[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 58.503809][ T26] audit: type=1800 audit(1559675016.713:25): pid=8776 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 58.541520][ T26] audit: type=1800 audit(1559675016.713:26): pid=8776 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 58.600329][ T26] audit: type=1800 audit(1559675016.713:27): pid=8776 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.129' (ECDSA) to the list of known hosts. 2019/06/04 19:03:47 fuzzer started 2019/06/04 19:03:51 dialing manager at 10.128.0.26:43931 2019/06/04 19:03:51 syscalls: 2465 2019/06/04 19:03:51 code coverage: enabled 2019/06/04 19:03:51 comparison tracing: enabled 2019/06/04 19:03:51 extra coverage: extra coverage is not supported by the kernel 2019/06/04 19:03:51 setuid sandbox: enabled 2019/06/04 19:03:51 namespace sandbox: enabled 2019/06/04 19:03:51 Android sandbox: /sys/fs/selinux/policy does not exist 2019/06/04 19:03:51 fault injection: enabled 2019/06/04 19:03:51 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/06/04 19:03:51 net packet injection: enabled 2019/06/04 19:03:51 net device setup: enabled 19:05:52 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000400)="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", 0x200) sendfile(r0, r1, 0x0, 0x10000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) syzkaller login: [ 194.821895][ T8944] IPVS: ftp: loaded support on port[0] = 21 19:05:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x181, &(0x7f0000000180)=0x9) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r0, 0x0, 0x420000a77, 0x0) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0xfffffd88) close(r1) [ 194.971237][ T8944] chnl_net:caif_netlink_parms(): no params data found [ 195.048598][ T8944] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.057235][ T8944] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.065542][ T8944] device bridge_slave_0 entered promiscuous mode [ 195.075869][ T8944] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.083043][ T8944] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.092769][ T8944] device bridge_slave_1 entered promiscuous mode [ 195.115049][ T8947] IPVS: ftp: loaded support on port[0] = 21 [ 195.121640][ T8944] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 195.133697][ T8944] bond0: Enslaving bond_slave_1 as an active interface with an up link 19:05:53 executing program 2: r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f0000000640)={&(0x7f0000006e80)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000006e40)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @initdev}}}], 0x20}, 0x0) [ 195.162530][ T8944] team0: Port device team_slave_0 added [ 195.173241][ T8944] team0: Port device team_slave_1 added [ 195.245361][ T8944] device hsr_slave_0 entered promiscuous mode [ 195.311941][ T8944] device hsr_slave_1 entered promiscuous mode 19:05:53 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) capget(&(0x7f0000000000), 0x0) [ 195.454771][ T8944] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.456239][ T8949] IPVS: ftp: loaded support on port[0] = 21 [ 195.462104][ T8944] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.462774][ T8944] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.482500][ T8944] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.620010][ T8952] IPVS: ftp: loaded support on port[0] = 21 [ 195.663917][ T8944] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.685851][ T8947] chnl_net:caif_netlink_parms(): no params data found 19:05:54 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000380)=0x70, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='veno\x00', 0x5) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x81b0) [ 195.764922][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.778601][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.798053][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.809840][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 195.828125][ T8944] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.959778][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.970307][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.977744][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.988338][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 195.996945][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.004083][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state 19:05:54 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000380)=0x70, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x81b0) [ 196.078853][ T8947] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.086822][ T8958] IPVS: ftp: loaded support on port[0] = 21 [ 196.097858][ T8947] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.112490][ T8947] device bridge_slave_0 entered promiscuous mode [ 196.121790][ T8954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 196.137514][ T8954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 196.147068][ T8954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 196.158194][ T8954] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 196.167922][ T8954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 196.178937][ T8954] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 196.206531][ T8949] chnl_net:caif_netlink_parms(): no params data found [ 196.224249][ T8947] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.231328][ T8947] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.239541][ T8947] device bridge_slave_1 entered promiscuous mode [ 196.263345][ T8947] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 196.273288][ T8954] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 196.282211][ T8954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 196.290639][ T8954] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 196.299481][ T8954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 196.308311][ T8954] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 196.335915][ T8944] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 196.345761][ T8947] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 196.386961][ T8947] team0: Port device team_slave_0 added [ 196.394924][ T8952] chnl_net:caif_netlink_parms(): no params data found [ 196.409564][ T8961] IPVS: ftp: loaded support on port[0] = 21 [ 196.443576][ T8947] team0: Port device team_slave_1 added [ 196.477688][ T8949] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.485707][ T8949] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.495415][ T8949] device bridge_slave_0 entered promiscuous mode [ 196.503373][ T8949] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.514676][ T8949] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.522840][ T8949] device bridge_slave_1 entered promiscuous mode [ 196.563313][ T8944] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 196.604516][ T8949] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 196.617265][ T8949] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 196.626409][ T8952] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.633659][ T8952] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.641541][ T8952] device bridge_slave_0 entered promiscuous mode [ 196.723464][ T8947] device hsr_slave_0 entered promiscuous mode [ 196.771875][ T8947] device hsr_slave_1 entered promiscuous mode [ 196.835760][ T8952] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.843538][ T8952] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.851744][ T8952] device bridge_slave_1 entered promiscuous mode [ 196.888796][ T8949] team0: Port device team_slave_0 added [ 196.898468][ T8949] team0: Port device team_slave_1 added [ 196.912296][ T8952] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 196.951150][ T8952] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 196.999352][ T8958] chnl_net:caif_netlink_parms(): no params data found [ 197.059105][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 197.059118][ T26] audit: type=1800 audit(1559675155.263:31): pid=8969 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16258 res=0 [ 197.089917][ T8949] device hsr_slave_0 entered promiscuous mode [ 197.097197][ T26] audit: type=1804 audit(1559675155.273:32): pid=8969 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir906451200/syzkaller.mLARCf/0/file0" dev="sda1" ino=16258 res=1 [ 197.152124][ T8949] device hsr_slave_1 entered promiscuous mode [ 197.212499][ T8952] team0: Port device team_slave_0 added [ 197.289225][ T8952] team0: Port device team_slave_1 added [ 197.335324][ T8958] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.342762][ T8958] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.350689][ T8958] device bridge_slave_0 entered promiscuous mode [ 197.372733][ T8961] chnl_net:caif_netlink_parms(): no params data found [ 197.383306][ T8958] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.390525][ T8958] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.399321][ T8958] device bridge_slave_1 entered promiscuous mode [ 197.455366][ T8952] device hsr_slave_0 entered promiscuous mode [ 197.511753][ T8952] device hsr_slave_1 entered promiscuous mode [ 197.582859][ T8958] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 197.607117][ T8958] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 197.652635][ T8958] team0: Port device team_slave_0 added [ 197.661055][ T8958] team0: Port device team_slave_1 added [ 197.691234][ T8961] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.699581][ T8961] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.708085][ T8961] device bridge_slave_0 entered promiscuous mode [ 197.717192][ T8961] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.724907][ T8961] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.733306][ T8961] device bridge_slave_1 entered promiscuous mode [ 197.794060][ T8958] device hsr_slave_0 entered promiscuous mode [ 197.832458][ T8958] device hsr_slave_1 entered promiscuous mode [ 197.861438][ T26] audit: type=1804 audit(1559675156.063:33): pid=8970 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir906451200/syzkaller.mLARCf/0/file0" dev="sda1" ino=16258 res=1 19:05:56 executing program 0: [ 197.930908][ T8949] 8021q: adding VLAN 0 to HW filter on device bond0 [ 197.959802][ T8949] 8021q: adding VLAN 0 to HW filter on device team0 [ 198.023017][ T8951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 198.030804][ T8951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 19:05:56 executing program 0: [ 198.068137][ T8961] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 198.091323][ T8947] 8021q: adding VLAN 0 to HW filter on device bond0 19:05:56 executing program 0: [ 198.112622][ T8951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 198.132028][ T8951] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 198.140569][ T8951] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.147709][ T8951] bridge0: port 1(bridge_slave_0) entered forwarding state 19:05:56 executing program 0: [ 198.162616][ T8951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 198.176460][ T8951] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 198.191915][ T8951] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.199203][ T8951] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.217863][ T8961] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 198.242094][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 19:05:56 executing program 0: [ 198.296766][ T8961] team0: Port device team_slave_0 added [ 198.314382][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 198.324334][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 198.334438][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 198.345254][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 198.369204][ T8947] 8021q: adding VLAN 0 to HW filter on device team0 [ 198.380825][ T8961] team0: Port device team_slave_1 added 19:05:56 executing program 0: [ 198.406632][ T8954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 198.415915][ T8954] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 198.432902][ T8954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 198.442331][ T8954] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 19:05:56 executing program 0: [ 198.462533][ T8954] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 198.477592][ T8949] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 198.498467][ T8949] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 198.561317][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 198.571762][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 198.580091][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 198.589264][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 198.597947][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 198.607203][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 198.615903][ T3489] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.623159][ T3489] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.630683][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 198.639761][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 198.648243][ T3489] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.656847][ T3489] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.665417][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 198.673311][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 198.686145][ T8952] 8021q: adding VLAN 0 to HW filter on device bond0 [ 198.736534][ T8961] device hsr_slave_0 entered promiscuous mode [ 198.781882][ T8961] device hsr_slave_1 entered promiscuous mode [ 198.828928][ T8954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 198.839315][ T8954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 198.852290][ T8952] 8021q: adding VLAN 0 to HW filter on device team0 [ 198.876636][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 198.884484][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 198.893098][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 198.901845][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 198.910195][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 198.920443][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 198.929305][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 198.937846][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 198.946723][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 198.968659][ T8947] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 198.979968][ T8947] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 198.992365][ T3005] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 199.001143][ T3005] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 199.010459][ T3005] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.017866][ T3005] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.026112][ T3005] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 199.034704][ T3005] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 199.043606][ T3005] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 199.060903][ T8949] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 199.084265][ T3005] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 199.093498][ T3005] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 199.102261][ T3005] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.109412][ T3005] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.119475][ T3005] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 199.164064][ T8951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 199.186902][ T8947] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 199.203150][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 199.212885][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 199.222066][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 199.230916][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 199.240937][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 199.249430][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 199.262732][ T8958] 8021q: adding VLAN 0 to HW filter on device bond0 [ 199.269629][ T8951] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 199.298006][ T8961] 8021q: adding VLAN 0 to HW filter on device bond0 [ 199.335819][ T8952] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 199.354938][ T8952] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 199.378715][ T8958] 8021q: adding VLAN 0 to HW filter on device team0 [ 199.390590][ T8951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 199.400967][ T8951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 199.414750][ T8951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 199.424406][ T8951] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 199.433164][ T8951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 199.441011][ T8951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 199.451060][ T8961] 8021q: adding VLAN 0 to HW filter on device team0 [ 199.482895][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 199.493719][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 199.502389][ T3489] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.512528][ T3489] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.520060][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 199.529003][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 199.537509][ T3489] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.544574][ T3489] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.552535][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 199.561128][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 199.569724][ T3489] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.576824][ T3489] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.584847][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 199.593739][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 199.602971][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 199.610979][ T3489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 199.627273][ T8952] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 199.664860][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 199.684900][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 199.709127][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 199.718303][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 199.727654][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.735208][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.742928][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 199.751550][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 199.759996][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 199.769479][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 199.777959][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 199.786936][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 199.795405][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 199.803937][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 199.816133][ T8954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 199.825770][ T8954] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 199.856052][ T8954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 199.867863][ T8954] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 199.877729][ T8954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 199.886213][ T8954] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 199.894695][ T8954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 199.903286][ T8954] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 199.916610][ T8961] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 199.951914][ T8954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 199.960444][ T8954] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 199.983736][ T8958] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 200.003971][ T8961] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 200.065107][ T8958] 8021q: adding VLAN 0 to HW filter on device batadv0 19:05:58 executing program 1: 19:05:58 executing program 0: 19:05:58 executing program 2: 19:05:58 executing program 3: 19:05:58 executing program 5: 19:05:58 executing program 4: 19:05:58 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000300)={@empty, @ipv4={[], [], @loopback}, @remote, 0x0, 0x0, 0x0, 0x200000000}) 19:05:58 executing program 5: sched_setattr(0x0, 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) write(r0, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) 19:05:58 executing program 2: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c64, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='syscall\x00.