[ 62.348316][ T26] audit: type=1800 audit(1565918041.273:24): pid=9039 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="sudo" dev="sda1" ino=2454 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 63.131283][ T26] audit: type=1800 audit(1565918042.153:25): pid=9039 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 63.178269][ T26] audit: type=1800 audit(1565918042.153:26): pid=9039 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.185' (ECDSA) to the list of known hosts. 2019/08/16 01:14:13 fuzzer started 2019/08/16 01:14:16 dialing manager at 10.128.0.26:36439 2019/08/16 01:14:21 syscalls: 2487 2019/08/16 01:14:21 code coverage: enabled 2019/08/16 01:14:21 comparison tracing: enabled 2019/08/16 01:14:21 extra coverage: extra coverage is not supported by the kernel 2019/08/16 01:14:21 setuid sandbox: enabled 2019/08/16 01:14:21 namespace sandbox: enabled 2019/08/16 01:14:21 Android sandbox: /sys/fs/selinux/policy does not exist 2019/08/16 01:14:21 fault injection: enabled 2019/08/16 01:14:21 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/08/16 01:14:21 net packet injection: enabled 2019/08/16 01:14:21 net device setup: enabled 01:15:34 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000f00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 01:15:35 executing program 1: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) request_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='$systemlo\x00', 0xfffffffffffffff8) request_key(0x0, 0x0, &(0x7f00000002c0)='{\\\'\x00', 0xfffffffffffffffb) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fcntl$setown(r0, 0x8, 0x0) mmap$perf(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = accept(0xffffffffffffff9c, 0x0, 0x0) setsockopt$packet_buf(r2, 0x107, 0x0, &(0x7f0000000400)="6c7d62787332c215caf5521a67893cd437ccce3f7889f660e6bd2f5b063081a585ac60f6be515e1120f370258abeff36c67c5ffbe44cebb5906106e744174d77a9215c09d106674b0a3c5f593114c999758831ba7ea16ceffc21f96b39774c41ca37983e6e21b9dd6a76ba36af03fb694bdb5c0431bd6f7f7d9b3467d76ad10efbd5b5d9166fe89a807d17bda935fdb8f373f296b8593da900789d710c4f09a527bb812186", 0xa5) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) renameat(0xffffffffffffffff, &(0x7f00000001c0)='./bus\x00', 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000380)={0x2, 0x12000000000, 0x0, 0x2, 0x4}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) getuid() dup2(r1, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x3000000}, 0x14) syzkaller login: [ 156.067152][ T9206] IPVS: ftp: loaded support on port[0] = 21 [ 156.134858][ T9208] IPVS: ftp: loaded support on port[0] = 21 [ 156.278856][ T9206] chnl_net:caif_netlink_parms(): no params data found 01:15:35 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000027000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000040)="b90703e6680d698cb89e40f06558", 0x0, 0x100}, 0x28) [ 156.397447][ T9206] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.406083][ T9206] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.429567][ T9206] device bridge_slave_0 entered promiscuous mode [ 156.471341][ T9206] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.480139][ T9206] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.499979][ T9206] device bridge_slave_1 entered promiscuous mode [ 156.529784][ T9208] chnl_net:caif_netlink_parms(): no params data found [ 156.554310][ T9212] IPVS: ftp: loaded support on port[0] = 21 [ 156.562555][ T9206] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 156.603603][ T9206] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 156.646016][ T9208] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.655224][ T9208] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.664942][ T9208] device bridge_slave_0 entered promiscuous mode [ 156.682965][ T9206] team0: Port device team_slave_0 added [ 156.690477][ T9208] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.697540][ T9208] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.707767][ T9208] device bridge_slave_1 entered promiscuous mode [ 156.731823][ T9206] team0: Port device team_slave_1 added 01:15:35 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x6b, &(0x7f0000000240), 0x1c) [ 156.764990][ T9208] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 156.831696][ T9206] device hsr_slave_0 entered promiscuous mode [ 156.898771][ T9206] device hsr_slave_1 entered promiscuous mode [ 156.940299][ T9208] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 156.965051][ T9214] IPVS: ftp: loaded support on port[0] = 21 [ 156.993359][ T9208] team0: Port device team_slave_0 added 01:15:36 executing program 4: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="7400000024000b0500000000000000edffffff00", @ANYRES32=r2, @ANYBLOB="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"], 0x74}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x3, 0x300000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 157.036300][ T9208] team0: Port device team_slave_1 added [ 157.049082][ T9206] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.056258][ T9206] bridge0: port 2(bridge_slave_1) entered forwarding state [ 157.065331][ T9206] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.072453][ T9206] bridge0: port 1(bridge_slave_0) entered forwarding state [ 157.201422][ T9208] device hsr_slave_0 entered promiscuous mode [ 157.238541][ T9208] device hsr_slave_1 entered promiscuous mode [ 157.278576][ T9208] debugfs: Directory 'hsr0' with parent '/' already present! [ 157.311167][ T2823] bridge0: port 1(bridge_slave_0) entered disabled state 01:15:36 executing program 5: r0 = socket$inet(0x2, 0x200000002, 0x0) sendmmsg$inet(r0, &(0x7f0000004940)=[{{&(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) [ 157.331723][ T2823] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.391193][ T9212] chnl_net:caif_netlink_parms(): no params data found [ 157.401277][ T9217] IPVS: ftp: loaded support on port[0] = 21 [ 157.560952][ T9214] chnl_net:caif_netlink_parms(): no params data found [ 157.594399][ T9212] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.602037][ T9212] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.610468][ T9212] device bridge_slave_0 entered promiscuous mode [ 157.622335][ T9212] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.630381][ T9212] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.637991][ T9212] device bridge_slave_1 entered promiscuous mode [ 157.677876][ T9221] IPVS: ftp: loaded support on port[0] = 21 [ 157.696602][ T9212] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 157.736069][ T9212] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 157.754713][ T9214] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.763813][ T9214] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.772042][ T9214] device bridge_slave_0 entered promiscuous mode [ 157.780343][ T9214] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.787401][ T9214] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.795520][ T9214] device bridge_slave_1 entered promiscuous mode [ 157.822215][ T9214] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 157.843485][ T9212] team0: Port device team_slave_0 added [ 157.851129][ T9212] team0: Port device team_slave_1 added [ 157.876690][ T9214] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 157.904238][ T9206] 8021q: adding VLAN 0 to HW filter on device bond0 [ 158.001545][ T9212] device hsr_slave_0 entered promiscuous mode [ 158.068483][ T9212] device hsr_slave_1 entered promiscuous mode [ 158.118450][ T9212] debugfs: Directory 'hsr0' with parent '/' already present! [ 158.132930][ T9214] team0: Port device team_slave_0 added [ 158.186454][ T9214] team0: Port device team_slave_1 added [ 158.205636][ T9208] 8021q: adding VLAN 0 to HW filter on device bond0 [ 158.212855][ T9217] chnl_net:caif_netlink_parms(): no params data found [ 158.242495][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 158.250944][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 158.261390][ T9206] 8021q: adding VLAN 0 to HW filter on device team0 [ 158.311471][ T9217] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.319339][ T9217] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.326967][ T9217] device bridge_slave_0 entered promiscuous mode [ 158.334916][ T9217] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.342137][ T9217] bridge0: port 2(bridge_slave_1) entered disabled state [ 158.350159][ T9217] device bridge_slave_1 entered promiscuous mode [ 158.421592][ T9214] device hsr_slave_0 entered promiscuous mode [ 158.459081][ T9214] device hsr_slave_1 entered promiscuous mode [ 158.498367][ T9214] debugfs: Directory 'hsr0' with parent '/' already present! [ 158.533442][ T9208] 8021q: adding VLAN 0 to HW filter on device team0 [ 158.553908][ T9217] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 158.564127][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 158.572411][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 158.580643][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 158.589355][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 158.597622][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.604742][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 158.612982][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 158.622746][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 158.631470][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.638535][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 158.677184][ T9217] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 158.687599][ T9222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 158.696710][ T9222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 158.705936][ T9222] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.713016][ T9222] bridge0: port 1(bridge_slave_0) entered forwarding state [ 158.721723][ T9222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 158.771453][ T9217] team0: Port device team_slave_0 added [ 158.779086][ T9217] team0: Port device team_slave_1 added [ 158.806535][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 158.814657][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 158.823675][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 158.833230][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.840347][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 158.848571][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 