) sendmmsg(r3, &(0x7f0000007e00), 0x400000000000058, 0x0) 17:56:23 executing program 2: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) 17:56:23 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000040)="1c8fc9ccda34ef75d07923774d8ed0e79207af01b77dffa86f1da916f48f412eb3053f19773f66e844970b08820fcc7f622d00"/60}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r0, &(0x7f0000000040)}, 0x20) 17:56:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) getpgid(0x0) r2 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x5) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x1) r4 = dup2(r3, r2) ppoll(&(0x7f0000000200)=[{r4}], 0x1, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82f8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000440)={'team0\x00'}) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg$kcm(r8, &(0x7f0000000580)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000fc0)=""/131, 0x83}], 0x1}, 0x0) recvmsg$can_j1939(r8, &(0x7f0000000e40)={&(0x7f0000000900)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000740)=""/40, 0x28}, {&(0x7f0000000a00)=""/145, 0x91}, {&(0x7f0000002580)=""/4096, 0x1000}, {&(0x7f0000000ac0)=""/76, 0x4c}, {&(0x7f0000000c40)=""/173, 0xad}, {&(0x7f0000000d00)=""/138, 0x8a}], 0x6, &(0x7f0000003580)=""/4096, 0x1000}, 0x102) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e80)=0x0) sendmsg$nl_route(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=ANY=[@ANYBLOB="701400001100000229bd7000ffdbdf250000dd00e990fa56ccb7e31aee1ac9660c163e07722a476dcc9a4e6a1ac89d01f1bab4c9ede0265eecc668981519415a44f7f68f16d1999ff81cbb152b", @ANYRES32=r9, @ANYBLOB="000400000402040008001300", @ANYRES32=r10, @ANYBLOB="08002c005f00000008001f00040000000c000100aaaaaaaaaaaa00002c0012000c00010062726964676500001c00020008000900bc080000080016001f0000000800020008000000"], 0x5}, 0x1, 0x0, 0x0, 0x8000}, 0x4040090) r11 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r11, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r11, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r12 = gettid() waitid(0x83b895581628fca4, r12, &(0x7f0000000040), 0x2, &(0x7f0000000480)) socket$inet6(0xa, 0x3, 0x6) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') [ 307.376596][ T4177] kobject: 'loop5' (00000000e99ccbc0): kobject_uevent_env [ 307.413415][ T4177] kobject: 'loop5' (00000000e99ccbc0): fill_kobj_path: path = '/devices/virtual/block/loop5' 17:56:23 executing program 2: bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) 17:56:23 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000040)="1c8fc9ccda34ef75d07923774d8ed0e79207af01b77dffa86f1da916f48f412eb3053f19773f66e844970b08820fcc7f622d00"/60}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r0, &(0x7f0000000040)}, 0x20) 17:56:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) getpgid(0x0) r2 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x5) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x1) r4 = dup2(r3, r2) ppoll(&(0x7f0000000200)=[{r4}], 0x1, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82f8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000440)={'team0\x00'}) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg$kcm(r8, &(0x7f0000000580)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000fc0)=""/131, 0x83}], 0x1}, 0x0) recvmsg$can_j1939(r8, &(0x7f0000000e40)={&(0x7f0000000900)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000740)=""/40, 0x28}, {&(0x7f0000000a00)=""/145, 0x91}, {&(0x7f0000002580)=""/4096, 0x1000}, {&(0x7f0000000ac0)=""/76, 0x4c}, {&(0x7f0000000c40)=""/173, 0xad}, {&(0x7f0000000d00)=""/138, 0x8a}], 0x6, &(0x7f0000003580)=""/4096, 0x1000}, 0x102) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e80)=0x0) sendmsg$nl_route(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=ANY=[@ANYBLOB="701400001100000229bd7000ffdbdf250000dd00e990fa56ccb7e31aee1ac9660c163e07722a476dcc9a4e6a1ac89d01f1bab4c9ede0265eecc668981519415a44f7f68f16d1999ff81cbb152b", @ANYRES32=r9, @ANYBLOB="000400000402040008001300", @ANYRES32=r10, @ANYBLOB="08002c005f00000008001f00040000000c000100aaaaaaaaaaaa00002c0012000c00010062726964676500001c00020008000900bc080000080016001f0000000800020008000000"], 