\xc9\xe8\xbe\f0\x14\x8c{\xe9\xc3\xea\x18aY\xd1\xbe\x8a\x19\xe7\x00V\xa5\xf3\x92%o\xcb/%\xc6O\xdc\x851\x15}\xd0\x86\x8c`\xd2\xa16V\x10\xbd\x83;\xf4\xe3\xe4\xf9\xc8\x86\x1e\x10\xd4\xf1F\xe6Y\xd5\'t\x8f\fE\xe9\x04\xb6\xb6aGgk\xbaT@\x06\xbe\xbd\xb0\xa4\xeb@9\xb4\xd2_\xa8\xb5\x98\xa8#\xfc\x1f\x8dhU\x05\x91\nY\xa4>|Z\x1a\xc5\a[\x92\x8f6l\xaa\x12i*\xc5\xe0\x115\x90\t\xcb\xfeG\xaa\xc2\xf4\xb3\x9e\xaa\x8f&:\xc5\xea[\xd6\x16\x84@\xeb\xc3}\xd4@\xc9\xa92\xdb\xecU\x1a\x8f\xfe\xb3\xb0U\xaa\xd5\xe0\xcav{2:;{\xb5\xe3\xbf\xf0\xd9\xdc\t\x0f\x8bN5\xd5\xc1\x14\xb7s\xfb\xb4m(\ry\xd1\xe8}\x8av\xc9\xef3\xd2\xe0\xfb\xfc\x15\x81\x18{X\xd3\x0f\x9d[') read(r0, 0x0, 0x0) 19:05:58 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='security.capability\x00', &(0x7f0000000240)=@v3, 0x18, 0x0) getxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000180)=@known='security.capability\x00', 0x0, 0x2) 19:05:58 executing program 3: [ 200.778139][ T26] audit: type=1800 audit(1559675158.983:34): pid=9053 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16279 res=0 19:05:59 executing program 1: 19:05:59 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, &(0x7f0000000200), 0x0}}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0xc, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="11634840", @ANYPTR], 0x0, 0x0, 0x0}) 19:05:59 executing program 0: capset(&(0x7f0000000100)={0x20080522}, &(0x7f0000000040)) fsopen(0x0, 0x0) 19:05:59 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'cpu'}]}, 0x5) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x20000000000003c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x6}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffffffffffe86) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 19:05:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 19:05:59 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r1 = syz_open_dev$dmmidi(&(0x7f0000000d40)='/dev/dmmidi#\x00', 0x0, 0x4000000000201) sendto$inet(r0, 0x0, 0x2ba, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x4004e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000600)=@vsock, 0x80) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000800}, 0x0) sendto(r1, &(0x7f0000000340)="7716a791949e23dcc2050255ed3a8a88b1f8006a32ae543f9830190c34532de3a473f605ed390c87f0dc6532a22dfce884a9e0ccd6588a0be4e6c99d80f2ca84a0f2ca505df3420dc18f72b1710b85d6114fd1a7f57c641d00e580293d35e1a2aca33f37727a7321639a31ae4f801ca673bf13791554c46a26f8f445828207059a53a3eff359ef11", 0x88, 0x10, 0x0, 0x0) lgetxattr(0x0, &(0x7f0000000bc0)=@known='system.posix_acl_access\x00', &(0x7f0000000c00)=""/202, 0xca) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff012}], 0x1, &(0x7f0000000200)=""/20, 0xd57}, 0x300) 19:05:59 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x3c) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000300)) socket$kcm(0x2, 0x20000001, 0x2) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:05:59 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, &(0x7f0000000200), 0x0}}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0xc, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="11634840", @ANYPTR], 0x0, 0x0, 0x0}) 19:05:59 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r1 = syz_open_dev$dmmidi(&(0x7f0000000d40)='/dev/dmmidi#\x00', 0x0, 0x4000000000201) sendto$inet(r0, 0x0, 0x2ba, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x4004e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000280)="e3", 0x1}], 0x1}, 0x4000001) sendto(r1, &(0x7f0000000340), 0x0, 0x10, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff012}], 0x1, &(0x7f0000000200)=""/20, 0xd57}, 0x300) 19:05:59 executing program 4: setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) memfd_create(0x0, 0x11) r0 = memfd_create(0x0, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='task\x00') pipe(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) ioctl$RTC_ALM_READ(r2, 0x80247008, &(0x7f0000000300)) sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, 0x0, 0x0) r4 = accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000180), 0x4) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r5 = inotify_init() splice(r4, &(0x7f0000000380), r4, &(0x7f0000000540), 0x0, 0x0) getrusage(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r1, 0x0, 0x4000) timer_create(0x4, &(0x7f0000000040)={0x0, 0x2, 0x4, @thr={&(0x7f0000000440)="2494c9162aad4dfce15251c01aea936f9e6b43b766dc0f7be4cc48efd1b8f0b74b3316c8a0173473c18768e612186c5e6236125b9d165ed5ce3be9b10087f8a7e6b10bb44d1682f35ada17d688752bfc1b0ef887cc46d5d1e2fddff8a5627c8744327b7a3d872a8381e10c3e94c05268d130d172eaae6ec01c45e8428d5a9f5ab3369ded42549594af7bd9662181d1bd2e756db65f8cc85bc9dffbca0e82f0908224624ad24ebe7d00125393e037d112519486355543fb03b7de334bd9b38ecc34127b45f8c37fb1", 0x0}}, 0x0) timer_create(0x7, &(0x7f0000000780)={0x0, 0x1b}, 0x0) inotify_add_watch(r5, &(0x7f0000000080)='.\x00', 0xfe) read(r1, &(0x7f0000000580)=""/177, 0xb1) r6 = open(&(0x7f0000000400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r6, &(0x7f0000000280)=ANY=[@ANYRESDEC], 0x14) sendfile(r6, r6, &(0x7f00000001c0), 0xa198) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xf, 0x6, r0, &(0x7f00000017c0)="0b8607892c0158b078c2923602b17de656c6c4dbb19aa9075c93ce6a98e829c2124eaddd14443fee47ce747c3fc01560f6d0ccbc1029939681038b719eac3b6d58ce1caf9f51143e6195b2eafe51e8d1829b600d7942fb387de7505e6568e0b5330caffda792aa1df5278e0893cb0747385622906a4c3b921f88283f8ed86dcd0a0291f02b0b80970d8ffd069c30b42fd4759f5bad1fec9eedef4c699f1578fdba9c01eecfa27b5a14094de526ea0b1b41e2b907610eed4290fe72c0811325e52d535a3dc4e9fd017981b09557526b0d3991b769682fab3801f54b53528d226d9839ca2775b4572bf016796cb06cb1c4ba4c67c30fdba6026b5f5b08874ce3b6906654897ca990b58617906f06fdd1a26bf868bfa3251ee056f59d29d312705b7b76b15b6619861f56de15812e61c03e02e0b3b35b3055967771c79021010eb13f541bd559871f94203ef85c390eb7e5ad4e7c114261d1d279318698bf78f35ebc07cc60f8d95abd3dec8e4d6de50a7bb82009b1b50d38532d6600c5e05025a3d630702c9f7c7e9214a4a3586ff49ec4a8f69148badfd273a1c9fec95e794f89e0712ab197291170c6d7a121dca556b7e0c1ef1d15a49b5d0be3a6d66d85d01a2c4fb5c2b08d1c3f91a989a285a3e06bb818c3d48e57fee1d0d1e7afbd85e401318eec7930a9ddb6dde0249a643ca8bb9433afdf305b99634dea9d7b4f5aa023fc39d29ad31982044b08b7e96aa6d1d098851228b8bda9fdd179ced9ed8800824c17800684e847812e1ac6795092ebf16f15c45ae47ea076409af7b4b0ba08490081e6ed4559ed233a97438211ee08db252b685c50b2f4e706f65d37c48d17c36bb5d8a9139b124a950b68884a3c5e492581e37dfba2e0b6510c56273697a71cca65fe1df6f4fc7f22a2e23f85f5b11b73a3ed81553213ff95a0154204ab61f693c4a6319ace1e330953b4fd1a474bd225417ea4f392618f581635068abd5b89c390bf97afbfc191859aec39a174cc09704fe0200feb203cc8b9e8177af371ea6e4a09efe00fef0c71ced783e071b4b877d0e999991d48cba52a49c3b0dd39625795227f81abb6ad6c9acfc4665b75e105b64034a8c05b1303bec839fc908bfe24f2c2d611b6be227f810f252c599539140481e83630214876796d190772ff832b393d3a0e3caa908db906a721617fc3966745f5c9ec5c5983959fcacef4a4984279b4e506e1677bff96666434963082bbd4747cce317c683f33353b9bba98dac0d6dc499681c13795678d8488f6d5aafd7d18594e4b8b74f0e933034194a7f06f8f78460875c6333e8efd4f50bc900f440fd6e9936ba1976590ec73750ea508daf1a1767d4d4f9f7be664a3ec943813aacc4275a5e813eff7855fcc89c717a339e17c7f9c8d7d35e16b12570b18b819e1ff92c4cfb28390d6709736fd30fa952aa28280c3ab8e0ea2474c26690695192447b237231d09c19112703c493675a231bb79f0c2c500ecbc8c604edcddfc4417e7c7502e10988ff36631ccab105bc6c7007eb19214e6fe299b13d255b02d94b6da186d96a79ff77a2b355602c1847bfc6801180f4cf1a7613b7e0a709fc53d1e55a26da2b0df38f5cd7054ec34187c9a3bdbf96415b3aa8205ad85cd86ab07f08530c1c837f801d18c1c3d3f9140d52be36b5eb23c6fc50b336b44f24970cc1cd7ecc9f8fd5ccd2a9cc5c1dd687ffcc41cb8e984a5b637a3cd1936b0d458cb8abd6e9d195e04a1acd10d9a3a93b10379a9ea396aa1683591dac5e5c23ae28b462662d2b2b08c13d5f7ae16036d0e4bde87302d92ede68ce48a6db27e49021fd6a8467613243ae625d84dd6e3c49059aae4de62f7e5ae8e5c7d4c12b1163fe6f211db88dce201c8a6a4a4da424ec86a8e21d7a7601e1c095dcbea113d5fc9d397b19a17cfdae08c29725fc3b08e138529d85a9a194c550b9249ef9bb178a28a323d9caad96a5ff46529747b9afb9ee930e02cb32461d25eba04f39cae816d2c811b241229855e2a23f01eb4f7cd0ad7412dbf3efd72c785bbd8343d9fbe54d63d70d9354b0e95f35babfe3a3996e2b246d0bcf2aa5f785c639100fa570dea3bd13998871b000df56ad808b4f048ae18a16707051fda959a08395696910f3dae8192023985f515591ec4dd06796a2b521abf6c6b4778e4cba1d346ffd2947d535bb571c39834854b1dd0fee2c02451dd10781fc4c362c4b5cc897b396b1cd83b25ec59834b0ad4a613bc4ad5d9c9b979c76e9178155a17e234b8fcb0f3fa68a96920e5a65ae3aef279f502e84138f4f37619325dc25de882d37599c8c945a837ccdc0f7db7220ee61e038638d2261bd345ab2e5e6fd9571b81c6785158973fb6d1f7315bc3bcf0c6c5ecd19fad0a48352dffccb626108487c536c373642561c1b2599b55e69c6a42b0f02e37fe243a513f3e89e8813cb6f62ed9b66fdaffd30008e83d5fa289986e2ad4e6ec2e708a8576ac32fd9cceaa8ffb175dd63b9c509f9dd228cf3c17db672724779527d1e56992ecf0b575f4bb218d8a09cf50e936472906886568a3450f67679424675190426f149ef5684e6b28183607aeb618efdb9a7f153822c8047087da24b6cd1d1f52e41025c325b33f6580d8a10c10bc54ff9f2a404328a26dedd9e2cfff1e02454631994d78944170937de7a780324457cb9cbd8f4582fc430e5b214c7c8d5a9e521bab3e066266b06a636a15374e110c0de521340a4171a2fec026a1ba9f2001cdd7a99f9179e0c64d92b0fd0ffe76dde0e7c7179b90069dadfa24fa730277aa8b990cf3b4a13ba8fc8ca08bdfb0a1ae6c8edce96252e1311c20a355516b78e903e0359c61c075e853731d70946e9c9d0ba09abf5c82fbf8ce801acb55a4457491cc5d112542049d963f5c6217547ca822da6b213cc40ae817cd8bc44366329c7c18e6f932c5e100a9a06761ec31528d627b089bb9f67544d60121ebf8f765319043a2853512b7620daadd71b5c60bcca0e4e64aabb93a0c5e2a5edf1a763c0e6fbf0c9587bc0d6d0fc020e1a1939c55a1fca35de6ad198d8d647bca67a584216843bb8153a846b21097d75bb7996695c43f752e8911360cc426ad40ef01088ad47b76994a645953d6b7bdd694b407ca6aeebd4ffa7428d2404395993f47f36a54f91924d9f97989702293ecc4b9aaaf7667a989abd7af22c70013d85e06cb74f418bc3b583caafdb2e298f5ade8ab2fbbfb1290601eb03bad3f44bd1e9eb6d2ca0b6d50e56c0682bd05438e2f7a060726eb67b2f7c1ad474e876e93603b8ecde7616353a3787a0116f083fb9e433a32a56556459bbc5d4f2a7d8653905dbbd7030fae053887a1053fed5ef726944704cf626b72c24cee1e8a3121739987ab745e8dd59cbf9f755c99e8332e2f04ad8438754771fd2b011cd477554448f324dec5b59a98c6351842a6c36b2a807f9460bce759f4a31cadb739ebbc8e28d5b9b87ad46538533d519c8d9dc8ba51ac55082afebcb9c2edd2472db886bcf596fa4efc043c36e33ce4bb4f27ea16cb849fbf0611895fa7d63c87e5926e107a1e57fcca21a6b0ec12871a8531154a276f13d859154dc77cc9dea9bed8835295cee97906649ba30a40e5fece5e3d53bb957c96b9912208e1ec0ab37de2ffb790a72491a032df1c53336aaad4ee134e4401eafa5cc34ac5a684a99721ba46d566172c3e13da01b70611a4b1c247ee1bc12dfac7779ece0a88337f6f8659b9b49b6c08d9d12c7390b5c7e9855ee69438c7152fce4ecaaf1160ca878c2925ad779462a02a9d1e6f7a36df2babbc3cd842759a80865ace50538f3c79ee43c7ae6321e6b125a35e6d8f075b7fba61175c725433a15a9c611f10f28e4aafc6eb7ce3318ebac4c737934475cf5ae2084d9a285091ec9b4a9f6223e3fdc9721fcbf151bb4fa60703c293dc08ee894d1fbced26a9e0b41c3b405030c2231e4c403372054b2ffae754d0af972cd61db5607baf18079c995467c4b495183213254163f77d9bafffd090d3b6fc025a757ad610cfc3703b569bf94abc8af3035531aae7c771540f76de1319fea20251825c79b9aff3bd1146e83a256b61d6b64d52f107040cba78ffc5d3e4efb3778fb63d74c9e8e92ea2732fc438de6b52620e380ccc7af57455e2172fb21d528adacb9e7dad204bbacf95468ff3640b36942e5528438f69a03172849509d488da3041b9dca2bfd5f869eb80880ed02fdbf67a09ec838af5f9ffa8ffe771fddeaf67ebe498fa19ace7de13f33a0fa8916f77ec2f595d91e21b7570b251e5382858fb3f70358bf572d14faf62ef5db636f9b5a5c238db4a15fb62982ef0a079a46e13bface909edc4b1a13825e6108a7284ff1d4a6ee738a5af02eb9559a4fa98d1fdee624d2c79c3023a6e06e219325ed33fe15a0d442149e2c83721bd9ffba99c7b1ddb63c032eee168e8d0f460e07b6ce0fa4035fd0c44c2a78a4d4dd5c976a2bbb51bb02f5bc0a1360fb857f6edd0a08143331f7481789053331461a355329fbc0ce2261f1abef65f503fdb7977c4d73471ed59c3838763e70da82191ab6a1cda46f19d165f51969af9e92263145cbc5a9fc81395565b420142bcacfb9e85f6c57bd8ef80bb520b29cdf7c996835da937f315094571ae0f8809b012a989df709b22a96c32a0077d9cfccb80a138c764d1ea8338e4ef1759827552c15cecbe92786f06d9954d9f499cbc358f10b16b33b8c2869766ec1e526c66ff5c7a550041dfe12597080f89369b9d3635bbc7dd959b6f0e2e3e7e3412a84171c875f63a4c5c8c0017fa6aca2996e473610dd0bdccbbc75e0ed6c67e1edb503da0a3f70d5189965bbbe41514e15bfcf211016be2a8b5e0f77ea8acf66fa107a08c0ef3ef2b15fc1943ee37f1b3e6ee2d5f1e2d4836f4eeb7c9ed916fce6d3e6358da1c79155a90eba708b74098a9cf47ce8cf38121692c37f8a22319ca955fccce12178cec72971492fb7e84fdb53006f58a67f1e805fd88a5697530a8ed40fda9e7e90d3875d670c32a912b7ea4ce98a376b4bf749ff14bedfc9b4039f02092d4542a13f7a68ac725f7bae7804403fd60918cc7b40c815b89648a479ef29ca4a78cee60d21e9c5b80b113d3fd6660a00e050cc5772e0f3b8329eb2bfea74eee1b6de420d9d50ba59923b14f84c20a31ce7facefeff11fc5dc6210652dc2c4d514dab23ed08c67b167fc9a771f5601364e2a157c0c6fd40442f389c516cdf155970b993ddf97172d23f86bae30dea7e9babe6cc62e0c700a5e653819b9eb07abcd5ac7cac353d05277fbdc72d7b73d32c33855895a109ac5e8b44d79e823f61c1d9803953cd784dd665363c54fda4eb7c2bbe2b70d30a5b78813740ed831ca92a94abd06aef5e823a8c0286c8ff82c1c7621acc042aa622f3346b2f4128c4def2a4ee1d09aba908f624c4d31db32d943f6e9b1e76d976e9e5c7b53fce9c301aff9ff17838d2fe571db45b695706ce9653a2aea9898c634a6a0f160225c0616724a97e57c609ad77b6d243169c7fa72ce90543548f2c458438a893a0ad2f914cb8dba3d3e685ff8f85a29015a02eaf753e5c546e6f69312ff17531aede485565eb0a32a575bee946c0d527dc061b40426115fe92fd84fa5466ca12d7e57724f705fb0f9b823bb0d8804c92f62af9e5f69b99d1794858ab2de283d79fb4e27f4ddd6bb46a713f16c56aafec82ed4e416081e887bab4a1dce0386134ad367577adac5b5ab0dcd0a4ae9a5c00528f5c65e29b0d792f3fb9cacb111392ff6d9", 0xffc, 0x10001}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r7, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 19:05:59 executing program 2: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$rtc(0x0, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x24, 0x0, 0xffffffffffffff36) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) sendmmsg(r0, &(0x7f0000007e00), 0x136a88c8311572c, 0x11) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000040)) 19:05:59 executing program 5: setresuid(0x0, 0xfffe, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x40, 0x0) [ 201.346988][ C0] hrtimer: interrupt took 41570 ns 19:05:59 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000380)=0x70, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) write$binfmt_elf64(r0, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], [], [], [], [], [], []]}, 0x778) 19:05:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x10008002) write(r2, &(0x7f0000000100)="b6020000000000003ef0011dcebc9bc2feffffffffffffa07e6124ac1536c273359bffe22c9b160096aa1fae1a00", 0x2e) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f00000001c0)=0x1) readv(r2, &(0x7f0000000000)=[{&(0x7f0000e94000)=""/62, 0x3e}], 0x1) tkill(r1, 0x1000000000016) 19:05:59 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0x2100001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000240)='./file0\x00', &(0x7f00000003c0)='./file1\x00') setxattr$trusted_overlay_opaque(&(0x7f0000000340)='./file3\x00', 0x0, 0x0, 0x1a0, 0xfffffffffffffffe) 19:06:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], r1}, 0x3c) 19:06:00 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000280)) r1 = creat(&(0x7f00000004c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) dup2(r0, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000180)=0x200000100000001, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102201ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000140)={0x77359400}, 0x10) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)="2265162d6c36d2d553b535288f726cee2343cd3da80438bbe33926e61647fc7fcab63c030ef325ad0f899dcc3d1baefa9b3b5a978b1e8319bcc3c41f139590cb2be0b46092dbd2174e400b05", 0x4c}], 0x1, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, 0x0) 19:06:00 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) 19:06:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x8936, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x0, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x227a00000000000) 19:06:00 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r1 = syz_open_dev$dmmidi(&(0x7f0000000d40)='/dev/dmmidi#\x00', 0x0, 0x4000000000201) sendto$inet(r0, 0x0, 0x2ba, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x4004e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000600)=@vsock, 0x80) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000280)="e3c43d394bbf647ffe29ef4b6b9390d91ce6e772f7", 0x15}], 0x1, 0x0, 0x0, 0x4000800}, 0x4000001) sendto(r1, &(0x7f0000000340)="7716a791949e23dcc2050255ed3a8a88b1f8006a32ae543f9830190c34532de3a473f605ed390c87f0dc6532a22dfce884a9e0ccd6588a0be4e6c99d80f2ca84a0f2ca505df3420dc18f72b1710b85d6114fd1a7f57c641d00e580293d35e1a2aca33f37727a", 0x66, 0x10, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff012}], 0x1, &(0x7f0000000200)=""/20, 0xd57}, 0x300) 19:06:00 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) 19:06:00 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000440)="5500000018007f01010000b2a4a280930206030000000001000000003900090035000c020300000019000b4001000000000022dc1338d54400009b04136ef75afb83de4411000500c43ab8bc0000060cec4fab91d4", 0x55}], 0x1}, 0x0) 19:06:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000480)={0x18, r1, 0x601, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x4}]}, 0x18}}, 0x0) 19:06:01 executing program 5: clone(0x4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") ptrace$cont(0x4201, r0, 0x0, 0xa05004) 19:06:01 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af60, &(0x7f0000000080)) 19:06:01 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4, 0x0, 0x0, 0x0, 0x5}, 0x20) 19:06:01 executing program 2: 19:06:01 executing program 3: 19:06:01 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, 0x0, &(0x7f0000000040)) [ 203.322956][ T9176] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 19:06:01 executing program 3: capset(&(0x7f0000000100)={0x20080522}, &(0x7f0000000040)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, 0x0, &(0x7f0000000880)) 19:06:01 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000080)={@link_local, @random="48d07555955c", [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x4, 0x543, 0x700, 0x5, 0x500000000008847], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff88, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2}}}}}}}, 0x0) 19:06:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x34, 0x0) poll(&(0x7f00000009c0)=[{r1}], 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) 19:06:01 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000fff000/0x1000)=nil) 19:06:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clock_nanosleep(0xb, 0x0, &(0x7f0000000140)={0x77359400}, 0x0) 19:06:01 executing program 3: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x40c000, 0x0) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@local, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) getgroups(0x2, &(0x7f0000000180)=[0xee01, 0xffffffffffffffff]) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x4) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x5dc0, @empty}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f0000002f00)=[{0x0, 0x73, 0x0}], 0x1dc, 0x0) 19:06:02 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x1000000077, 0x0, [0x4b564d04, 0x0, 0x40000073, 0x11], [0xc1]}) 19:06:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x34, 0x0) poll(&(0x7f00000009c0)=[{r1}], 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) 19:06:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000040)={@ipv4={[], [], @dev}, 0x1}, 0x160) 19:06:02 executing program 3: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x40c000, 0x0) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@local, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) getgroups(0x2, &(0x7f0000000180)=[0xee01, 0xffffffffffffffff]) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x4) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x5dc0, @empty}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f0000002f00)=[{0x0, 0x73, 0x0}], 0x1dc, 0x0) 19:06:02 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, 0xffffffffffffffff) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x0, 0x208, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffff9c, 0x0, 0x0) fsetxattr$security_smack_entry(r0, 0x0, &(0x7f0000000440)='md5sum$/nodev#\x00', 0xf, 0x2) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x1e66) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, 0x0) syncfs(r4) write$binfmt_script(r2, &(0x7f0000000540)={'#! ', './file0', [{0x20, '{'}, {0x20, '/proc/self/net/pfkey\x00'}, {0x20, 'md5sum$/nodev#\x00'}, {0x20, '\x81\'keyringproc'}], 0xa, "2ace62f7ab6764b70c375761f92472007f36c10b94153cd9986bb17771b8103fa933520f55b48f2fdd903916d39bac544362967f07dbf10e571d6a26d255601d6e39fed0a09771c73504478e3b6fa19077759896407d49b97547ff7216a0f20fbb1db623c05b708f3799d8ad7dfa1af29945a96f3047c9dc1fda5144fd7b6ca49aa90a5a47a4eadbd6afe883d06439581d0bd23b5635c45e4aa729162fa259c66ed2956e0c48790314f06b705193a7e69edd1b307d8197fd8668d2b86fb0edbb1c22895a0639e3e811134e30fc6f20e64499d0300b05ab668c6e112b121981eeac5fb52582d6a3e252fa98b28b05b0dd918dfe0e89"}, 