158.868112][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 158.876624][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 158.885537][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 158.894250][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 158.904164][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 158.971319][ T9217] device hsr_slave_0 entered promiscuous mode [ 159.008727][ T9217] device hsr_slave_1 entered promiscuous mode [ 159.048503][ T9217] debugfs: Directory 'hsr0' with parent '/' already present! [ 159.071492][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 159.083680][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 159.092481][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 159.101538][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 159.110797][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 159.119584][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 159.127965][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 159.136950][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 159.145419][ T9221] chnl_net:caif_netlink_parms(): no params data found [ 159.187103][ T9206] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 159.199530][ T9206] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 159.211325][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 159.219370][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 159.227577][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 159.269554][ T9221] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.276685][ T9221] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.285220][ T9221] device bridge_slave_0 entered promiscuous mode [ 159.294125][ T9221] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.301598][ T9221] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.309864][ T9221] device bridge_slave_1 entered promiscuous mode [ 159.316736][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 159.329073][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 159.356634][ T9208] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 159.367771][ T9208] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 159.402159][ T9214] 8021q: adding VLAN 0 to HW filter on device bond0 [ 159.409061][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 159.417414][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 159.439492][ T9206] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 159.465325][ T9212] 8021q: adding VLAN 0 to HW filter on device bond0 [ 159.474832][ T9221] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 159.487230][ T9221] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 159.515026][ T9208] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 159.564184][ T9214] 8021q: adding VLAN 0 to HW filter on device team0 [ 159.591806][ T9221] team0: Port device team_slave_0 added [ 159.597786][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 159.606563][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 159.615699][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 159.623528][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 159.642936][ T9212] 8021q: adding VLAN 0 to HW filter on device team0 [ 159.657631][ T9217] 8021q: adding VLAN 0 to HW filter on device bond0 [ 159.673444][ T9221] team0: Port device team_slave_1 added [ 159.681201][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 159.690382][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 159.699206][ T3505] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.706245][ T3505] bridge0: port 1(bridge_slave_0) entered forwarding state [ 159.714133][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 159.723011][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 159.731500][ T3505] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.738585][ T3505] bridge0: port 2(bridge_slave_1) entered forwarding state [ 159.746151][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 159.755202][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 159.763904][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 159.773214][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 159.782153][ T3505] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.789268][ T3505] bridge0: port 1(bridge_slave_0) entered forwarding state [ 159.797345][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 159.805429][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 159.867651][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 159.877239][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 159.885714][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.892861][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 159.901996][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 159.911135][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 159.919993][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 159.928471][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 159.936879][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 159.946193][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 160.001483][ T9221] device hsr_slave_0 entered promiscuous mode [ 160.058654][ T9221] device hsr_slave_1 