0x5}, 0x1, 0x0, 0x0, 0x8000}, 0x4040090) r11 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r11, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r11, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r12 = gettid() waitid(0x83b895581628fca4, r12, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r13 = socket$inet6(0xa, 0x3, 0x6) sendfile(r13, 0xffffffffffffffff, &(0x7f0000000240)=0x202, 0x4000000000dc) 17:56:23 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000ff3cf784a56b1c757c068169961cec96adffffff0000000000000000000000000000000000000052"]) getpid() ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000180)) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) ftruncate(r1, 0x8200) openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x100, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x400000000000058, 0x0) [ 307.460195][ T4177] kobject: 'loop3' (00000000d8682b6b): kobject_uevent_env [ 307.489426][ T4177] kobject: 'loop3' (00000000d8682b6b): fill_kobj_path: path = '/devices/virtual/block/loop3' 17:56:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) getpgid(0x0) r2 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x5) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x1) r4 = dup2(r3, r2) ppoll(&(0x7f0000000200)=[{r4}], 0x1, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82f8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000440)={'team0\x00'}) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg$kcm(r8, &(0x7f0000000580)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000fc0)=""/131, 0x83}], 0x1}, 0x0) recvmsg$can_j1939(r8, &(0x7f0000000e40)={&(0x7f0000000900)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000740)=""/40, 0x28}, {&(0x7f0000000a00)=""/145, 0x91}, {&(0x7f0000002580)=""/4096, 0x1000}, {&(0x7f0000000ac0)=""/76, 0x4c}, {&(0x7f0000000c40)=""/173, 0xad}, {&(0x7f0000000d00)=""/138, 0x8a}], 0x6, &(0x7f0000003580)=""/4096, 0x1000}, 0x102) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e80)=0x0) sendmsg$nl_route(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=ANY=[@ANYBLOB="701400001100000229bd7000ffdbdf250000dd00e990fa56ccb7e31aee1ac9660c163e07722a476dcc9a4e6a1ac89d01f1bab4c9ede0265eecc668981519415a44f7f68f16d1999ff81cbb152b", @ANYRES32=r9, @ANYBLOB="000400000402040008001300", @ANYRES32=r10, @ANYBLOB="08002c005f00000008001f00040000000c000100aaaaaaaaaaaa00002c0012000c00010062726964676500001c00020008000900bc080000080016001f0000000800020008000000"], 0x5}, 0x1, 0x0, 0x0, 0x8000}, 0x4040090) r11 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r11, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r11, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r12 = gettid() waitid(0x83b895581628fca4, r12, &(0x7f0000000040), 0x2, &(0x7f0000000480)) socket$inet6(0xa, 0x3, 0x6) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') 17:56:23 executing program 2: bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) [ 307.548951][ T4177] kobject: 'loop4' (00000000b1c06a2c): kobject_uevent_env 17:56:23 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000ff3cf784a56b1c757c068169961cec96adffffff0000000000000000000000000000000000000052"]) getpid() ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000180)) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) ftruncate(r1, 0x8200) openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x100, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) r3 = socket$inet6(0xa, 0x3, 0x6) sendmmsg(r3, &(0x7f0000007e00), 0x400000000000058, 0x0) 17:56:23 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000040)="1c8fc9ccda34ef75d07923774d8ed0e79207af01b77dffa86f1da916f48f412eb3053f19773f66e844970b08820fcc7f622d00"/60}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r0, &(0x7f0000000040)}, 0x20) [ 307.590476][ T4177] kobject: 'loop4' (00000000b1c06a2c): fill_kobj_path: path = '/devices/virtual/block/loop4' 17:56:23 executing program 2: bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) 17:56:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) r1 = getpid() s