0x136) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) ioctl$DRM_IOCTL_AGP_RELEASE(0xffffffffffffffff, 0x6431) r5 = accept(0xffffffffffffffff, &(0x7f0000000300)=@sco, &(0x7f0000000380)=0x80) pwritev(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000008c0)}], 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x9, 0x1, 0x5}) write$P9_RSETATTR(r4, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x20, 0xff, 0x4e) 19:06:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000000)=0x400100000001, 0x1c0c) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet_mreqsrc(r1, 0x0, 0x8000000000004, 0x0, 0x2e3) ptrace(0x10, r2) fcntl$setstatus(r1, 0x4, 0x42803) 19:06:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x34, 0x0) poll(&(0x7f00000009c0)=[{r1}], 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) [ 204.257203][ T9228] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 19:06:02 executing program 3: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x40c000, 0x0) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@local, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) getgroups(0x2, &(0x7f0000000180)=[0xee01, 0xffffffffffffffff]) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x4) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x5dc0, @empty}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f0000002f00)=[{0x0, 0x73, 0x0}], 0x1dc, 0x0) 19:06:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x34, 0x0) poll(&(0x7f00000009c0)=[{r1}], 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) 19:06:02 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, 0xffffffffffffffff) creat(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x0, 0x208, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffff9c, 0x0, 0x0) fsetxattr$security_smack_entry(r0, 0x0, &(0x7f0000000440)='md5sum$/nodev#\x00', 0xf, 0x2) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) syncfs(r3) write$binfmt_script(r1, &(0x7f0000000540)={'#! ', './file0', [{0x20, '{'}, {0x20, '/proc/self/net/pfkey\x00'}, {0x20, 'md5sum$/nodev#\x00'}, {0x20, '\x81\'keyringproc'}], 0xa, "2ace62f7ab6764b70c375761f92472007f36c10b94153cd9986bb17771b8103fa933520f55b48f2fdd903916d39bac544362967f07dbf10e571d6a26d255601d6e39fed0a09771c73504478e3b6fa19077759896407d49b97547ff7216a0f20fbb1db623c05b708f3799d8ad7dfa1af29945a96f3047c9dc1fda51"}, 0xbc) symlink(0x0, &(0x7f0000000500)='./bus\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f00000003c0)={0x0, 0x1}) ioctl$DRM_IOCTL_AGP_RELEASE(r3, 0x6431) r4 = accept(0xffffffffffffffff, &(0x7f0000000300)=@sco, &(0x7f0000000380)=0x80) pwritev(0xffffffffffffffff, &(0x7f00000018c0)=[{0x0}], 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x9, 0x1, 0x5}) write$P9_RSETATTR(r3, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x20, 0x0, 0x4e) 19:06:02 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000180)={@loopback}, &(0x7f00000001c0)=0x14) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x0, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 '}, 0x2c) 19:06:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) io_setup(0x7ffe, &(0x7f00000000c0)=0x0) io_submit(r0, 0x0, 0x0) 19:06:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x34, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) 19:06:03 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="3c040fa311047123b2f114d510d085ac", 0x0, 0x0, 0xff, 0x100000000000001}, 0x20) [ 205.005101][ T26] audit: type=1326 audit(1559675163.213:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9259 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c0ba code=0xffff0000 19:06:03 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="e46acdfbef24080200000a1305dd", 0x0, 0x200000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 19:06:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x34, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) 19:06:03 executing program 0: r0 = socket$kcm(0x2, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000040)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000200)="ff", 0x1}], 0x1}, 0x0) 19:06:03 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, 0xffffffffffffffff) creat(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x0, 0x208, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffff9c, 0x0, 0x0) fsetxattr$security_smack_entry(r0, 0x0, &(0x7f0000000440)='md5sum$/nodev#\x00', 0xf, 0x2) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) syncfs(r3) write$binfmt_script(r1, &(0x7f0000000540)={'#! ', './file0', [{0x20, '{'}, {0x20, '/proc/self/net/pfkey\x00'}, {0x20, 'md5sum$/nodev#\x00'}, {0x20, '\x81\'keyringproc'}], 0xa, "2ace62f7ab6764b70c375761f92472007f36c10b94153cd9986bb17771b8103fa933520f55b48f2fdd903916d39bac544362967f07dbf10e571d6a26d255601d6e39fed0a09771c73504478e3b6fa19077759896407d49b97547ff7216a0f20fbb1db623c05b708f3799d8ad7dfa1af29945a96f3047c9dc1fda51"}, 0xbc) symlink(0x0, &(0x7f0000000500)='./bus\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f00000003c0)={0x0, 0x1}) ioctl$DRM_IOCTL_AGP_RELEASE(r3, 0x6431) r4 = accept(0xffffffffffffffff, &(0x7f0000000300)=@sco, &(0x7f0000000380)=0x80) pwritev(0xffffffffffffffff, &(0x7f00000018c0)=[{0x0}], 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x9, 0x1, 0x5}) write$P9_RSETATTR(r3, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x20, 0x0, 0x4e) 19:06:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x34, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) 19:06:03 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 19:06:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") poll(&(0x7f00000009c0)=[{}], 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) 19:06:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) [ 205.685303][ T26] audit: type=1326 audit(1559675163.893:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9259 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c0ba code=0xffff0000 19:06:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") poll(&(0x7f00000009c0)=[{}], 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) 19:06:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x37) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xaa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 19:06:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) ftruncate(r1, 0x42) readv(r1, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/206, 0x361}, {&(0x7f0000000380)=""/170}], 0x10000000000003d5) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) 19:06:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") poll(&(0x7f00000009c0)=[{}], 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) 19:06:04 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x34, 0x0) poll(&(0x7f00000009c0)=[{r0}], 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) 19:06:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, 0x0) 19:06:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(morus1280)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) 19:06:04 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000240), 0x2305e656) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 19:06:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffb9, 0x0) 19:06:04 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000280)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) r2 = dup2(r0, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000180)=0x200000100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r4 = dup2(r3, r3) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102201ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$sock_timeval(r4, 0x1, 0x15, &(0x7f0000000140)={0x77359400}, 0x10) ioctl$sock_inet_SIOCSARP(r2, 0x8955, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)="2265162d6c36d2d553b535288f726cee2343cd3da80438bbe33926e61647fc7fcab63c030ef325ad0f899dcc3d1baefa9b3b5a978b1e8319bcc3c41f139590cb2be0b46092dbd2174e400b05", 0x4c}], 0x1, 0x0) 19:06:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0) 19:06:04 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x34, 0x0) poll(&(0x7f00000009c0)=[{r0}], 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) 19:06:04 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, 0xffffffffffffffff) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x0, 0x208, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffff9c, 0x0, 0x0) fsetxattr$security_smack_entry(r0, 0x0, &(0x7f0000000440)='md5sum$/nodev#\x00', 0xf, 0x2) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x1e66) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, 0x0) syncfs(r4) write$binfmt_script(r2, &(0x7f0000000540)={'#! ', './file0', [{0x20, '{'}, {0x20, '/proc/self/net/pfkey\x00'}, {0x20, 'md5sum$/nodev#\x00'}, {0x20, '\x81\'keyringproc'}], 0xa, "2ace62f7ab6764b70c375761f92472007f36c10b94153cd9986bb17771b8103fa933520f55b48f2fdd903916d39bac544362967f07dbf10e571d6a26d255601d6e39fed0a09771c73504478e3b6fa19077759896407d49b97547ff7216a0f20fbb1db623c05b708f3799d8ad7dfa1af29945a96f3047c9dc1fda5144fd7b6ca49aa90a5a47a4eadbd6afe883d06439581d0bd23b5635c45e4aa729162fa259c66ed2956e0c48790314f06b705193a7e69edd1b307d8197fd8668d2b86fb0edbb1c22895a0639e3e811134e30fc6f20e64499d0300b05ab668c6e112b121981eeac5fb52582d6a3e252fa98b28b05b0dd918dfe0e89"}, 0x136) symlink(0x0, &(0x7f0000000500)='./bus\x00') openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f00000003c0)={0x0, 0x1}) ioctl$DRM_IOCTL_AGP_RELEASE(r4, 0x6431) r5 = accept(0xffffffffffffffff, &(0x7f0000000300)=@sco, &(0x7f0000000380)=0x80) pwritev(0xffffffffffffffff, &(0x7f00000018c0), 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x0, 0x1, 0x5}) write$P9_RSETATTR(r4, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x20, 0xff, 0x4e) 19:06:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") seccomp(0x3, 0x0, 0x0) 19:06:04 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x34, 0x0) poll(&(0x7f00000009c0)=[{r0}], 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) 19:06:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x18d000) 19:06:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") seccomp(0x3, 0x0, 0x0) 19:06:04 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x34, 0x0) poll(&(0x7f00000009c0)=[{r0}], 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) 19:06:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000006580)={&(0x7f0000005480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@volatile]}}, 0x0, 0x26}, 0x20) 19:06:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() ioprio_get$pid(0x3, r0) 19:06:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") seccomp(0x3, 0x0, 0x0) 19:06:05 executing program 5: mkdirat(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000300)={&(0x7f0000000380)=@gettaction={0x230, 0x32, 0x10, 0x70bd25, 0x25dfdbfe, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_gd=@TCA_ACT_TAB={0x38, 0x1, [{0x14, 0x3, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}, {0x10, 0x1f, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x10, 0x1, @TCA_ACT_INDEX={0x8, 0x3, 0x8000}}]}, @action_gd=@TCA_ACT_TAB={0xb0, 0x1, [{0x14, 0xc, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x10, 0x2, @TCA_ACT_INDEX={0x8, 0x3, 0xc88e}}, {0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x800}}, {0x10, 0x1d, @TCA_ACT_INDEX={0x8, 0x3, 0x60d3}}, {0x10, 0x1d, @TCA_ACT_INDEX={0x8, 0x3, 0x80}}, {0x10, 0x9, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x10, 0x1c, @TCA_ACT_INDEX={0x8, 0x3, 0xda}}, {0x10, 0x1c, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x14, 0x4, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x14, 0x1c, @TCA_ACT_KIND={0xc, 0x1, 'mirred\x00'}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x0, 0x1}}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x6ac}, @action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0xf, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_gd=@TCA_ACT_TAB={0x38, 0x1, [{0x14, 0xc, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}, {0x10, 0x14, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x10, 0xf, @TCA_ACT_INDEX={0x8, 0x3, 0x785a}}]}, @action_gd=@TCA_ACT_TAB={0x5c, 0x1, [{0x10, 0x1b, @TCA_ACT_INDEX={0x8, 0x3, 0x75a29907}}, {0x10, 0x1e, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x10, 0x14, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x18, 0xb, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x60, 0x1, [{0x14, 0xd, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x14, 0xe, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}, {0x10, 0x5, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x14, 0x1a, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x10, 0x20, @TCA_ACT_INDEX={0x8, 0x3, 0xffffffff}}]}]}, 0x230}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040080) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000200)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x7ff, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = dup2(r1, r2) accept$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000240)=0x1c) mount(0x0, 0x0, 0x0, 0xc0000, 0x0) sendto$unix(r4, &(0x7f0000000280)="c44589d78bedd2e43e0eaad36054f6f24bbb13e7ca0f46dd7965f502f0365564610631b14654d45ad0c67aa3fd08780c86f819df6770299cdd3335", 0x3b, 0x0, 0x0, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000040)={0x0, 0xfffffffffffffd40, 0x0}) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000080)={0x0, 0x2, 0x2, 0x7f}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000600)=r4, 0x4) 19:06:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) clone(0x2103001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='user\x00', 0x0) 19:06:05 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x34, 0x0) poll(&(0x7f00000009c0)=[{r0}], 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) 19:06:05 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000000), 0x8) connect$bt_sco(r0, &(0x7f0000000080), 0x8) 19:06:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") seccomp(0x3, 0x0, 0x0) 19:06:05 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup3(r0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6=@local}}, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000001c0)={0x0, 0x80000, r1}) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000005c0)='TIPCv2\x00') pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0)={0x0, 0x4}, 0x14) sendfile(0xffffffffffffffff, r2, 0x0, 0x2000005) 19:06:05 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb0, 0x409, 0x20000000000003, 0x0, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000001c0), 0x0}, 0x18) 19:06:05 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x34, 0x0) poll(&(0x7f00000009c0)=[{r0}], 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) 19:06:05 executing program 3: r0 = socket(0x1, 0x1, 0x0) connect(r0, &(0x7f0000000180)=ANY=[@ANYPTR64=&(0x7f0000000140)=ANY=[], @ANYPTR], 0x2) 19:06:05 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x3, 0x0, 0x0) 19:06:05 executing program 1: r0 = perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") readv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/8, 0x8}, {0x0, 0x4f8}, {&(0x7f0000000380)=""/133, 0x85}], 0x3) 19:06:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB='n'], 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000540)=""/226, 0xe2}], 0x1}}], 0x1, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119001}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x27c) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 207.568722][ T9424] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 207.602619][ T9424] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 207.711616][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 207.717625][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 207.724030][ T9424] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 207.856263][ T9440] kvm: emulating exchange as write [ 208.111545][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 208.117462][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 208.396382][ T9431] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 208.451649][ T9431] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 19:06:06 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f0000000340)=0x10) 19:06:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000200)) 19:06:06 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x3, 0x0, 0x0) 19:06:06 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x34, 0x0) poll(&(0x7f00000009c0)=[{r0}], 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) 19:06:06 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) syz_open_dev$dmmidi(&(0x7f0000000d40)='/dev/dmmidi#\x00', 0x0, 0x4000000000201) sendto$inet(r0, 0x0, 0x2ba, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x4004e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) sendmsg$inet_sctp(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff012}], 0x1, &(0x7f0000000200)=""/20, 0xd57}, 0x300) 19:06:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB='n'], 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000540)=""/226, 0xe2}], 0x1}}], 0x1, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119001}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x27c) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:06:06 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x3, 0x0, 0x0) 19:06:06 executing program 3: setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) memfd_create(0x0, 0x11) r0 = memfd_create(0x0, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='task\x00') pipe(0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000300)) sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, 0x0, 0x0) r2 = accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r2) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = inotify_init() splice(r2, &(0x7f0000000380), 0xffffffffffffffff, 0x0, 0x0, 0x0) getrusage(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_PUBL_GET(r1, 0x0, 0x4000) timer_create(0x0, 0x0, 0x0) timer_create(0x7, &(0x7f0000000780)={0x0, 0x1b}, 0x0) inotify_add_watch(r3, &(0x7f0000000080)='.