entered promiscuous mode [ 160.108381][ T9221] debugfs: Directory 'hsr0' with parent '/' already present! [ 160.133151][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 160.141546][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 160.150971][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 160.159821][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 160.168075][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 160.177125][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 160.185797][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 160.240750][ T9217] 8021q: adding VLAN 0 to HW filter on device team0 [ 160.265985][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 160.286394][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 160.295269][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 160.305221][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 160.321321][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 160.329264][ C0] hrtimer: interrupt took 40219 ns [ 160.352507][ T9214] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 160.370632][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 160.394337][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 160.406670][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 160.414771][ T9240] input: syz1 as /devices/virtual/input/input5 [ 160.444449][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 160.455813][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 160.488958][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 160.504549][ T9240] input: syz1 as /devices/virtual/input/input6 [ 160.510257][ T3505] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.517925][ T3505] bridge0: port 1(bridge_slave_0) entered forwarding state [ 160.536236][ T9212] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 01:15:39 executing program 1: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) request_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='$systemlo\x00', 0xfffffffffffffff8) request_key(0x0, 0x0, &(0x7f00000002c0)='{\\\'\x00', 0xfffffffffffffffb) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fcntl$setown(r0, 0x8, 0x0) mmap$perf(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = accept(0xffffffffffffff9c, 0x0, 0x0) setsockopt$packet_buf(r2, 0x107, 0x0, &(0x7f0000000400)="6c7d62787332c215caf5521a67893cd437ccce3f7889f660e6bd2f5b063081a585ac60f6be515e1120f370258abeff36c67c5ffbe44cebb5906106e744174d77a9215c09d106674b0a3c5f593114c999758831ba7ea16ceffc21f96b39774c41ca37983e6e21b9dd6a76ba36af03fb694bdb5c0431bd6f7f7d9b3467d76ad10efbd5b5d9166fe89a807d17bda935fdb8f373f296b8593da900789d710c4f09a527bb812186", 0xa5) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) renameat(0xffffffffffffffff, &(0x7f00000001c0)='./bus\x00', 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000380)={0x2, 0x12000000000, 0x0, 0x2, 0x4}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) getuid() dup2(r1, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x3000000}, 0x14) 01:15:39 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000f00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 160.573753][ T9222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 160.593677][ T9222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 160.607499][ T9222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 160.642046][ T9222] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.649200][ T9222] bridge0: port 2(bridge_slave_1) entered forwarding state [ 160.686670][ T9222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 160.747284][ T9250] input: syz1 as /devices/virtual/input/input7 [ 160.748868][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 160.791265][ T9214] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 160.802313][ T9212] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 160.822554][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 160.832997][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 01:15:39 executing program 1: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) request_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='$systemlo\x00', 0xfffffffffffffff8) request_key(0x0, 0x0, &(0x7f00000002c0)='{\\\'\x00', 0xfffffffffffffffb) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fcntl$setown(r0, 0x8, 0x0) mmap$perf(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = accept(0xffffffffffffff9c, 0x0, 0x0) setsockopt$packet_buf(r2, 0x107, 0x0, &(0x7f0000000400)="6c7d62787332c215caf5521a67893cd437ccce3f7889f660e6bd2f5b063081a585ac60f6be515e1120f370258abeff36c67c5ffbe44cebb5906106e744174d77a9215c09d106674b0a3c5f593114c999758831ba7ea16ceffc21f96b39774c41ca37983e6e21b9dd6a76ba36af03fb694bdb5c0431bd6f7f7d9b3467d76ad10efbd5b5d9166fe89a807d17bda935fdb8f373f296b8593da900789d710c4f09a527bb812186", 0xa5) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) renameat(0xffffffffffffffff, &(0x7f00000001c0)='./bus\x00', 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000380)={0x2, 0x12000000000, 0x0, 0x2, 0x4}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) getuid() dup2(r1, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x3000000}, 0x14) [ 160.873536][ T9217] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 