\x00', 0xfe) r4 = open(&(0x7f0000000400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r4, &(0x7f0000000280)=ANY=[@ANYRESDEC, @ANYPTR], 0x18) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xf, 0x0, r0, 0x0, 0x0, 0x10001, 0x0, 0x1}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 19:06:07 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x34, 0x0) poll(&(0x7f00000009c0)=[{r0}], 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) 19:06:07 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") seccomp(0x3, 0x0, 0x0) 19:06:07 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") seccomp(0x3, 0x0, 0x0) 19:06:07 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x34, 0x0) poll(&(0x7f00000009c0)=[{r0}], 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) 19:06:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$gfs2(&(0x7f0000000300)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 19:06:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB='n'], 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000540)=""/226, 0xe2}], 0x1}}], 0x1, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119001}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x27c) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:06:07 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") seccomp(0x3, 0x0, 0x0) 19:06:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x34, 0x0) poll(&(0x7f00000009c0)=[{r1}], 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) [ 209.497281][ T9487] gfs2: not a GFS2 filesystem 19:06:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000380)=0x70, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x81b0) 19:06:07 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") seccomp(0x3, 0x0, 0x0) 19:06:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x34, 0x0) poll(&(0x7f00000009c0)=[{r1}], 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) [ 209.623850][ T9502] gfs2: not a GFS2 filesystem 19:06:08 executing program 3: capset(&(0x7f0000000100)={0x20080522}, &(0x7f0000000040)) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) 19:06:08 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000002000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x7a, 0x0, [0x40000000, 0x10000000800002c1, 0x40000001, 0x3], [0xc1]}) 19:06:08 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000280)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) dup2(r0, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000180)=0x200000100000001, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102201ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000140)={0x77359400}, 0x10) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)="2265162d6c36d2d553b535288f726cee2343cd3da80438bbe33926e61647fc7fcab63c030ef325ad0f899dcc3d1baefa9b3b5a978b1e8319bcc3c41f139590cb2be0b46092dbd2174e400b05", 0x4c}], 0x1, 0x0) 19:06:08 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") seccomp(0x3, 0x0, 0x0) 19:06:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x34, 0x0) poll(&(0x7f00000009c0)=[{r1}], 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) 19:06:08 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") seccomp(0x3, 0x0, 0x0) 19:06:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB='n'], 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000540)=""/226, 0xe2}], 0x1}}], 0x1, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119001}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x27c) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:06:08 executing program 3: ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, &(0x7f0000000300)) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) sendto$inet(r0, 0x0, 0x2ba, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x4004e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000600)=@vsock={0x28, 0x0, 0x2711}, 0x80) sendmsg$inet_sctp(r0, &(0x7f0000000180)={&(0x7f0000000100)=@in6={0xa, 0x4e22, 0x0, @empty, 0x3}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000280)="e3c43d394bbf647ffe29ef4b6b9390d91ce6e7", 0x13}], 0x1, 0x0, 0x0, 0x4000800}, 0x4000001) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000007c0)={{{@in6=@mcast1, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000000080)=0xe8) sendto(0xffffffffffffffff, &(0x7f0000000340)="7716a791949e23dcc2050255ed3a8a88b1f8006a32ae543f9830190c34532de3a473f605ed390c87f0dc6532a22dfce884a9e0ccd6588a0be4e6c99d80f2ca84a0f2ca505df3420dc18f72b1710b85d6114f", 0x52, 0x10, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000500)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff012}], 0x1, &(0x7f0000000200)=""/20, 0xd57}, 0x300) [ 210.093357][ T9536] kvm [9524]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 19:06:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x34, 0x0) poll(&(0x7f00000009c0)=[{r1}], 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) 19:06:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca5055e0bcfec7be070") seccomp(0x3, 0x0, 0x0) [ 210.241611][ T9536] kvm [9524]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 19:06:08 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000002000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x7a, 0x0, [0x40000000, 0x10000000800002c1, 0x40000001, 0x3], [0xc1]}) 19:06:08 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000280)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) r2 = dup2(r0, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000180)=0x200000100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r4 = dup2(r3, r3) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102201ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$sock_timeval(r4, 0x1, 0x15, &(0x7f0000000140)={0x77359400}, 0x10) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)="2265162d6c36d2d553b535288f726cee2343cd3da80438bbe33926e61647fc7fcab63c030ef325ad0f899dcc3d1baefa9b3b5a978b1e8319bcc3c41f139590cb2be0b46092dbd2174e400b05", 0x4c}], 0x1, 0x0) 19:06:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x34, 0x0) poll(&(0x7f00000009c0)=[{r1}], 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) 19:06:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca5055e0bcfec7be070") seccomp(0x3, 0x0, 0x0) 19:06:09 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f0000000180)}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="f4"], 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400008) write$cgroup_pid(r1, &(0x7f0000000000), 0x20000012) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:06:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000002000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x7a, 0x0, [0x40000000, 0x10000000800002c1, 0x40000001, 0x3], [0xc1]}) 19:06:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x34, 0x0) poll(&(0x7f00000009c0)=[{r1}], 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) 19:06:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca5055e0bcfec7be070") seccomp(0x3, 0x0, 0x0) 19:06:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB='n'], 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000540)=""/226, 0xe2}], 0x1}}], 0x1, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119001}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x27c) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:06:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) seccomp(0x3, 0x0, 0x0) [ 211.053430][ T9581] kvm [9578]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 19:06:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x34, 0x0) poll(&(0x7f00000009c0)=[{r1}], 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) 19:06:09 executing program 3: 19:06:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000002000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x7a, 0x0, [0x40000000, 0x10000000800002c1, 0x40000001, 0x3], [0xc1]}) [ 211.332403][ T9590] [ 211.334770][ T9590] ====================================================== [ 211.341789][ T9590] WARNING: possible circular locking dependency detected [ 211.344084][ T3881] kobject: 'loop4' (00000000f9aa6a12): kobject_uevent_env [ 211.348829][ T9590] 5.2.0-rc3-next-20190604 #8 Not tainted [ 211.361588][ T9590] ------------------------------------------------------ [ 211.366800][ T3881] kobject: 'loop4' (00000000f9aa6a12): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 211.368636][ T9590] syz-executor.1/9590 is trying to acquire lock: [ 211.368642][ T9590] 00000000d17f31b5 (&mm->mmap_sem#2){++++}, at: get_user_pages_unlocked+0xfc/0x4a0 [ 211.368682][ T9590] [ 211.368682][ T9590] but task is already holding lock: [ 211.386637][ T9603] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 211.394457][ T9590] 000000005be21d01 (&sb->s_type->i_mutex_key#10){+.+.}, at: ext4_file_write_iter+0x246/0x1070 [ 211.394491][ T9590] [ 211.394491][ T9590] which lock already depends on the new lock. [ 211.394491][ T9590] [ 211.394495][ T9590] [ 211.394495][ T9590] the existing dependency chain (in reverse order) is: [ 211.394498][ T9590] [ 211.394498][ T9590] -> #1 (&sb->s_type->i_mutex_key#10){+.+.}: [ 211.394520][ T9590] down_write+0x38/0xa0 [ 211.394533][ T9590] process_measurement+0x15ae/0x15e0 [ 211.394543][ T9590] ima_file_mmap+0x11a/0x130 [ 211.394553][ T9590] security_file_mprotect+0xd5/0x100 [ 211.394564][ T9590] do_mprotect_pkey+0x537/0xa30 [ 211.394574][ T9590] __x64_sys_mprotect+0x78/0xb0 19:06:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB='n'], 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000540)=""/226, 0xe2}], 0x1}}], 0x1, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119001}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x27c) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:06:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) seccomp(0x3, 0x0, 0x0) 19:06:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x34, 0x0) poll(&(0x7f00000009c0)=[{r1}], 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) [ 211.394585][ T9590] do_syscall_64+0xfd/0x680 [ 211.394598][ T9590] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 211.394601][ T9590] [ 211.394601][ T9590] -> #0 (&mm->mmap_sem#2){++++}: [ 211.394632][ T9590] lock_acquire+0x16f/0x3f0 [ 211.419376][ T9603] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 211.429579][ T9590] down_read+0x3f/0x1e0 [ 211.429592][ T9590] get_user_pages_unlocked+0xfc/0x4a0 [ 211.429603][ T9590] get_user_pages_fast+0x43f/0x530 [ 211.429617][ T9590] iov_iter_get_pages+0x2c2/0xf80 [ 211.429629][ T9590] do_blockdev_direct_IO+0x3f7b/0x8e00 [ 211.429638][ T9590] __blockdev_direct_IO+0xa1/0xca [ 211.429649][ T9590] ext4_direct_IO+0xaa7/0x1bb0 [ 211.429660][ T9590] generic_file_direct_write+0x20a/0x4a0 [ 211.429671][ T9590] __generic_file_write_iter+0x2ee/0x630 [ 211.429684][ T9590] ext4_file_write_iter+0x332/0x1070 [ 211.429695][ T9590] new_sync_write+0x4d3/0x770 [ 211.429704][ T9590] __vfs_write+0xe1/0x110 [ 211.429714][ T9590] vfs_write+0x268/0x5d0 [ 211.429733][ T9590] ksys_write+0x14f/0x290 [ 211.449862][ T3881] kobject: 'loop0' (0000000048b74eff): kobject_uevent_env [ 211.451665][ T9590] __x64_sys_write+0x73/0xb0 [ 211.451678][ T9590] do_syscall_64+0xfd/0x680 [ 211.451691][ T9590] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 211.451695][ T9590] [ 211.451695][ T9590] other info that might help us debug this: [ 211.451695][ T9590] [ 211.451698][ T9590] Possible unsafe locking scenario: [ 211.451698][ T9590] [ 211.451701][ T9590] CPU0 CPU1 [ 211.451704][ T9590] ---- ---- [ 211.451706][ T9590] lock(&sb->s_type->i_mutex_key#10); [ 211.451716][ T9590] lock(&mm->mmap_sem#2); [ 211.494482][ T3881] kobject: 'loop0' (0000000048b74eff): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 211.497771][ T9590] lock(&sb->s_type->i_mutex_key#10); [ 211.497784][ T9590] lock(&mm->mmap_sem#2); [ 211.497792][ T9590] [ 211.497792][ T9590] *** DEADLOCK *** [ 211.497792][ T9590] [ 211.497800][ T9590] 3 locks held by syz-executor.1/9590: [ 211.497812][ T9590] #0: 0000000003c6f362 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 211.507325][ T9601] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 211.512567][ T9590] #1: 000000002481ed3b (sb_writers#3){.+.+}, at: vfs_write+0x485/0x5d0 [ 211.512600][ T9590] #2: 000000005be21d01 (&sb->s_type->i_mutex_key#10){+.+.}, at: ext4_file_write_iter+0x246/0x1070 [ 211.512626][ T9590] [ 211.512626][ T9590] stack backtrace: [ 211.512640][ T9590] CPU: 0 PID: 9590 Comm: syz-executor.1 Not tainted 5.2.0-rc3-next-20190604 #8 [ 211.512656][ T9590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.545913][ T3881] kobject: 'loop2' (0000000043904b58): kobject_uevent_env [ 211.547395][ T9590] Call Trace: [ 211.547415][ T9590] dump_stack+0x172/0x1f0 [ 211.547440][ T9590] print_circular_bug.cold+0x1cc/0x28f [ 211.560691][ T9601] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 211.565118][ T9590] __lock_acquire+0x3755/0x5490 [ 211.565130][ T9590] ? bio_alloc_bioset+0x465/0x680 [ 211.565142][ T9590] ? do_blockdev_direct_IO+0x1b4f/0x8e00 [ 211.565153][ T9590] ? __blockdev_direct_IO+0xa1/0xca [ 211.565167][ T9590] ? ext4_direct_IO+0xaa7/0x1bb0 [ 211.565179][ T9590] ? generic_file_direct_write+0x20a/0x4a0 [ 211.565194][ T9590] ? mark_held_locks+0xf0/0xf0 [ 211.565206][ T9590] ? find_held_lock+0x35/0x130 [ 211.565218][ T9590] ? cache_grow_end+0xa4/0x190 [ 211.565240][ T9590] ? kasan_check_write+0x14/0x20 [ 211.576185][ T3881] kobject: 'loop2' (0000000043904b58): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 211.576259][ T9590] lock_acquire+0x16f/0x3f0 [ 211.600074][ T9602] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 211.602920][ T9590] ? get_user_pages_unlocked+0xfc/0x4a0 [ 211.602944][ T9590] down_read+0x3f/0x1e0 [ 211.602956][ T9590] ? get_user_pages_unlocked+0xfc/0x4a0 [ 211.602968][ T9590] get_user_pages_unlocked+0xfc/0x4a0 [ 211.602982][ T9590] ? mark_held_locks+0xa4/0xf0 [ 211.602996][ T9590] ? get_user_pages_remote+0x4b0/0x4b0 [ 211.603016][ T9590] ? get_user_pages_fast+0x205/0x530 [ 211.622880][ T9602] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 211.624720][ T9590] ? lockdep_hardirqs_on+0x418/0x5d0 [ 211.624736][ T9590] ? trace_hardirqs_on+0x67/0x220 [ 211.624753][ T9590] get_user_pages_fast+0x43f/0x530 [ 211.624776][ T9590] ? __get_user_pages_fast+0x3e0/0x3e0 [ 211.736372][ T3881] kobject: 'loop4' (00000000f9aa6a12): kobject_uevent_env [ 211.741009][ T9590] ? bio_associate_blkg+0x11c/0x390 [ 211.785000][ T3881] kobject: 'loop4' (00000000f9aa6a12): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 211.785775][ T9590] ? find_held_lock+0x35/0x130 [ 211.947054][ T9590] iov_iter_get_pages+0x2c2/0xf80 [ 211.947075][ T9590] ? iov_iter_fault_in_readable+0x450/0x450 [ 211.947091][ T9590] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 211.947102][ T9590] ? bio_add_page+0xd3/0x120 [ 211.947118][ T9590] do_blockdev_direct_IO+0x3f7b/0x8e00 [ 211.947131][ T9590] ? lock_downgrade+0x880/0x880 [ 211.947143][ T9590] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 211.947166][ T9590] ? sb_init_dio_done_wq+0x80/0x80 [ 211.947185][ T9590] ? mark_held_locks+0xf0/0xf0 [ 211.947202][ T9590] ? ext4_dio_get_block_unwritten_async+0x260/0x260 [ 211.947219][ T9590] ? lock_downgrade+0x880/0x880 [ 211.947233][ T9590] ? ext4_dio_get_block_unwritten_async+0x260/0x260 [ 211.947246][ T9590] __blockdev_direct_IO+0xa1/0xca 19:06:10 executing program 1: 19:06:10 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x7a, 0x0, [0x40000000, 0x10000000800002c1, 0x40000001, 0x3], [0xc1]}) 19:06:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) seccomp(0x3, 0x0, 0x0) 19:06:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB='n'], 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000540)=""/226, 0xe2}], 0x1}}], 0x1, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119001}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x27c) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:06:10 executing program 3: [ 211.947260][ T9590] ? __check_block_validity.constprop.0+0x300/0x300 [ 211.947273][ T9590] ext4_direct_IO+0xaa7/0x1bb0 [ 211.947287][ T9590] ? ext4_dio_get_block_unwritten_async+0x260/0x260 [ 211.947305][ T9590] generic_file_direct_write+0x20a/0x4a0 [ 211.947321][ T9590] __generic_file_write_iter+0x2ee/0x630 [ 211.947337][ T9590] ext4_file_write_iter+0x332/0x1070 [ 211.947350][ T9590] ? kasan_check_read+0x11/0x20 [ 211.947366][ T9590] ? ext4_file_mmap+0x410/0x410 [ 211.947383][ T9590] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 211.947396][ T9590] ? iov_iter_init+0xee/0x220 [ 211.947409][ T9590] new_sync_write+0x4d3/0x770 [ 211.947421][ T9590] ? new_sync_read+0x800/0x800 [ 211.947432][ T9590] ? __fdget_pos+0xee/0x110 [ 211.947453][ T9590] __vfs_write+0xe1/0x110 [ 211.947466][ T9590] vfs_write+0x268/0x5d0 [ 211.947480][ T9590] ksys_write+0x14f/0x290 [ 211.947492][ T9590] ? __ia32_sys_read+0xb0/0xb0 [ 211.947507][ T9590] ? do_syscall_64+0x26/0x680 [ 211.947521][ T9590] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 19:06:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) seccomp(0x3, 0x0, 0x0) [ 211.947533][ T9590] ? do_syscall_64+0x26/0x680 [ 211.947547][ T9590] __x64_sys_write+0x73/0xb0 [ 211.947561][ T9590] do_syscall_64+0xfd/0x680 [ 211.947575][ T9590] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 211.947585][ T9590] RIP: 0033:0x459279 [ 211.947600][ T9590] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 211.947607][ T9590] RSP: 002b:00007f624fa85c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 211.947619][ T9590] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 211.947627][ T9590] RDX: 0000000020000012 RSI: 0000000020000000 RDI: 0000000000000004 [ 211.947634][ T9590] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 211.947642][ T9590] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f624fa866d4 [ 211.947649][ T9590] R13: 00000000004c8ec2 R14: 00000000004dfb80 R15: 00000000ffffffff [ 211.959143][ T3881] kobject: 'loop0' (0000000048b74eff): kobject_uevent_env [ 211.959177][ T3881] kobject: 'loop0' (0000000048b74eff): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 211.960397][ T3881] kobject: 'loop3' (00000000154a724a): kobject_uevent_env [ 211.960431][ T3881] kobject: 'loop3' (00000000154a724a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 212.005038][ T9601] kvm [9599]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 [ 212.005403][ T9599] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 212.005435][ T9599] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' 19:06:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="8203e7"], 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f000052fff8)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='/', r0, &(0x7f0000d06ff8)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x200, 0x0) 19:06:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x34, 0x0) poll(&(0x7f00000009c0)=[{r1}], 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) 19:06:10 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000300)={&(0x7f0000000380)=@gettaction={0x230, 0x32, 0x10, 0x70bd25, 0x25dfdbfe, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_gd=@TCA_ACT_TAB={0x38, 0x1, [{0x14, 0x3, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}, {0x10, 0x1f, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x10, 0x1, @TCA_ACT_INDEX={0x8, 0x3, 0x8000}}]}, @action_gd=@TCA_ACT_TAB={0xb0, 0x1, [{0x14, 0xc, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x10, 0x2, @TCA_ACT_INDEX={0x8, 0x3, 0xc88e}}, {0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x800}}, {0x10, 0x1d, @TCA_ACT_INDEX={0x8, 0x3, 0x60d3}}, {0x10, 0x1d, @TCA_ACT_INDEX={0x8, 0x3, 0x80}}, {0x10, 0x9, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x10, 0x1c, @TCA_ACT_INDEX={0x8, 0x3, 0xda}}, {0x10, 0x1c, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x14, 0x4, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x14, 0x1c, @TCA_ACT_KIND={0xc, 0x1, 'mirred\x00'}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x0, 0x1}}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x6ac}, @action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0xf, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_gd=@TCA_ACT_TAB={0x38, 0x1, [{0x14, 0xc, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}, {0x10, 0x14, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x10, 0xf, @TCA_ACT_INDEX={0x8, 0x3, 0x785a}}]}, @action_gd=@TCA_ACT_TAB={0x5c, 0x1, [{0x10, 0x1b, @TCA_ACT_INDEX={0x8, 0x3, 0x75a29907}}, {0x10, 0x1e, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x10, 0x14, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x18, 0xb, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x60, 0x1, [{0x14, 0xd, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x14, 0xe, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}, {0x10, 0x5, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x14, 0x1a, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x10, 0x20, @TCA_ACT_INDEX={0x8, 0x3, 0xffffffff}}]}]}, 0x230}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040080) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000200)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x7ff, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = dup2(r1, r2) accept$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000240)=0x1c) mount(0x0, 0x0, 0x0, 0xc0000, 0x0) sendto$unix(r4, &(0x7f0000000280)="c44589d78bedd2e43e0eaad36054f6f24bbb13e7ca0f46dd7965f502f0365564610631b14654d45ad0c67aa3fd08780c86f819df6770299cdd3335", 0x3b, 0x0, 0x0, 0x0) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000040)={0x0, 0xfffffffffffffd40, 0x0}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)={0x0, 0x2, 0x2, 0x7f}) prctl$PR_SET_SECUREBITS(0x1c, 0x4) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000600)=r4, 0x4) [ 212.047058][ T3881] kobject: 'loop5' (00000000dfeb74ab): kobject_uevent_env [ 212.047096][ T3881] kobject: 'loop5' (00000000dfeb74ab): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 212.160536][ T3881] kobject: 'loop1' (00000000ad352053): kobject_uevent_env [ 212.160573][ T3881] kobject: 'loop1' (00000000ad352053): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 212.162506][ T9623] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 212.162666][ T9623] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 212.183840][ T9619] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 212.183873][ T9619] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 212.196099][ T9625] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 212.262000][ T3881] kobject: 'loop0' (0000000048b74eff): kobject_uevent_env [ 212.298331][ T9625] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' 19:06:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) seccomp(0x3, 0x0, 0x0) [ 212.406085][ T3881] kobject: 'loop0' (0000000048b74eff): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 212.446182][ T9631] kobject: 'vat' (00000000e26487fd): kobject_add_internal: parent: 'net', set: 'devices' [ 212.555672][ T9631] kobject: 'vat' (00000000e26487fd): kobject_uevent_env 19:06:10 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x7a, 0x0, [0x40000000, 0x10000000800002c1, 0x40000001, 0x3], [0xc1]}) [ 212.567477][ T3881] kobject: 'loop2' (0000000043904b58): kobject_uevent_env [ 212.576514][ T9631] kobject: 'vat' (00000000e26487fd): fill_kobj_path: path = '/devices/virtual/net/vat' [ 212.590933][ T9631] kobject: 'queues' (0000000051c6c42d): kobject_add_internal: parent: 'vat', set: '' [ 212.596281][ T3881] kobject: 'loop2' (0000000043904b58): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 212.604261][ T9631] kobject: 'queues' (0000000051c6c42d): kobject_uevent_env 19:06:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="8203e7"], 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f000052fff8)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='/', r0, &(0x7f0000d06ff8)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x200, 0x0) [ 212.638231][ T9643] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 212.645787][ T3881] kobject: 'loop3' (00000000154a724a): kobject_uevent_env [ 212.646415][ T9631] kobject: 'queues' (0000000051c6c42d): kobject_uevent_env: filter function caused the event to drop! [ 212.654788][ T9643] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 212.676925][ T3881] kobject: 'loop3' (00000000154a724a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 212.679142][ T9618] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 212.689358][ T3881] kobject: 'loop1' (00000000ad352053): kobject_uevent_env [ 212.701542][ T3881] kobject: 'loop1' (00000000ad352053): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 212.705824][ T9631] kobject: 'rx-0' (00000000cf5d22c6): kobject_add_internal: parent: 'queues', set: 'queues' [ 212.715842][ T9642] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 212.730993][ T3881] kobject: 'loop5' (00000000dfeb74ab): kobject_uevent_env [ 212.738358][ T9642] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 212.739666][ T9618] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 212.753874][ T3881] kobject: 'loop5' (00000000dfeb74ab): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 212.770976][ T9631] kobject: 'rx-0' (00000000cf5d22c6): kobject_uevent_env 19:06:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="8203e7"], 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f000052fff8)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='/', r0, &(0x7f0000d06ff8)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x200, 0x0) 19:06:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x7a, 0x0, [0x40000000, 0x10000000800002c1, 0x40000001, 0x3], [0xc1]}) [ 212.796917][ T3881] kobject: 'loop1' (00000000ad352053): kobject_uevent_env [ 212.798918][ T9631] kobject: 'rx-0' (00000000cf5d22c6): fill_kobj_path: path = '/devices/virtual/net/vat/queues/rx-0' [ 212.804812][ T3881] kobject: 'loop1' (00000000ad352053): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 212.831468][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 212.837265][ C0] protocol 88fb is buggy, dev hsr_slave_1 19:06:11 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB='n'], 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000540)=""/226, 0xe2}], 0x1}}], 0x1, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119001}) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 212.860292][ T9652] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 212.863779][ T9631] kobject: 'tx-0' (000000002869aa5a): kobject_add_internal: parent: 'queues', set: 'queues' [ 212.881148][ T3881] kobject: 'loop5' (00000000dfeb74ab): kobject_uevent_env [ 212.888474][ T9631] kobject: 'tx-0' (000000002869aa5a): kobject_uevent_env [ 212.898390][ T9652] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 212.898873][ T9631] kobject: 'tx-0' (000000002869aa5a): fill_kobj_path: path = '/devices/virtual/net/vat/queues/tx-0' [ 212.910654][ T3881] kobject: 'loop5' (00000000dfeb74ab): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 212.919128][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 212.935222][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 212.937057][ T9651] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 212.945569][ T9631] kobject: 'batman_adv' (0000000062fb2817): kobject_add_internal: parent: 'vat', set: '' 19:06:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) seccomp(0x3, 0x0, 0x0) [ 212.957834][ T9657] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 212.976141][ T3881] kobject: 'loop1' (00000000ad352053): kobject_uevent_env [ 212.984638][ T9651] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 212.996910][ T9657] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' 19:06:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="8203e7"], 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f000052fff8)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='/', r0, &(0x7f0000d06ff8)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x200, 0x0) 19:06:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0b") r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x34, 0x0) poll(&(0x7f00000009c0)=[{r1}], 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) [ 213.012047][ T3881] kobject: 'loop1' (00000000ad352053): fill_kobj_path: path = '/devices/virtual/block/loop1' 19:06:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000002000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000280)={0x7a, 0x0, [0x40000000, 0x10000000800002c1, 0x40000001, 0x3], [0xc1]}) [ 213.081123][ T3881] kobject: 'loop4' (00000000f9aa6a12): kobject_uevent_env [ 213.108721][ T9636] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 213.126807][ T3881] kobject: 'loop4' (00000000f9aa6a12): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 213.128576][ T9636] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 19:06:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="8203e7"], 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f000052fff8)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='/', r0, &(0x7f0000d06ff8)='./file0\x00') [ 213.178667][ T3881] kobject: 'loop0' (0000000048b74eff): kobject_uevent_env [ 213.188040][ T9668] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 213.189279][ T9656] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 213.202310][ T3881] kobject: 'loop0' (0000000048b74eff): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 213.213431][ T9656] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 213.224786][ T3881] kobject: 'loop1' (00000000ad352053): kobject_uevent_env [ 213.233272][ T3881] kobject: 'loop1' (00000000ad352053): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 213.246530][ T9668] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 213.267075][ T9636] chnl_net:chnl_net_open(): err: Unable to register and open device, Err:-19 [ 213.270126][ T3881] kobject: 'loop2' (0000000043904b58): kobject_uevent_env [ 213.278089][ T9636] caif:caif_disconnect_client(): nothing to disconnect [ 213.289253][ T3881] kobject: 'loop2' (0000000043904b58): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 213.304987][ T9667] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 213.317692][ T9667] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 213.328688][ T3881] kobject: 'loop5' (00000000dfeb74ab): kobject_uevent_env [ 213.331752][ T9636] chnl_net:chnl_flowctrl_cb(): NET flowctrl func called flow: CLOSE/DEINIT [ 213.337259][ T3881] kobject: 'loop5' (00000000dfeb74ab): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 213.356285][ T3881] kobject: 'loop1' (00000000ad352053): kobject_uevent_env [ 213.365879][ T9636] chnl_net:chnl_net_open(): state disconnected [ 213.372232][ T3881] kobject: 'loop1' (00000000ad352053): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 213.382495][ T9636] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 213.395033][ T3881] kobject: 'loop4' (00000000f9aa6a12): kobject_uevent_env [ 213.407495][ T9639] kobject: 'batman_adv' (0000000062fb2817): kobject_uevent_env [ 213.415215][ T3881] kobject: 'loop4' (00000000f9aa6a12): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 213.425719][ T9639] kobject: 'batman_adv' (0000000062fb2817): kobject_uevent_env: filter function caused the event to drop! [ 213.438142][ T9639] kobject: 'batman_adv' (0000000062fb2817): kobject_cleanup, parent 0000000030e83bc8 [ 213.448809][ T9639] kobject: 'batman_adv' (0000000062fb2817): calling ktype release [ 213.453557][ T3881] kobject: 'loop5' (00000000dfeb74ab): kobject_uevent_env [ 213.461503][ T9639] kobject: (0000000062fb2817): dynamic_kobj_release [ 213.466803][ T3881] kobject: 'loop5' (00000000dfeb74ab): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 213.470506][ T9639] kobject: 'batman_adv': free name [ 213.487513][ T3881] kobject: 'loop0' (0000000048b74eff): kobject_uevent_env [ 213.488627][ T9639] kobject: 'rx-0' (00000000cf5d22c6): kobject_cleanup, parent 0000000051c6c42d [ 213.494775][ T3881] kobject: 'loop0' (0000000048b74eff): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 213.523238][ T9639] kobject: 'rx-0' (00000000cf5d22c6): auto cleanup 'remove' event [ 213.569267][ T9639] kobject: 'rx-0' (00000000cf5d22c6): kobject_uevent_env [ 213.603885][ T9639] kobject: 'rx-0' (00000000cf5d22c6): fill_kobj_path: path = '/devices/virtual/net/vat/queues/rx-0' [ 213.639995][ T9639] kobject: 'rx-0' (00000000cf5d22c6): auto cleanup kobject_del [ 213.650140][ T9639] kobject: 'rx-0' (00000000cf5d22c6): calling ktype release [ 213.681627][ T9639] kobject: 'rx-0': free name [ 213.688621][ T9639] kobject: 'tx-0' (000000002869aa5a): kobject_cleanup, parent 0000000051c6c42d [ 213.699327][ T9639] kobject: 'tx-0' (000000002869aa5a): auto cleanup 'remove' event [ 213.707603][ T9639] kobject: 'tx-0' (000000002869aa5a): kobject_uevent_env [ 213.723125][ T9639] kobject: 'tx-0' (000000002869aa5a): fill_kobj_path: path = '/devices/virtual/net/vat/queues/tx-0' [ 213.750605][ T9639] kobject: 'tx-0' (000000002869aa5a): auto cleanup kobject_del [ 213.763123][ T9639] kobject: 'tx-0' (000000002869aa5a): calling ktype release [ 213.778500][ T9639] kobject: 'tx-0': free name [ 213.783821][ T9639] kobject: 'queues' (0000000051c6c42d): kobject_cleanup, parent 0000000030e83bc8 [ 213.793462][ T9639] kobject: 'queues' (0000000051c6c42d): calling ktype release [ 213.801042][ T9639] kobject: 'queues' (0000000051c6c42d): kset_release [ 213.807957][ T9639] kobject: 'queues': free name [ 213.813232][ T9639] kobject: 'vat' (00000000e26487fd): kobject_uevent_env [ 213.820271][ T9639] kobject: 'vat' (00000000e26487fd): fill_kobj_path: path = '/devices/virtual/net/vat' [ 213.830787][ T9631] kobject: 'vat' (00000000638cf78a): kobject_add_internal: parent: 'net', set: 'devices' [ 213.841316][ T9631] kobject: 'vat' (00000000638cf78a): kobject_uevent_env [ 213.848402][ T9631] kobject: 'vat' (00000000638cf78a): fill_kobj_path: path = '/devices/virtual/net/vat' [ 213.858240][ T9631] kobject: 'queues' (00000000c9f17dfc): kobject_add_internal: parent: 'vat', set: '' [ 213.868303][ T9631] kobject: 'queues' (00000000c9f17dfc): kobject_uevent_env [ 213.875595][ T9631] kobject: 'queues' (00000000c9f17dfc): kobject_uevent_env: filter function caused the event to drop! [ 213.886703][ T9631] kobject: 'rx-0' (000000000af5e9ac): kobject_add_internal: parent: 'queues', set: 'queues' [ 213.897899][ T9631] kobject: 'rx-0' (000000000af5e9ac): kobject_uevent_env [ 213.905060][ T9631] kobject: 'rx-0' (000000000af5e9ac): fill_kobj_path: path = '/devices/virtual/net/vat/queues/rx-0' [ 213.916011][ T9631] kobject: 'tx-0' (00000000b2218386): kobject_add_internal: parent: 'queues', set: 'queues' [ 213.922000][ T3881] kobject: 'loop2' (0000000043904b58): kobject_uevent_env [ 213.926280][ T9631] kobject: 'tx-0' (00000000b2218386): kobject_uevent_env [ 213.938613][ T3881] kobject: 'loop2' (0000000043904b58): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 213.940294][ T9631] kobject: 'tx-0' (00000000b2218386): fill_kobj_path: path = '/devices/virtual/net/vat/queues/tx-0' [ 213.962183][ T9631] kobject: 'batman_adv' (000000000418ca21): kobject_add_internal: parent: 'vat', set: '' [ 213.974174][ T9631] kobject: 'batman_adv' (000000000418ca21): kobject_uevent_env [ 213.981949][ T9631] kobject: 'batman_adv' (000000000418ca21): kobject_uevent_env: filter function caused the event to drop! [ 213.993345][ T9631] kobject: 'batman_adv' (000000000418ca21): kobject_cleanup, parent 0000000030e83bc8 [ 214.002856][ T9631] kobject: 'batman_adv' (000000000418ca21): calling ktype release [ 214.010655][ T9631] kobject: (000000000418ca21): dynamic_kobj_release [ 214.017292][ T9631] kobject: 'batman_adv': free name [ 214.022603][ T9631] kobject: 'rx-0' (000000000af5e9ac): kobject_cleanup, parent 00000000c9f17dfc [ 214.032048][ T9631] kobject: 'rx-0' (000000000af5e9ac): auto cleanup 'remove' event [ 214.039868][ T9631] kobject: 'rx-0' (000000000af5e9ac): kobject_uevent_env [ 214.047160][ T9631] kobject: 'rx-0' (000000000af5e9ac): fill_kobj_path: path = '/devices/virtual/net/vat/queues/rx-0' [ 214.058063][ T9631] kobject: 'rx-0' (000000000af5e9ac): auto cleanup kobject_del [ 214.065665][ T9631] kobject: 'rx-0' (000000000af5e9ac): calling ktype release [ 214.073154][ T9631] kobject: 'rx-0': free name [ 214.077796][ T9631] kobject: 'tx-0' (00000000b2218386): kobject_cleanup, parent 00000000c9f17dfc [ 214.086761][ T9631] kobject: 'tx-0' (00000000b2218386): auto cleanup 'remove' event [ 214.094603][ T9631] kobject: 'tx-0' (00000000b2218386): kobject_uevent_env [ 214.101729][ T9631] kobject: 'tx-0' (00000000b2218386): fill_kobj_path: path = '/devices/virtual/net/vat/queues/tx-0' [ 214.112786][ T9631] kobject: 'tx-0' (00000000b2218386): auto cleanup kobject_del [ 214.120366][ T9631] kobject: 'tx-0' (00000000b2218386): calling ktype release [ 214.127778][ T9631] kobject: 'tx-0': free name [ 214.132620][ T9631] kobject: 'queues' (00000000c9f17dfc): kobject_cleanup, parent 0000000030e83bc8 [ 214.141794][ T9631] kobject: 'queues' (00000000c9f17dfc): calling ktype release [ 214.149253][ T9631] kobject: 'queues' (00000000c9f17dfc): kset_release [ 214.155973][ T9631] kobject: 'queues': free name [ 214.160992][ T9631] kobject: 'vat' (00000000638cf78a): kobject_uevent_env [ 214.168028][ T9631] kobject: 'vat' (00000000638cf78a): fill_kobj_path: path = '/devices/virtual/net/vat' [ 214.179996][ T9673] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 214.188771][ T9673] chnl_net:chnl_net_open(): err: Unable to register and open device, Err:-19 [ 214.197654][ T9673] caif:caif_disconnect_client(): nothing to disconnect [ 214.242156][ T9673] chnl_net:chnl_flowctrl_cb(): NET flowctrl func called flow: CLOSE/DEINIT [ 214.250845][ T9673] chnl_net:chnl_net_open(): state disconnected [ 214.257097][ T9673] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 214.272708][ T9639] kobject: 'vat' (00000000e26487fd): kobject_cleanup, parent 0000000030e83bc8 [ 214.273900][ T9631] kobject: 'vat' (00000000638cf78a): kobject_cleanup, parent 0000000030e83bc8 19:06:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="8203e7"], 0x1) symlinkat(&(0x7f00000000c0)='/', 0xffffffffffffffff, &(0x7f0000d06ff8)='./file0\x00') 19:06:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB='n'], 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000540)=""/226, 0xe2}], 0x1}}], 0x1, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119001}) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:06:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000002000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000280)={0x7a, 0x0, [0x40000000, 0x10000000800002c1, 0x40000001, 0x3], [0xc1]}) 19:06:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0b") seccomp(0x3, 0x0, 0x0) 19:06:12 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000300)={&(0x7f0000000380)=@gettaction={0x230, 0x32, 0x10, 0x70bd25, 0x25dfdbfe, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_gd=@TCA_ACT_TAB={0x38, 0x1, [{0x14, 0x3, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}, {0x10, 0x1f, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x10, 0x1, @TCA_ACT_INDEX={0x8, 0x3, 0x8000}}]}, @action_gd=@TCA_ACT_TAB={0xb0, 0x1, [{0x14, 0xc, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x10, 0x2, @TCA_ACT_INDEX={0x8, 0x3, 0xc88e}}, {0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x800}}, {0x10, 0x1d, @TCA_ACT_INDEX={0x8, 0x3, 0x60d3}}, {0x10, 0x1d, @TCA_ACT_INDEX={0x8, 0x3, 0x80}}, {0x10, 0x9, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x10, 0x1c, @TCA_ACT_INDEX={0x8, 0x3, 0xda}}, {0x10, 0x1c, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x14, 0x4, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x14, 0x1c, @TCA_ACT_KIND={0xc, 0x1, 'mirred\x00'}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x0, 0x1}}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x6ac}, @action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0xf, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_gd=@TCA_ACT_TAB={0x38, 0x1, [{0x14, 0xc, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}, {0x10, 0x14, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x10, 0xf, @TCA_ACT_INDEX={0x8, 0x3, 0x785a}}]}, @action_gd=@TCA_ACT_TAB={0x5c, 0x1, [{0x10, 0x1b, @TCA_ACT_INDEX={0x8, 0x3, 0x75a29907}}, {0x10, 0x1e, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x10, 0x14, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x18, 0xb, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x60, 0x1, [{0x14, 0xd, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x14, 0xe, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}, {0x10, 0x5, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x14, 0x1a, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x10, 0x20, @TCA_ACT_INDEX={0x8, 0x3, 0xffffffff}}]}]}, 0x230}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040080) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000200)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x7ff, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = dup2(r1, r2) accept$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000240)=0x1c) mount(0x0, 0x0, 0x0, 0xc0000, 0x0) sendto$unix(r4, &(0x7f0000000280)="c44589d78bedd2e43e0eaad36054f6f24bbb13e7ca0f46dd7965f502f0365564610631b14654d45ad0c67aa3fd08780c86f819df6770299cdd3335", 0x3b, 0x0, 0x0, 0x0) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000040)={0x0, 0xfffffffffffffd40, 0x0}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)={0x0, 0x2, 0x2, 0x7f}) prctl$PR_SET_SECUREBITS(0x1c, 0x4) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000600)=r4, 0x4) 19:06:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0b") r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x34, 0x0) poll(&(0x7f00000009c0)=[{r1}], 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) [ 214.281842][ T9639] kobject: 'vat' (00000000e26487fd): calling ktype release [ 214.293090][ T9631] kobject: 'vat' (00000000638cf78a): calling ktype release [ 214.298031][ T9639] kobject: 'vat': free name [ 214.306906][ T9631] kobject: 'vat': free name [ 214.348552][ T3881] kobject: 'loop3' (00000000154a724a): kobject_uevent_env [ 214.359228][ T9697] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 214.362306][ T3881] kobject: 'loop3' (00000000154a724a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 214.377791][ T9699] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 214.387306][ T9697] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' 19:06:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0b") seccomp(0x3, 0x0, 0x0) [ 214.397599][ T9699] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 214.408171][ T9701] kobject: 'vat' (000000006f9aeebe): kobject_add_internal: parent: 'net', set: 'devices' [ 214.415217][ T9694] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env 19:06:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="8203e7"], 0x1) symlinkat(&(0x7f00000000c0)='/', 0xffffffffffffffff, &(0x7f0000d06ff8)='./file0\x00') [ 214.450299][ T3881] kobject: 'loop0' (0000000048b74eff): kobject_uevent_env [ 214.452206][ T9701] kobject: 'vat' (000000006f9aeebe): kobject_uevent_env [ 214.481560][ T3881] kobject: 'loop0' (0000000048b74eff): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 214.483855][ T9694] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 214.519012][ T9698] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 214.526253][ T9698] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 214.529297][ T3881] kobject: 'loop1' (00000000ad352053): kobject_uevent_env [ 214.548422][ T9701] kobject: 'vat' (000000006f9aeebe): fill_kobj_path: path = '/devices/virtual/net/vat' [ 214.587688][ T3881] kobject: 'loop1' (00000000ad352053): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 214.614468][ T9701] kobject: 'queues' (00000000d157e064): kobject_add_internal: parent: 'vat', set: '' [ 214.622175][ T3881] kobject: 'loop2' (0000000043904b58): kobject_uevent_env [ 214.635227][ T9701] kobject: 'queues' (00000000d157e064): kobject_uevent_env [ 214.641009][ T3881] kobject: 'loop2' (0000000043904b58): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 214.653048][ T9701] kobject: 