160.885711][ T9217] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 160.899536][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 160.915774][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 160.946342][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 160.961892][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 160.974374][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 160.983809][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 01:15:40 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000f00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 160.992981][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 161.002610][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 161.035423][ T9221] 8021q: adding VLAN 0 to HW filter on device bond0 [ 161.136224][ T9266] input: syz1 as /devices/virtual/input/input8 01:15:40 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000f00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 161.226233][ T9217] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 161.263899][ T9221] 8021q: adding VLAN 0 to HW filter on device team0 01:15:40 executing program 1: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) request_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='$systemlo\x00', 0xfffffffffffffff8) request_key(0x0, 0x0, &(0x7f00000002c0)='{\\\'\x00', 0xfffffffffffffffb) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fcntl$setown(r0, 0x8, 0x0) mmap$perf(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = accept(0xffffffffffffff9c, 0x0, 0x0) setsockopt$packet_buf(r2, 0x107, 0x0, &(0x7f0000000400)="6c7d62787332c215caf5521a67893cd437ccce3f7889f660e6bd2f5b063081a585ac60f6be515e1120f370258abeff36c67c5ffbe44cebb5906106e744174d77a9215c09d106674b0a3c5f593114c999758831ba7ea16ceffc21f96b39774c41ca37983e6e21b9dd6a76ba36af03fb694bdb5c0431bd6f7f7d9b3467d76ad10efbd5b5d9166fe89a807d17bda935fdb8f373f296b8593da900789d710c4f09a527bb812186", 0xa5) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) renameat(0xffffffffffffffff, &(0x7f00000001c0)='./bus\x00', 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000380)={0x2, 0x12000000000, 0x0, 0x2, 0x4}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) getuid() dup2(r1, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x3000000}, 0x14) [ 161.288705][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 161.312658][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 161.420814][ T9275] input: syz1 as /devices/virtual/input/input9 [ 161.438765][ T9222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 161.447634][ T9222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 161.475137][ T9222] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.482434][ T9222] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.497817][ T9222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 161.509859][ T9222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 161.518645][ T9222] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.525720][ T9222] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.548602][ T9222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 161.557620][ T9222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 01:15:40 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000f00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 161.569536][ T9222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 161.671126][ T9286] input: syz1 as /devices/virtual/input/input10 01:15:40 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000f00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 161.873787][ T9290] input: syz1 as /devices/virtual/input/input11 [ 161.928622][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 161.937760][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 162.015234][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 162.057062][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 162.109031][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 162.163380][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 162.183799][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 01:15:41 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="02000500000001000015ff07000000ffffff850000fc00000000f2ff00000000000055000000000000000a0700000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 01:15:41 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000f00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 162.205044][ T9221] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 162.244820][ T9302] input: syz1 as /devices/virtual/input/input12 [ 162.290346][ T9221] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 162.336090][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 162.352671][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 162.363783][ T9307] loop2: p1 < > p2 < p5 > p3[EZD] [ 162.383473][ T9307] loop2: partition table partially beyond EOD, truncated [ 162.438051][ T9307] loop2: p1 start 352321537 is beyond EOD, truncated [ 162.467026][ T9221] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 162.495792][ T9307] loop2: p2 size 2 extends beyond EOD, truncated [ 162.520973][ T9307] loop2: p3 size 1802 