'queues' (00000000d157e064): kobject_uevent_env: filter function caused the event to drop! [ 214.668123][ T9701] kobject: 'rx-0' (00000000a10a280b): kobject_add_internal: parent: 'queues', set: 'queues' [ 214.671867][ T3881] kobject: 'loop5' (00000000dfeb74ab): kobject_uevent_env [ 214.678813][ T9701] kobject: 'rx-0' (00000000a10a280b): kobject_uevent_env [ 214.688732][ T3881] kobject: 'loop5' (00000000dfeb74ab): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 214.693227][ T9701] kobject: 'rx-0' (00000000a10a280b): fill_kobj_path: path = '/devices/virtual/net/vat/queues/rx-0' [ 214.705219][ T3881] kobject: 'loop1' (00000000ad352053): kobject_uevent_env [ 214.714947][ T9701] kobject: 'tx-0' (00000000464501af): kobject_add_internal: parent: 'queues', set: 'queues' [ 214.722001][ T3881] kobject: 'loop1' (00000000ad352053): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 214.734721][ T9701] kobject: 'tx-0' (00000000464501af): kobject_uevent_env [ 214.743924][ T3881] kobject: 'loop4' (00000000f9aa6a12): kobject_uevent_env 19:06:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0b") r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x34, 0x0) poll(&(0x7f00000009c0)=[{r1}], 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) 19:06:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB='n'], 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000540)=""/226, 0xe2}], 0x1}}], 0x1, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119001}) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:06:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="8203e7"], 0x1) symlinkat(&(0x7f00000000c0)='/', 0xffffffffffffffff, &(0x7f0000d06ff8)='./file0\x00') 19:06:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0b") seccomp(0x3, 0x0, 0x0) 19:06:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000002000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000280)={0x7a, 0x0, [0x40000000, 0x10000000800002c1, 0x40000001, 0x3], [0xc1]}) [ 214.749565][ T9701] kobject: 'tx-0' (00000000464501af): fill_kobj_path: path = '/devices/virtual/net/vat/queues/tx-0' [ 214.756911][ T3881] kobject: 'loop4' (00000000f9aa6a12): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 214.772144][ T9701] kobject: 'batman_adv' (00000000bed3ff0d): kobject_add_internal: parent: 'vat', set: '' [ 214.836904][ T9720] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 214.846078][ T3881] kobject: 'loop0' (0000000048b74eff): kobject_uevent_env [ 214.890961][ T9722] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 214.905720][ T3881] kobject: 'loop0' (0000000048b74eff): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 214.916045][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 214.916087][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 214.923957][ T9720] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' 19:06:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f000052fff8)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='/', r0, &(0x7f0000d06ff8)='./file0\x00') [ 214.940258][ T9722] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 214.958120][ T9705] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 214.972265][ T9719] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 214.973786][ T9721] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 214.980465][ T9719] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 214.997695][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 215.003506][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 215.039488][ T9705] chnl_net:chnl_net_open(): err: Unable to register and open device, Err:-19 [ 215.047295][ T9721] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 215.074031][ T9705] caif:caif_disconnect_client(): nothing to disconnect 19:06:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB='n'], 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000540)=""/226, 0xe2}], 0x1}}], 0x1, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x27c) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:06:13 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000002000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4008ae89, &(0x7f0000000280)={0x7a, 0x0, [0x40000000, 0x10000000800002c1, 0x40000001, 0x3], [0xc1]}) [ 215.107849][ T3881] kobject: 'loop4' (00000000f9aa6a12): kobject_uevent_env [ 215.121803][ T9705] chnl_net:chnl_flowctrl_cb(): NET flowctrl func called flow: CLOSE/DEINIT [ 215.124608][ T3881] kobject: 'loop4' (00000000f9aa6a12): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 215.147290][ T9705] chnl_net:chnl_net_open(): state disconnected [ 215.159902][ T9738] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 215.167064][ T9705] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 215.171339][ T3881] kobject: 'loop5' (00000000dfeb74ab): kobject_uevent_env [ 215.190062][ T9738] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 215.206977][ T3881] kobject: 'loop5' (00000000dfeb74ab): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 215.270992][ T3881] kobject: 'loop5' (00000000dfeb74ab): kobject_uevent_env [ 215.278297][ T3881] kobject: 'loop5' (00000000dfeb74ab): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 215.290351][ T3881] kobject: 'loop0' (0000000048b74eff): kobject_uevent_env [ 215.296890][ T9737] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 215.297668][ T3881] kobject: 'loop0' (0000000048b74eff): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 215.307383][ T9737] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 215.326123][ T9709] kobject: 'batman_adv' (00000000bed3ff0d): kobject_uevent_env [ 215.334960][ T3881] kobject: 'loop2' (0000000043904b58): kobject_uevent_env [ 215.343420][ T3881] kobject: 'loop2' (0000000043904b58): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 215.353848][ T9709] kobject: 'batman_adv' (00000000bed3ff0d): kobject_uevent_env: filter function caused the event to drop! [ 215.391785][ T9709] kobject: 'batman_adv' (00000000bed3ff0d): kobject_cleanup, parent 0000000030e83bc8 [ 215.414522][ T9709] kobject: 'batman_adv' (00000000bed3ff0d): calling ktype release [ 215.428789][ T9709] kobject: (00000000bed3ff0d): dynamic_kobj_release [ 215.435706][ T9709] kobject: 'batman_adv': free name [ 215.443235][ T9709] kobject: 'rx-0' (00000000a10a280b): kobject_cleanup, parent 00000000d157e064 [ 215.448793][ T3881] kobject: 'loop4' (00000000f9aa6a12): kobject_uevent_env [ 215.452592][ T9709] kobject: 'rx-0' (00000000a10a280b): auto cleanup 'remove' event [ 215.459341][ T3881] kobject: 'loop4' (00000000f9aa6a12): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 215.469280][ T9709] kobject: 'rx-0' (00000000a10a280b): kobject_uevent_env [ 215.485520][ T9709] kobject: 'rx-0' (00000000a10a280b): fill_kobj_path: path = '/devices/virtual/net/vat/queues/rx-0' [ 215.496801][ T9709] kobject: 'rx-0' (00000000a10a280b): auto cleanup kobject_del [ 215.504656][ T9709] kobject: 'rx-0' (00000000a10a280b): calling ktype release [ 215.512235][ T9709] kobject: 'rx-0': free name [ 215.516902][ T9709] kobject: 'tx-0' (00000000464501af): kobject_cleanup, parent 00000000d157e064 [ 215.526008][ T9709] kobject: 'tx-0' (00000000464501af): auto cleanup 'remove' event [ 215.533884][ T9709] kobject: 'tx-0' (00000000464501af): kobject_uevent_env [ 215.540951][ T9709] kobject: 'tx-0' (00000000464501af): fill_kobj_path: path = '/devices/virtual/net/vat/queues/tx-0' [ 215.552652][ T9709] kobject: 'tx-0' (00000000464501af): auto cleanup kobject_del [ 215.560229][ T9709] kobject: 'tx-0' (00000000464501af): calling ktype release [ 215.567545][ T9709] kobject: 'tx-0': free name [ 215.572328][ T9709] kobject: 'queues' (00000000d157e064): kobject_cleanup, parent 0000000030e83bc8 [ 215.581664][ T9709] kobject: 'queues' (00000000d157e064): calling ktype release [ 215.589134][ T9709] kobject: 'queues' (00000000d157e064): kset_release [ 215.595886][ T9709] kobject: 'queues': free name [ 215.600898][ T9709] kobject: 'vat' (000000006f9aeebe): kobject_uevent_env [ 215.608380][ T9709] kobject: 'vat' (000000006f9aeebe): fill_kobj_path: path = '/devices/virtual/net/vat' 19:06:13 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000300)={&(0x7f0000000380)=@gettaction={0x230, 0x32, 0x10, 0x70bd25, 0x25dfdbfe, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_gd=@TCA_ACT_TAB={0x38, 0x1, [{0x14, 0x3, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}, {0x10, 0x1f, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x10, 0x1, @TCA_ACT_INDEX={0x8, 0x3, 0x8000}}]}, @action_gd=@TCA_ACT_TAB={0xb0, 0x1, [{0x14, 0xc, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x10, 0x2, @TCA_ACT_INDEX={0x8, 0x3, 0xc88e}}, {0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x800}}, {0x10, 0x1d, @TCA_ACT_INDEX={0x8, 0x3, 0x60d3}}, {0x10, 0x1d, @TCA_ACT_INDEX={0x8, 0x3, 0x80}}, {0x10, 0x9, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x10, 0x1c, @TCA_ACT_INDEX={0x8, 0x3, 0xda}}, {0x10, 0x1c, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x14, 0x4, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x14, 0x1c, @TCA_ACT_KIND={0xc, 0x1, 'mirred\x00'}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x0, 0x1}}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x6ac}, @action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0xf, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_gd=@TCA_ACT_TAB={0x38, 0x1, [{0x14, 0xc, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}, {0x10, 0x14, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x10, 0xf, @TCA_ACT_INDEX={0x8, 0x3, 0x785a}}]}, @action_gd=@TCA_ACT_TAB={0x5c, 0x1, [{0x10, 0x1b, @TCA_ACT_INDEX={0x8, 0x3, 0x75a29907}}, {0x10, 0x1e, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x10, 0x14, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x18, 0xb, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x60, 0x1, [{0x14, 0xd, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x14, 0xe, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}, {0x10, 0x5, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x14, 0x1a, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x10, 0x20, @TCA_ACT_INDEX={0x8, 0x3, 0xffffffff}}]}]}, 0x230}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040080) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000200)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x7ff, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = dup2(r1, r2) accept$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000240)=0x1c) mount(0x0, 0x0, 0x0, 0xc0000, 0x0) sendto$unix(r4, &(0x7f0000000280)="c44589d78bedd2e43e0eaad36054f6f24bbb13e7ca0f46dd7965f502f0365564610631b14654d45ad0c67aa3fd08780c86f819df6770299cdd3335", 0x3b, 0x0, 0x0, 0x0) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000040)={0x0, 0xfffffffffffffd40, 0x0}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)={0x0, 0x2, 0x2, 0x7f}) prctl$PR_SET_SECUREBITS(0x1c, 0x4) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000600)=r4, 0x4) 19:06:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f000052fff8)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='/', r0, &(0x7f0000d06ff8)='./file0\x00') 19:06:13 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000002000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4008ae89, &(0x7f0000000280)={0x7a, 0x0, [0x40000000, 0x10000000800002c1, 0x40000001, 0x3], [0xc1]}) 19:06:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7b") seccomp(0x3, 0x0, 0x0) 19:06:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7b") r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x34, 0x0) poll(&(0x7f00000009c0)=[{r1}], 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) 19:06:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB='n'], 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000540)=""/226, 0xe2}], 0x1}}], 0x1, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x27c) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 215.651588][ T9709] kobject: 'vat' (000000006f9aeebe): kobject_cleanup, parent 0000000030e83bc8 [ 215.660475][ T9709] kobject: 'vat' (000000006f9aeebe): calling ktype release [ 215.669977][ T9709] kobject: 'vat': free name 19:06:13 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000002000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4008ae89, &(0x7f0000000280)={0x7a, 0x0, [0x40000000, 0x10000000800002c1, 0x40000001, 0x3], [0xc1]}) 19:06:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f000052fff8)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='/', r0, &(0x7f0000d06ff8)='./file0\x00') 19:06:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7b") seccomp(0x3, 0x0, 0x0) 19:06:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7b") r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x34, 0x0) poll(&(0x7f00000009c0)=[{r1}], 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) [ 215.716294][ T3881] kobject: 'loop3' (00000000154a724a): kobject_uevent_env [ 215.716504][ T9755] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 215.731880][ T3881] kobject: 'loop3' (00000000154a724a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 215.755537][ T9755] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 215.789777][ T3881] kobject: 'loop2' (0000000043904b58): kobject_uevent_env [ 215.798212][ T9759] kobject: 'vat' (00000000c772ea77): kobject_add_internal: parent: 'net', set: 'devices' [ 215.802686][ T3881] kobject: 'loop2' (0000000043904b58): fill_kobj_path: path = '/devices/virtual/block/loop2' 19:06:14 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000002000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000280)={0x7a, 0x0, [0x40000000, 0x10000000800002c1, 0x40000001, 0x3], [0xc1]}) 19:06:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f000052fff8)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='/', r0, &(0x7f0000d06ff8)='./file0\x00') [ 215.872577][ T3881] kobject: 'loop5' (00000000dfeb74ab): kobject_uevent_env [ 215.883117][ T3881] kobject: 'loop5' (00000000dfeb74ab): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 215.894890][ T9759] kobject: 'vat' (00000000c772ea77): kobject_uevent_env [ 215.907482][ T3881] kobject: 'loop0' (0000000048b74eff): kobject_uevent_env [ 215.908065][ T9754] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 215.922002][ T3881] kobject: 'loop0' (0000000048b74eff): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 215.925948][ T9759] kobject: 'vat' (00000000c772ea77): fill_kobj_path: path = '/devices/virtual/net/vat' [ 215.948598][ T3881] kobject: 'loop5' (00000000dfeb74ab): kobject_uevent_env [ 215.962385][ T3881] kobject: 'loop5' (00000000dfeb74ab): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 215.965592][ T9754] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 215.985924][ T9759] kobject: 'queues' (0000000074fdf5dc): kobject_add_internal: parent: 'vat', set: '' [ 216.003769][ T9759] kobject: 'queues' (0000000074fdf5dc): kobject_uevent_env [ 216.031473][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 216.037266][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 216.043116][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 216.045526][ T9759] kobject: 'queues' (0000000074fdf5dc): kobject_uevent_env: filter function caused the event to drop! [ 216.049140][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 216.076445][ T9759] kobject: 'rx-0' (00000000fddcb847): kobject_add_internal: parent: 'queues', set: 'queues' [ 216.087329][ T9759] kobject: 'rx-0' (00000000fddcb847): kobject_uevent_env [ 216.099420][ T3881] kobject: 'loop4' (00000000f9aa6a12): kobject_uevent_env [ 216.110040][ T3881] kobject: 'loop4' (00000000f9aa6a12): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 216.112810][ T9759] kobject: 'rx-0' (00000000fddcb847): fill_kobj_path: path = '/devices/virtual/net/vat/queues/rx-0' [ 216.139861][ T9759] kobject: 'tx-0' (000000005cc2c2a4): kobject_add_internal: parent: 'queues', set: 'queues' [ 216.160745][ T9759] kobject: 'tx-0' (000000005cc2c2a4): kobject_uevent_env [ 216.168227][ T9759] kobject: 'tx-0' (000000005cc2c2a4): fill_kobj_path: path = '/devices/virtual/net/vat/queues/tx-0' [ 216.179756][ T9759] kobject: 'batman_adv' (000000000de31045): kobject_add_internal: parent: 'vat', set: '' [ 216.219134][ T3881] kobject: 'loop0' (0000000048b74eff): kobject_uevent_env [ 216.228438][ T3881] kobject: 'loop0' (0000000048b74eff): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 216.239007][ T9770] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 216.266767][ T9770] chnl_net:chnl_net_open(): err: Unable to register and open device, Err:-19 [ 216.279715][ T9770] caif:caif_disconnect_client(): nothing to disconnect [ 216.284567][ T3881] kobject: 'loop2' (0000000043904b58): kobject_uevent_env [ 216.294306][ T3881] kobject: 'loop2' (0000000043904b58): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 216.301882][ T9770] chnl_net:chnl_flowctrl_cb(): NET flowctrl func called flow: CLOSE/DEINIT [ 216.315999][ T9770] chnl_net:chnl_net_open(): state disconnected [ 216.633329][ T9766] kobject: 'batman_adv' (000000000de31045): kobject_uevent_env [ 216.640902][ T9766] kobject: 'batman_adv' (000000000de31045): kobject_uevent_env: filter function caused the event to drop! [ 216.654064][ T9766] kobject: 'batman_adv' (000000000de31045): kobject_cleanup, parent 0000000030e83bc8 [ 216.663572][ T9766] kobject: 'batman_adv' (000000000de31045): calling ktype release [ 216.671407][ T9766] kobject: (000000000de31045): dynamic_kobj_release [ 216.677993][ T9766] kobject: 'batman_adv': free name [ 216.683569][ T9766] kobject: 'rx-0' (00000000fddcb847): kobject_cleanup, parent 0000000074fdf5dc [ 216.692576][ T9766] kobject: 'rx-0' (00000000fddcb847): auto cleanup 'remove' event [ 216.700411][ T9766] kobject: 'rx-0' (00000000fddcb847): kobject_uevent_env [ 216.708000][ T9766] kobject: 'rx-0' (00000000fddcb847): fill_kobj_path: path = '/devices/virtual/net/vat/queues/rx-0' [ 216.718862][ T9766] kobject: 'rx-0' (00000000fddcb847): auto cleanup kobject_del [ 216.726448][ T9766] kobject: 'rx-0' (00000000fddcb847): calling ktype release [ 216.733746][ T9766] kobject: 'rx-0': free name [ 216.738412][ T9766] kobject: 'tx-0' (000000005cc2c2a4): kobject_cleanup, parent 0000000074fdf5dc [ 216.747387][ T9766] kobject: 'tx-0' (000000005cc2c2a4): auto cleanup 'remove' event [ 216.755225][ T9766] kobject: 'tx-0' (000000005cc2c2a4): kobject_uevent_env [ 216.762417][ T9766] kobject: 'tx-0' (000000005cc2c2a4): fill_kobj_path: path = '/devices/virtual/net/vat/queues/tx-0' [ 216.773389][ T9766] kobject: 'tx-0' (000000005cc2c2a4): auto cleanup kobject_del [ 216.781227][ T9766] kobject: 'tx-0' (000000005cc2c2a4): calling ktype release [ 216.788684][ T9766] kobject: 'tx-0': free name [ 216.793350][ T9766] kobject: 'queues' (0000000074fdf5dc): kobject_cleanup, parent 0000000030e83bc8 [ 216.802498][ T9766] kobject: 'queues' (0000000074fdf5dc): calling ktype release [ 216.809966][ T9766] kobject: 'queues' (0000000074fdf5dc): kset_release [ 216.817123][ T9766] kobject: 'queues': free name [ 216.822351][ T9766] kobject: 'vat' (00000000c772ea77): kobject_uevent_env [ 216.829350][ T9766] kobject: 'vat' (00000000c772ea77): fill_kobj_path: path = '/devices/virtual/net/vat' 19:06:15 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000300)={&(0x7f0000000380)=@gettaction={0x230, 0x32, 0x10, 0x70bd25, 0x25dfdbfe, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_gd=@TCA_ACT_TAB={0x38, 0x1, [{0x14, 0x3, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}, {0x10, 0x1f, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x10, 0x1, @TCA_ACT_INDEX={0x8, 0x3, 0x8000}}]}, @action_gd=@TCA_ACT_TAB={0xb0, 0x1, [{0x14, 0xc, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x10, 0x2, @TCA_ACT_INDEX={0x8, 0x3, 0xc88e}}, {0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x800}}, {0x10, 0x1d, @TCA_ACT_INDEX={0x8, 0x3, 0x60d3}}, {0x10, 0x1d, @TCA_ACT_INDEX={0x8, 0x3, 0x80}}, {0x10, 0x9, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x10, 0x1c, @TCA_ACT_INDEX={0x8, 0x3, 0xda}}, {0x10, 0x1c, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x14, 0x4, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x14, 0x1c, @TCA_ACT_KIND={0xc, 0x1, 'mirred\x00'}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x0, 0x1}}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x6ac}, @action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0xf, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_gd=@TCA_ACT_TAB={0x38, 0x1, [{0x14, 0xc, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}, {0x10, 0x14, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x10, 0xf, @TCA_ACT_INDEX={0x8, 0x3, 0x785a}}]}, @action_gd=@TCA_ACT_TAB={0x5c, 0x1, [{0x10, 0x1b, @TCA_ACT_INDEX={0x8, 0x3, 0x75a29907}}, {0x10, 0x1e, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x10, 0x14, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x18, 0xb, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x60, 0x1, [{0x14, 0xd, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x14, 0xe, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}, {0x10, 0x5, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x14, 0x1a, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x10, 0x20, @TCA_ACT_INDEX={0x8, 0x3, 0xffffffff}}]}]}, 0x230}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040080) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000200)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x7ff, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = dup2(r1, r2) accept$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000240)=0x1c) mount(0x0, 0x0, 0x0, 0xc0000, 0x0) sendto$unix(r4, &(0x7f0000000280)="c44589d78bedd2e43e0eaad36054f6f24bbb13e7ca0f46dd7965f502f0365564610631b14654d45ad0c67aa3fd08780c86f819df6770299cdd3335", 0x3b, 0x0, 0x0, 0x0) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000040)={0x0, 0xfffffffffffffd40, 0x0}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)={0x0, 0x2, 0x2, 0x7f}) prctl$PR_SET_SECUREBITS(0x1c, 0x4) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000600)=r4, 0x4) 19:06:15 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000002000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000280)={0x7a, 0x0, [0x40000000, 0x10000000800002c1, 0x40000001, 0x3], [0xc1]}) 19:06:15 executing program 1: mkdir(0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f000052fff8)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='/', r0, &(0x7f0000d06ff8)='./file0\x00') 19:06:15 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB='n'], 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000540)=""/226, 0xe2}], 0x1}}], 0x1, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x27c) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:06:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7b") seccomp(0x3, 0x0, 0x0) [ 216.881664][ T9766] kobject: 'vat' (00000000c772ea77): kobject_cleanup, parent 0000000030e83bc8 [ 216.890605][ T9766] kobject: 'vat' (00000000c772ea77): calling ktype release [ 216.897917][ T9766] kobject: 'vat': free name 19:06:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7b") r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x34, 0x0) poll(&(0x7f00000009c0)=[{r1}], 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) [ 216.925864][ T3881] kobject: 'loop3' (00000000154a724a): kobject_uevent_env [ 216.939305][ T9788] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 216.945636][ T3881] kobject: 'loop3' (00000000154a724a): fill_kobj_path: path = '/devices/virtual/block/loop3' 19:06:15 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000002000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000280)={0x7a, 0x0, [0x40000000, 0x10000000800002c1, 0x40000001, 0x3], [0xc1]}) 19:06:15 executing program 1: mkdir(0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f000052fff8)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='/', r0, &(0x7f0000d06ff8)='./file0\x00') 19:06:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be0") seccomp(0x3, 0x0, 0x0) [ 216.972470][ T9788] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 216.978464][ T9795] kobject: 'vat' (0000000010448499): kobject_add_internal: parent: 'net', set: 'devices' [ 217.015245][ T3881] kobject: 'loop5' (00000000dfeb74ab): kobject_uevent_env 19:06:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be0") r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x34, 0x0) poll(&(0x7f00000009c0)=[{r1}], 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) [ 217.053087][ T3881] kobject: 'loop5' (00000000dfeb74ab): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 217.059532][ T9787] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 217.068927][ T9795] kobject: 'vat' (0000000010448499): kobject_uevent_env 19:06:15 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000002000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x7a, 0x0, [0x40000000, 0x10000000800002c1, 0x40000001, 0x3], [0xc1]}) [ 217.104281][ T9787] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 217.106695][ T3881] kobject: 'loop0' (0000000048b74eff): kobject_uevent_env [ 217.140912][ T9795] kobject: 'vat' (0000000010448499): fill_kobj_path: path = '/devices/virtual/net/vat' 19:06:15 executing program 1: mkdir(0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f000052fff8)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='/', r0, &(0x7f0000d06ff8)='./file0\x00') [ 217.166180][ T3881] kobject: 'loop0' (0000000048b74eff): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 217.194864][ T9795] kobject: 'queues' (00000000a4b87750): kobject_add_internal: parent: 'vat', set: '' [ 217.213157][ T9795] kobject: 'queues' (00000000a4b87750): kobject_uevent_env [ 217.220971][ T3881] kobject: 'loop2' (0000000043904b58): kobject_uevent_env [ 217.221334][ T9795] kobject: 'queues' (00000000a4b87750): kobject_uevent_env: filter function caused the event to drop! [ 217.234287][ T3881] kobject: 'loop2' (0000000043904b58): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 217.243635][ T9795] kobject: 'rx-0' (00000000759b1f67): kobject_add_internal: parent: 'queues', set: 'queues' [ 217.266402][ T3881] kobject: 'loop4' (00000000f9aa6a12): kobject_uevent_env [ 217.275732][ T9795] kobject: 'rx-0' (00000000759b1f67): kobject_uevent_env [ 217.283246][ T9795] kobject: 'rx-0' (00000000759b1f67): fill_kobj_path: path = '/devices/virtual/net/vat/queues/rx-0' [ 217.284239][ T3881] kobject: 'loop4' (00000000f9aa6a12): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 217.294672][ T9795] kobject: 'tx-0' (00000000aecc9e8a): kobject_add_internal: parent: 'queues', set: 'queues' [ 217.308756][ T3881] kobject: 'loop5' (00000000dfeb74ab): kobject_uevent_env [ 217.316124][ T9795] kobject: 'tx-0' (00000000aecc9e8a): kobject_uevent_env [ 217.325214][ T3881] kobject: 'loop5' (00000000dfeb74ab): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 217.330100][ T9795] kobject: 'tx-0' (00000000aecc9e8a): fill_kobj_path: path = '/devices/virtual/net/vat/queues/tx-0' [ 217.361964][ T9795] kobject: 'batman_adv' (0000000095356690): kobject_add_internal: parent: 'vat', set: '' [ 217.424369][ T3881] kobject: 'loop0' (0000000048b74eff): kobject_uevent_env [ 217.439924][ T3881] kobject: 'loop0' (0000000048b74eff): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 217.459260][ T3881] kobject: 'loop2' (0000000043904b58): kobject_uevent_env [ 217.468578][ T3881] kobject: 'loop2' (0000000043904b58): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 217.469659][ T9809] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 217.525727][ T9809] chnl_net:chnl_net_open(): err: Unable to register and open device, Err:-19 [ 217.534996][ T9809] caif:caif_disconnect_client(): nothing to disconnect [ 217.591959][ T9809] chnl_net:chnl_flowctrl_cb(): NET flowctrl func called flow: CLOSE/DEINIT [ 217.600704][ T9809] chnl_net:chnl_net_open(): state disconnected [ 217.814094][ T9803] kobject: 'batman_adv' (0000000095356690): kobject_uevent_env [ 217.821839][ T9803] kobject: 'batman_adv' (0000000095356690): kobject_uevent_env: filter function caused the event to drop! [ 217.833348][ T9803] kobject: 'batman_adv' (0000000095356690): kobject_cleanup, parent 0000000030e83bc8 [ 217.843018][ T9803] kobject: 'batman_adv' (0000000095356690): calling ktype release [ 217.850831][ T9803] kobject: (0000000095356690): dynamic_kobj_release [ 217.857519][ T9803] kobject: 'batman_adv': free name [ 217.863026][ T9803] kobject: 'rx-0' (00000000759b1f67): kobject_cleanup, parent 00000000a4b87750 [ 217.872229][ T9803] kobject: 'rx-0' (00000000759b1f67): auto cleanup 'remove' event [ 217.880044][ T9803] kobject: 'rx-0' (00000000759b1f67): kobject_uevent_env [ 217.887457][ T9803] kobject: 'rx-0' (00000000759b1f67): fill_kobj_path: path = '/devices/virtual/net/vat/queues/rx-0' [ 217.898341][ T9803] kobject: 'rx-0' (00000000759b1f67): auto cleanup kobject_del [ 217.906030][ T9803] kobject: 'rx-0' (00000000759b1f67): calling ktype release [ 217.913582][ T9803] kobject: 'rx-0': free name [ 217.918356][ T9803] kobject: 'tx-0' (00000000aecc9e8a): kobject_cleanup, parent 00000000a4b87750 [ 217.927522][ T9803] kobject: 'tx-0' (00000000aecc9e8a): auto cleanup 'remove' event [ 217.935497][ T9803] kobject: 'tx-0' (00000000aecc9e8a): kobject_uevent_env [ 217.942763][ T9803] kobject: 'tx-0' (00000000aecc9e8a): fill_kobj_path: path = '/devices/virtual/net/vat/queues/tx-0' [ 217.953774][ T9803] kobject: 'tx-0' (00000000aecc9e8a): auto cleanup kobject_del [ 217.961503][ T9803] kobject: 'tx-0' (00000000aecc9e8a): calling ktype release [ 217.968802][ T9803] kobject: 'tx-0': free name [ 217.973556][ T9803] kobject: 'queues' (00000000a4b87750): kobject_cleanup, parent 0000000030e83bc8 [ 217.982720][ T9803] kobject: 'queues' (00000000a4b87750): calling ktype release [ 217.990186][ T9803] kobject: 'queues' (00000000a4b87750): kset_release [ 217.997069][ T9803] kobject: 'queues': free name [ 218.002195][ T9803] kobject: 'vat' (0000000010448499): kobject_uevent_env [ 218.009153][ T9803] kobject: 'vat' (0000000010448499): fill_kobj_path: path = '/devices/virtual/net/vat' 19:06:16 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000300)={&(0x7f0000000380)=@gettaction={0x230, 0x32, 0x10, 0x70bd25, 0x25dfdbfe, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_gd=@TCA_ACT_TAB={0x38, 0x1, [{0x14, 0x3, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}, {0x10, 0x1f, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x10, 0x1, @TCA_ACT_INDEX={0x8, 0x3, 0x8000}}]}, @action_gd=@TCA_ACT_TAB={0xb0, 0x1, [{0x14, 0xc, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x10, 0x2, @TCA_ACT_INDEX={0x8, 0x3, 0xc88e}}, {0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x800}}, {0x10, 0x1d, @TCA_ACT_INDEX={0x8, 0x3, 0x60d3}}, {0x10, 0x1d, @TCA_ACT_INDEX={0x8, 0x3, 0x80}}, {0x10, 0x9, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x10, 0x1c, @TCA_ACT_INDEX={0x8, 0x3, 0xda}}, {0x10, 0x1c, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x14, 0x4, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x14, 0x1c, @TCA_ACT_KIND={0xc, 0x1, 'mirred\x00'}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x0, 0x1}}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x6ac}, @action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0xf, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_gd=@TCA_ACT_TAB={0x38, 0x1, [{0x14, 0xc, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}, {0x10, 0x14, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x10, 0xf, @TCA_ACT_INDEX={0x8, 0x3, 0x785a}}]}, @action_gd=@TCA_ACT_TAB={0x5c, 0x1, [{0x10, 0x1b, @TCA_ACT_INDEX={0x8, 0x3, 0x75a29907}}, {0x10, 0x1e, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x10, 0x14, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x18, 0xb, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x60, 0x1, [{0x14, 0xd, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x14, 0xe, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}, {0x10, 0x5, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x14, 0x1a, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x10, 0x20, @TCA_ACT_INDEX={0x8, 0x3, 0xffffffff}}]}]}, 0x230}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040080) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000200)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x7ff, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = dup2(r1, r2) accept$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000240)=0x1c) mount(0x0, 0x0, 0x0, 0xc0000, 0x0) sendto$unix(r4, &(0x7f0000000280)="c44589d78bedd2e43e0eaad36054f6f24bbb13e7ca0f46dd7965f502f0365564610631b14654d45ad0c67aa3fd08780c86f819df6770299cdd3335", 0x3b, 0x0, 0x0, 0x0) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000040)={0x0, 0xfffffffffffffd40, 0x0}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)={0x0, 0x2, 0x2, 0x7f}) prctl$PR_SET_SECUREBITS(0x1c, 0x4) 19:06:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB='n'], 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000540)=""/226, 0xe2}], 0x1}}], 0x1, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119001}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x27c) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:06:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000002000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x7a, 0x0, [0x40000000, 0x10000000800002c1, 0x40000001, 0x3], [0xc1]}) 19:06:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) symlinkat(&(0x7f00000000c0)='/', r0, &(0x7f0000d06ff8)='./file0\x00') 19:06:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be0") seccomp(0x3, 0x0, 0x0) 19:06:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be0") r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x34, 0x0) poll(&(0x7f00000009c0)=[{r1}], 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) [ 218.051557][ T9803] kobject: 'vat' (0000000010448499): kobject_cleanup, parent 0000000030e83bc8 [ 218.060424][ T9803] kobject: 'vat' (0000000010448499): calling ktype release [ 218.069078][ T9803] kobject: 'vat': free name 19:06:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be0") seccomp(0x3, 0x0, 0x0) 19:06:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000002000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x7a, 0x0, [0x40000000, 0x10000000800002c1, 0x40000001, 0x3], [0xc1]}) [ 218.096004][ T3881] kobject: 'loop3' (00000000154a724a): kobject_uevent_env [ 218.117568][ T9831] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 218.124278][ T3881] kobject: 'loop3' (00000000154a724a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 218.128193][ T9831] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' 19:06:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) symlinkat(&(0x7f00000000c0)='/', r0, &(0x7f0000d06ff8)='./file0\x00') [ 218.160339][ T9834] kobject: 'vat' (00000000285d4c6d): kobject_add_internal: parent: 'net', set: 'devices' [ 218.177715][ T3881] kobject: 'loop0' (0000000048b74eff): kobject_uevent_env 19:06:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be0") r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x34, 0x0) poll(&(0x7f00000009c0)=[{r1}], 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) [ 218.203065][ T3881] kobject: 'loop0' (0000000048b74eff): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 218.215686][ T9834] kobject: 'vat' (00000000285d4c6d): kobject_uevent_env 19:06:16 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000002000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000280)={0x7a, 0x0, [0x40000000, 0x10000000800002c1, 0x40000001, 0x3], [0xc1]}) [ 218.245828][ T9834] kobject: 'vat' (00000000285d4c6d): fill_kobj_path: path = '/devices/virtual/net/vat' [ 218.257301][ T3881] kobject: 'loop5' (00000000dfeb74ab): kobject_uevent_env [ 218.267564][ T3881] kobject: 'loop5' (00000000dfeb74ab): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 218.277674][ T9826] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env 19:06:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) symlinkat(&(0x7f00000000c0)='/', r0, &(0x7f0000d06ff8)='./file0\x00') [ 218.285155][ T3881] kobject: 'loop2' (0000000043904b58): kobject_uevent_env [ 218.294805][ T9834] kobject: 'queues' (00000000685fda9b): kobject_add_internal: parent: 'vat', set: '' [ 218.308871][ T3881] kobject: 'loop2' (0000000043904b58): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 218.313986][ T9826] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 218.347843][ T3881] kobject: 'loop5' (00000000dfeb74ab): kobject_uevent_env [ 218.354295][ T9834] kobject: 'queues' (00000000685fda9b): kobject_uevent_env [ 218.364236][ T3881] kobject: 'loop5' (00000000dfeb74ab): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 218.390292][ T9834] kobject: 'queues' (00000000685fda9b): kobject_uevent_env: filter function caused the event to drop! [ 218.432282][ T3881] kobject: 'loop4' (00000000f9aa6a12): kobject_uevent_env [ 218.437131][ T9834] kobject: 'rx-0' (00000000f87f1594): kobject_add_internal: parent: 'queues', set: 'queues' [ 218.439548][ T3881] kobject: 'loop4' (00000000f9aa6a12): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 218.477311][ T9834] kobject: 'rx-0' (00000000f87f1594): kobject_uevent_env [ 218.487781][ T9834] kobject: 'rx-0' (00000000f87f1594): fill_kobj_path: path = '/devices/virtual/net/vat/queues/rx-0' [ 218.499965][ T9834] kobject: 'tx-0' (00000000a0020c13): kobject_add_internal: parent: 'queues', set: 'queues' [ 218.514055][ T9834] kobject: 'tx-0' (00000000a0020c13): kobject_uevent_env [ 218.525287][ T9834] kobject: 'tx-0' (00000000a0020c13): fill_kobj_path: path = '/devices/virtual/net/vat/queues/tx-0' [ 218.536955][ T9834] kobject: 'batman_adv' (0000000052c950e9): kobject_add_internal: parent: 'vat', set: '' [ 218.551261][ T9847] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 218.560486][ T9847] chnl_net:chnl_net_open(): err: Unable to register and open device, Err:-19 [ 218.569718][ T9847] caif:caif_disconnect_client(): nothing to disconnect [ 218.578570][ T3881] kobject: 'loop0' (0000000048b74eff): kobject_uevent_env [ 218.586302][ T3881] kobject: 'loop0' (0000000048b74eff): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 218.605967][ T3881] kobject: 'loop2' (0000000043904b58): kobject_uevent_env [ 218.613268][ T3881] kobject: 'loop2' (0000000043904b58): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 218.621629][ T9847] chnl_net:chnl_flowctrl_cb(): NET flowctrl func called flow: CLOSE/DEINIT [ 218.632613][ T9847] chnl_net:chnl_net_open(): state disconnected [ 219.013407][ T9839] kobject: 'batman_adv' (0000000052c950e9): kobject_uevent_env [ 219.020981][ T9839] kobject: 'batman_adv' (0000000052c950e9): kobject_uevent_env: filter function caused the event to drop! [ 219.032582][ T9839] kobject: 'batman_adv' (0000000052c950e9): kobject_cleanup, parent 0000000030e83bc8 [ 219.042137][ T9839] kobject: 'batman_adv' (0000000052c950e9): calling ktype release [ 219.049966][ T9839] kobject: (0000000052c950e9): dynamic_kobj_release [ 219.056640][ T9839] kobject: 'batman_adv': free name [ 219.061980][ T9839] kobject: 'rx-0' (00000000f87f1594): kobject_cleanup, parent 00000000685fda9b [ 219.070911][ T9839] kobject: 'rx-0' (00000000f87f1594): auto cleanup 'remove' event [ 219.078838][ T9839] kobject: 'rx-0' (00000000f87f1594): kobject_uevent_env [ 219.086058][ T9839] kobject: 'rx-0' (00000000f87f1594): fill_kobj_path: path = '/devices/virtual/net/vat/queues/rx-0' [ 219.097097][ T9839] kobject: 'rx-0' (00000000f87f1594): auto cleanup kobject_del [ 219.104758][ T9839] kobject: 'rx-0' (00000000f87f1594): calling ktype release [ 219.112212][ T9839] kobject: 'rx-0': free name [ 219.116847][ T9839] kobject: 'tx-0' (00000000a0020c13): kobject_cleanup, parent 00000000685fda9b [ 219.125819][ T9839] kobject: 'tx-0' (00000000a0020c13): auto cleanup 'remove' event [ 219.133671][ T9839] kobject: 'tx-0' (00000000a0020c13): kobject_uevent_env [ 219.140866][ T9839] kobject: 'tx-0' (00000000a0020c13): fill_kobj_path: path = '/devices/virtual/net/vat/queues/tx-0' [ 219.152534][ T9839] kobject: 'tx-0' (00000000a0020c13): auto cleanup kobject_del [ 219.160123][ T9839] kobject: 'tx-0' (00000000a0020c13): calling ktype release [ 219.167461][ T9839] kobject: 'tx-0': free name [ 219.172113][ T9839] kobject: 'queues' (00000000685fda9b): kobject_cleanup, parent 0000000030e83bc8 [ 219.181230][ T9839] kobject: 'queues' (00000000685fda9b): calling ktype release [ 219.188715][ T9839] kobject: 'queues' (00000000685fda9b): kset_release [ 219.195451][ T9839] kobject: 'queues': free name [ 219.200413][ T9839] kobject: 'vat' (00000000285d4c6d): kobject_uevent_env [ 219.207413][ T9839] kobject: 'vat' (00000000285d4c6d): fill_kobj_path: path = '/devices/virtual/net/vat' 19:06:17 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000300)={&(0x7f0000000380)=@gettaction={0x230, 0x32, 0x10, 0x70bd25, 0x25dfdbfe, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_gd=@TCA_ACT_TAB={0x38, 0x1, [{0x14, 0x3, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}, {0x10, 0x1f, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x10, 0x1, @TCA_ACT_INDEX={0x8, 0x3, 0x8000}}]}, @action_gd=@TCA_ACT_TAB={0xb0, 0x1, [{0x14, 0xc, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x10, 0x2, @TCA_ACT_INDEX={0x8, 0x3, 0xc88e}}, {0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x800}}, {0x10, 0x1d, @TCA_ACT_INDEX={0x8, 0x3, 0x60d3}}, {0x10, 0x1d, @TCA_ACT_INDEX={0x8, 0x3, 0x80}}, {0x10, 0x9, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x10, 0x1c, @TCA_ACT_INDEX={0x8, 0x3, 0xda}}, {0x10, 0x1c, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x14, 0x4, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x14, 0x1c, @TCA_ACT_KIND={0xc, 0x1, 'mirred\x00'}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x0, 0x1}}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x6ac}, @action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0xf, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_gd=@TCA_ACT_TAB={0x38, 0x1, [{0x14, 0xc, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}, {0x10, 0x14, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x10, 0xf, @TCA_ACT_INDEX={0x8, 0x3, 0x785a}}]}, @action_gd=@TCA_ACT_TAB={0x5c, 0x1, [{0x10, 0x1b, @TCA_ACT_INDEX={0x8, 0x3, 0x75a29907}}, {0x10, 0x1e, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x10, 0x14, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x18, 0xb, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x60, 0x1, [{0x14, 0xd, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x14, 0xe, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}, {0x10, 0x5, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x14, 0x1a, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x10, 0x20, @TCA_ACT_INDEX={0x8, 0x3, 0xffffffff}}]}]}, 0x230}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040080) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000200)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x7ff, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = dup2(r1, r2) accept$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000240)=0x1c) mount(0x0, 0x0, 0x0, 0xc0000, 0x0) sendto$unix(r4, &(0x7f0000000280)="c44589d78bedd2e43e0eaad36054f6f24bbb13e7ca0f46dd7965f502f0365564610631b14654d45ad0c67aa3fd08780c86f819df6770299cdd3335", 0x3b, 0x0, 0x0, 0x0) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000040)={0x0, 0xfffffffffffffd40, 0x0}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)={0x0, 0x2, 0x2, 0x7f}) prctl$PR_SET_SECUREBITS(0x1c, 0x4) 19:06:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f000052fff8)='./file0\x00', 0x0, 0x0) symlinkat(0x0, r0, &(0x7f0000d06ff8)='./file0\x00') 19:06:17 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB='n'], 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000540)=""/226, 0xe2}], 0x1}}], 0x1, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119001}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x27c) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:06:17 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000002000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000280)={0x7a, 0x0, [0x40000000, 0x10000000800002c1, 0x40000001, 0x3], [0xc1]}) 19:06:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") seccomp(0x0, 0x0, 0x0) 19:06:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = syz_open_dev$vcsa(0x0, 0x34, 0x0) poll(&(0x7f00000009c0)=[{r1}], 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) [ 219.261671][ T9839] kobject: 'vat' (00000000285d4c6d): kobject_cleanup, parent 0000000030e83bc8 [ 219.270628][ T9839] kobject: 'vat' (00000000285d4c6d): calling ktype release [ 219.278155][ T9839] kobject: 'vat': free name [ 219.319485][ T3881] kobject: 'loop3' (00000000154a724a): kobject_uevent_env [ 219.336236][ T3881] kobject: 'loop3' (00000000154a724a): fill_kobj_path: path = '/devices/virtual/block/loop3' 19:06:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f000052fff8)='./file0\x00', 0x0, 0x0) symlinkat(0x0, r0, &(0x7f0000d06ff8)='./file0\x00') 19:06:17 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000002000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000280)={0x7a, 0x0, [0x40000000, 0x10000000800002c1, 0x40000001, 0x3], [0xc1]}) 19:06:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = syz_open_dev$vcsa(0x0, 0x34, 0x0) poll(&(0x7f00000009c0)=[{r1}], 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) [ 219.351610][ T26] audit: type=1326 audit(1559675177.553:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9867 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45c0ba code=0x0 [ 219.365931][ T9868] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 219.402762][ T9868] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' 19:06:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = syz_open_dev$vcsa(0x0, 0x34, 0x0) poll(&(0x7f00000009c0)=[{r1}], 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) [ 219.413726][ T3881] kobject: 'loop5' (00000000dfeb74ab): kobject_uevent_env [ 219.422430][ T9876] kobject: 'vat' (0000000023992262): kobject_add_internal: parent: 'net', set: 'devices' [ 219.443940][ T3881] kobject: 'loop5' (00000000dfeb74ab): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 219.457031][ T9876] kobject: 'vat' (0000000023992262): kobject_uevent_env 19:06:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f000052fff8)='./file0\x00', 0x0, 0x0) symlinkat(0x0, r0, &(0x7f0000d06ff8)='./file0\x00') 19:06:17 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000002000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x7a, 0x0, [0x40000000, 0x10000000800002c1, 0x40000001, 0x3], [0xc1]}) [ 219.462550][ T9862] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 219.478094][ T9876] kobject: 'vat' (0000000023992262): fill_kobj_path: path = '/devices/virtual/net/vat' [ 219.492620][ T9876] kobject: 'queues' (000000004a45f927): kobject_add_internal: parent: 'vat', set: '' [ 219.502962][ T3881] kobject: 'loop2' (0000000043904b58): kobject_uevent_env [ 219.506331][ T9876] kobject: 'queues' (000000004a45f927): kobject_uevent_env [ 219.510135][ T3881] kobject: 'loop2' (0000000043904b58): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 219.517473][ T9862] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 219.531256][ T9876] kobject: 'queues' (000000004a45f927): kobject_uevent_env: filter function caused the event to drop! [ 219.554600][ T9876] kobject: 'rx-0' (00000000e4afeb6f): kobject_add_internal: parent: 'queues', set: 'queues' [ 219.558611][ T3881] kobject: 'loop2' (0000000043904b58): kobject_uevent_env [ 219.569779][ T9876] kobject: 'rx-0' (00000000e4afeb6f): kobject_uevent_env [ 219.574523][ T9888] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 219.583212][ T9876] kobject: 'rx-0' (00000000e4afeb6f): fill_kobj_path: path = '/devices/virtual/net/vat/queues/rx-0' [ 219.601271][ T9876] kobject: 'tx-0' (00000000a02bd0af): kobject_add_internal: parent: 'queues', set: 'queues' [ 219.601821][ T3881] kobject: 'loop2' (0000000043904b58): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 219.614282][ T9876] kobject: 'tx-0' (00000000a02bd0af): kobject_uevent_env [ 219.624876][ T9888] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 219.630850][ T9876] kobject: 'tx-0' (00000000a02bd0af): fill_kobj_path: path = '/devices/virtual/net/vat/queues/tx-0' [ 219.639172][ C1] net_ratelimit: 13 callbacks suppressed [ 219.639190][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 219.654209][ T9876] kobject: 'batman_adv' (00000000f2c4a7f7): kobject_add_internal: parent: 'vat', set: '' [ 219.655756][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 219.675172][ T9886] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 219.690168][ T3881] kobject: 'loop5' (00000000dfeb74ab): kobject_uevent_env [ 219.696686][ T9886] chnl_net:chnl_net_open(): err: Unable to register and open device, Err:-19 [ 219.710910][ T9886] caif:caif_disconnect_client(): nothing to disconnect [ 219.721477][ T3881] kobject: 'loop5' (00000000dfeb74ab): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 219.723995][ T9887] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 219.741791][ T9887] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 219.751823][ T9886] chnl_net:chnl_flowctrl_cb(): NET flowctrl func called flow: CLOSE/DEINIT [ 219.756574][ T3881] kobject: 'loop2' (0000000043904b58): kobject_uevent_env [ 219.762845][ T9886] chnl_net:chnl_net_open(): state disconnected [ 219.771204][ T3881] kobject: 'loop2' (0000000043904b58): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 219.796080][ T9886] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 219.808578][ T3881] kobject: 'loop4' (00000000f9aa6a12): kobject_uevent_env [ 219.823680][ T3881] kobject: 'loop4' (00000000f9aa6a12): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 219.848836][ T3881] kobject: 'loop5' (00000000dfeb74ab): kobject_uevent_env [ 219.856157][ T3881] kobject: 'loop5' (00000000dfeb74ab): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 220.128749][ T3881] kobject: 'loop0' (0000000048b74eff): kobject_uevent_env [ 220.136063][ T3881] kobject: 'loop0' (0000000048b74eff): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 220.191496][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 220.197346][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 220.233138][ T9883] kobject: 'batman_adv' (00000000f2c4a7f7): kobject_uevent_env [ 220.240757][ T9883] kobject: 'batman_adv' (00000000f2c4a7f7): kobject_uevent_env: filter function caused the event to drop! [ 220.252240][ T9883] kobject: 'batman_adv' (00000000f2c4a7f7): kobject_cleanup, parent 0000000030e83bc8 [ 220.262915][ T9883] kobject: 'batman_adv' (00000000f2c4a7f7): calling ktype release [ 220.270808][ T9883] kobject: (00000000f2c4a7f7): dynamic_kobj_release [ 220.277866][ T9883] kobject: 'batman_adv': free name [ 220.283816][ T9883] kobject: 'rx-0' (00000000e4afeb6f): kobject_cleanup, parent 000000004a45f927 [ 220.292899][ T9883] kobject: 'rx-0' (00000000e4afeb6f): auto cleanup 'remove' event [ 220.300705][ T9883] kobject: 'rx-0' (00000000e4afeb6f): kobject_uevent_env [ 220.308512][ T9883] kobject: 'rx-0' (00000000e4afeb6f): fill_kobj_path: path = '/devices/virtual/net/vat/queues/rx-0' [ 220.319808][ T9883] kobject: 'rx-0' (00000000e4afeb6f): auto cleanup kobject_del [ 220.327452][ T9883] kobject: 'rx-0' (00000000e4afeb6f): calling ktype release [ 220.334799][ T9883] kobject: 'rx-0': free name [ 220.339486][ T9883] kobject: 'tx-0' (00000000a02bd0af): kobject_cleanup, parent 000000004a45f927 [ 220.348461][ T9883] kobject: 'tx-0' (00000000a02bd0af): auto cleanup 'remove' event [ 220.356328][ T9883] kobject: 'tx-0' (00000000a02bd0af): kobject_uevent_env [ 220.363438][ T9883] kobject: 'tx-0' (00000000a02bd0af): fill_kobj_path: path = '/devices/virtual/net/vat/queues/tx-0' [ 220.374327][ T9883] kobject: 'tx-0' (00000000a02bd0af): auto cleanup kobject_del [ 220.381991][ T9883] kobject: 'tx-0' (00000000a02bd0af): calling ktype release [ 220.389281][ T9883] kobject: 'tx-0': free name [ 220.393991][ T9883] kobject: 'queues' (000000004a45f927): kobject_cleanup, parent 0000000030e83bc8 [ 220.403163][ T9883] kobject: 'queues' (000000004a45f927): calling ktype release [ 220.410792][ T9883] kobject: 'queues' (000000004a45f927): kset_release [ 220.417625][ T9883] kobject: 'queues': free name [ 220.423146][ T9883] kobject: 'vat' (0000000023992262): kobject_uevent_env [ 220.430130][ T9883] kobject: 'vat' (0000000023992262): fill_kobj_path: path = '/devices/virtual/net/vat' 19:06:18 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000005c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000300)={&(0x7f0000000380)=@gettaction={0x230, 0x32, 0x10, 0x70bd25, 0x25dfdbfe, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_gd=@TCA_ACT_TAB={0x38, 0x1, [{0x14, 0x3, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}, {0x10, 0x1f, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x10, 0x1, @TCA_ACT_INDEX={0x8, 0x3, 0x8000}}]}, @action_gd=@TCA_ACT_TAB={0xb0, 0x1, [{0x14, 0xc, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x10, 0x2, @TCA_ACT_INDEX={0x8, 0x3, 0xc88e}}, {0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x800}}, {0x10, 0x1d, @TCA_ACT_INDEX={0x8, 0x3, 0x60d3}}, {0x10, 0x1d, @TCA_ACT_INDEX={0x8, 0x3, 0x80}}, {0x10, 0x9, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x10, 0x1c, @TCA_ACT_INDEX={0x8, 0x3, 0xda}}, {0x10, 0x1c, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x14, 0x4, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x14, 0x1c, @TCA_ACT_KIND={0xc, 0x1, 'mirred\x00'}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x0, 0x1}}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x6ac}, @action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0xf, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_gd=@TCA_ACT_TAB={0x38, 0x1, [{0x14, 0xc, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}, {0x10, 0x14, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x10, 0xf, @TCA_ACT_INDEX={0x8, 0x3, 0x785a}}]}, @action_gd=@TCA_ACT_TAB={0x5c, 0x1, [{0x10, 0x1b, @TCA_ACT_INDEX={0x8, 0x3, 0x75a29907}}, {0x10, 0x1e, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x10, 0x14, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x18, 0xb, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x60, 0x1, [{0x14, 0xd, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x14, 0xe, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}, {0x10, 0x5, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x14, 0x1a, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x10, 0x20, @TCA_ACT_INDEX={0x8, 0x3, 0xffffffff}}]}]}, 0x230}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040080) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000200)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x7ff, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = dup2(r1, r2) accept$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000240)=0x1c) mount(0x0, 0x0, 0x0, 0xc0000, 0x0) sendto$unix(r4, &(0x7f0000000280)="c44589d78bedd2e43e0eaad36054f6f24bbb13e7ca0f46dd7965f502f0365564610631b14654d45ad0c67aa3fd08780c86f819df6770299cdd3335", 0x3b, 0x0, 0x0, 0x0) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000040)={0x0, 0xfffffffffffffd40, 0x0}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)={0x0, 0x2, 0x2, 0x7f}) [ 220.481684][ T9883] kobject: 'vat' (0000000023992262): kobject_cleanup, parent 0000000030e83bc8 [ 220.490684][ T9883] kobject: 'vat' (0000000023992262): calling ktype release [ 220.498004][ T9883] kobject: 'vat': free name 19:06:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x0) poll(&(0x7f00000009c0)=[{r1}], 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) 19:06:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f000052fff8)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='/', 0xffffffffffffffff, &(0x7f0000d06ff8)='./file0\x00') 19:06:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB='n'], 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000540)=""/226, 0xe2}], 0x1}}], 0x1, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119001}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x27c) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:06:18 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000002000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x7a, 0x0, [0x40000000, 0x10000000800002c1, 0x40000001, 0x3], [0xc1]}) 19:06:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") seccomp(0x0, 0x0, 0x0) [ 220.524530][ T3881] kobject: 'loop3' (00000000154a724a): kobject_uevent_env [ 220.543599][ T9901] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 220.545585][ T26] audit: type=1326 audit(1559675178.753:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9904 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45c0ba code=0x0 19:06:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x0) poll(&(0x7f00000009c0)=[{r1}], 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) [ 220.550610][ T9901] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 220.558539][ T9907] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 220.600174][ T3881] kobject: 'loop3' (00000000154a724a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 220.625089][ T9907] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 220.630748][ T9911] kobject: 'vat' (0000000083c0469a): kobject_add_internal: parent: 'net', set: 'devices' [ 220.656592][ T9900] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 220.667308][ T9903] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env 19:06:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f000052fff8)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='/', 0xffffffffffffffff, &(0x7f0000d06ff8)='./file0\x00') [ 220.674963][ T9900] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 220.676084][ T3881] kobject: 'loop2' (0000000043904b58): kobject_uevent_env [ 220.694598][ T9911] kobject: 'vat' (0000000083c0469a): kobject_uevent_env [ 220.708788][ T9903] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' 19:06:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB='n'], 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000540)=""/226, 0xe2}], 0x1}}], 0x1, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119001}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x27c) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 220.712415][ T9911] kobject: 'vat' (0000000083c0469a): fill_kobj_path: path = '/devices/virtual/net/vat' [ 220.719375][ T3881] kobject: 'loop2' (0000000043904b58): fill_kobj_path: path = '/devices/virtual/block/loop2' 19:06:19 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000002000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x7a, 0x0, [0x40000000, 0x10000000800002c1, 0x40000001, 0x3], [0xc1]}) [ 220.776982][ T9911] kobject: 'queues' (00000000483a20c4): kobject_add_internal: parent: 'vat', set: '' [ 220.789317][ T3881] kobject: 'loop4' (00000000f9aa6a12): kobject_uevent_env 19:06:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f000052fff8)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='/', 0xffffffffffffffff, &(0x7f0000d06ff8)='./file0\x00') [ 220.818769][ T9911] kobject: 'queues' (00000000483a20c4): kobject_uevent_env [ 220.824089][ T3881] kobject: 'loop4' (00000000f9aa6a12): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 220.826545][ T9923] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 220.843872][ T9911] kobject: 'queues' (00000000483a20c4): kobject_uevent_env: filter function caused the event to drop! [ 220.865585][ T9923] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 220.880579][ T9911] kobject: 'rx-0' (000000007408ea26): kobject_add_internal: parent: 'queues', set: 'queues' [ 220.881200][ T9926] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 220.907924][ T9922] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 220.910102][ T3881] kobject: 'loop5' (00000000dfeb74ab): kobject_uevent_env [ 220.916363][ T9911] kobject: 'rx-0' (000000007408ea26): kobject_uevent_env [ 220.931621][ T9926] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 220.933813][ T3881] kobject: 'loop5' (00000000dfeb74ab): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 220.948901][ T9922] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' 19:06:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f000052fff8)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='/', r0, 0x0) [ 220.963192][ T9911] kobject: 'rx-0' (000000007408ea26): fill_kobj_path: path = '/devices/virtual/net/vat/queues/rx-0' [ 220.981659][ T9925] kobject: 'kvm' (000000007eb7c1f3): kobject_uevent_env [ 220.995924][ T9911] kobject: 'tx-0' (00000000c35ca0a7): kobject_add_internal: parent: 'queues', set: 'queues' [ 221.021567][ T9925] kobject: 'kvm' (000000007eb7c1f3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 221.022997][ T9911] kobject: 'tx-0' (00000000c35ca0a7): kobject_uevent_env [ 221.042348][ T9911] kobject: 'tx-0' (00000000c35ca0a7): fill_kobj_path: path = '/devices/virtual/net/vat/queues/tx-0' [ 221.077059][ T9911] kobject: 'batman_adv' (000000005ff1d154): kobject_add_internal: parent: 'vat', set: '' [ 221.086167][ T3881] kobject: 'loop4' (00000000f9aa6a12): kobject_uevent_env [ 221.102811][ T3881] kobject: 'loop4' (00000000f9aa6a12): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 221.110206][ T9920] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 221.124832][ T3881] kobject: 'loop5' (00000000dfeb74ab): kobject_uevent_env [ 221.133536][ T3881] kobject: 'loop5' (00000000dfeb74ab): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 221.140535][ T9920] chnl_net:chnl_net_open(): err: Unable to register and open device, Err:-19 [ 221.155365][ T3881] kobject: 'loop2' (0000000043904b58): kobject_uevent_env [ 221.162592][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 221.162636][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 221.171967][ T9920] caif:caif_disconnect_client(): nothing to disconnect [ 221.184623][ T3881] kobject: 'loop2' (0000000043904b58): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 221.211606][ T9920] chnl_net:chnl_flowctrl_cb(): NET flowctrl func called flow: CLOSE/DEINIT [ 221.220520][ T9920] chnl_net:chnl_net_open(): state disconnected [ 221.226912][ T9920] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 221.242581][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 221.242630][ C1] protocol 88fb is buggy, dev hsr_slave_1