extends beyond EOD, truncated [ 162.560126][ T9307] loop2: p5 size 1802 extends beyond EOD, truncated 01:15:41 executing program 4: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="7400000024000b0500000000000000edffffff00", @ANYRES32=r2, @ANYBLOB="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"], 0x74}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x3, 0x300000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 162.730578][ T9307] loop2: p1 < > p2 < p5 > p3[EZD] [ 162.742031][ T9307] loop2: partition table partially beyond EOD, truncated [ 162.752120][ T9307] loop2: p1 start 352321537 is beyond EOD, truncated [ 162.795541][ T9307] loop2: p2 size 2 extends beyond EOD, truncated [ 162.820666][ T9307] loop2: p3 size 1802 extends beyond EOD, truncated [ 162.866077][ T9307] loop2: p5 size 1802 extends beyond EOD, truncated 01:15:42 executing program 5: r0 = socket$inet(0x2, 0x200000002, 0x0) sendmmsg$inet(r0, &(0x7f0000004940)=[{{&(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 01:15:42 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x6b, &(0x7f0000000240), 0x1c) 01:15:42 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) setsockopt(r1, 0x800000000010d, 0x8000000011, &(0x7f00001c9fff), 0xc5) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(r1, &(0x7f0000000100)=[{{0x0, 0xfffffffffffffdc1, 0x0}}], 0x2ee, 0x0) 01:15:42 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x400000000008000, 0xff0d) shutdown(r0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x360, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") recvmmsg(r0, &(0x7f0000000200)=[{{&(0x7f0000000180)=@x25, 0x11e, 0x0, 0x0, 0x0, 0xfffffd43}}], 0x6a, 0x0, 0x0) poll(&(0x7f0000000380)=[{r0}, {r0}], 0x2, 0x0) 01:15:42 executing program 4: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="7400000024000b0500000000000000edffffff00", @ANYRES32=r2, @ANYBLOB="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"], 0x74}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x3, 0x300000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x492492492492642, 0x0) 01:15:42 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="02000500000001000015ff07000000ffffff850000fc00000000f2ff00000000000055000000000000000a0700000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 01:15:42 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x6b, &(0x7f0000000240), 0x1c) [ 163.109172][ T9341] loop2: p1 < > p2 < p5 > p3[EZD] [ 163.124791][ T9341] loop2: partition table partially beyond EOD, truncated 01:15:42 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 01:15:42 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) setsockopt(r1, 0x800000000010d, 0x8000000011, &(0x7f00001c9fff), 0xc5) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(r1, &(0x7f0000000100)=[{{0x0, 0xfffffffffffffdc1, 0x0}}], 0x2ee, 0x0) 01:15:42 executing program 5: r0 = socket$inet(0x2, 0x200000002, 0x0) sendmmsg$inet(r0, &(0x7f0000004940)=[{{&(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) [ 163.162584][ T9341] loop2: p1 start 352321537 is beyond EOD, truncated 01:15:42 executing program 4: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="7400000024000b0500000000000000edffffff00", @ANYRES32=r2, @ANYBLOB="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"], 0x74}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x3, 0x300000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 163.232133][ T9341] loop2: p2 size 2 extends beyond EOD, truncated [ 163.288974][ T9341] loop2: p3 size 1802 extends beyond EOD, truncated 01:15:42 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x6b, &(0x7f0000000240), 0x1c) [ 163.341627][ T9341] loop2: p5 size 1802 extends beyond EOD, truncated 01:15:42 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) setsockopt(r1, 0x800000000010d, 0x8000000011, &(0x7f00001c9fff), 0xc5) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(r1, &(0x7f0000000100)=[{{0x0, 0xfffffffffffffdc1, 0x0}}], 0x2ee, 0x0) 01:15:42 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) setsockopt(r1, 0x800000000010d, 0x8000000011, &(0x7f00001c9fff), 0xc5) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(r1, &(0x7f0000000100)=[{{0x0, 0xfffffffffffffdc1, 0x0}}], 0x2ee, 0x0) 01:15:42 executing program 5: r0 = socket$inet(0x2, 0x200000002, 0x0) sendmmsg$inet(r0, &(0x7f0000004940)=[{{&(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 01:15:42 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x400448cb, 0x0) 01:15:42 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="02000500000001000015ff07000000ffffff850000fc00000000f2ff00000000000055000000000000000a0700000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 01:15:42 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') read(r0, 0x0, 0xffffffa8) 01:15:42 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) setsockopt(r1, 0x800000000010d, 0x8000000011, &(0x7f00001c9fff), 0xc5) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(r1, &(0x7f0000000100)=[{{0x0, 0xfffffffffffffdc1, 0x0}}], 0x2ee, 0x0) 01:15:42 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) setsockopt(r1, 0x800000000010d, 0x8000000011, &(0x7f00001c9fff), 0xc5) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(r1, &(0x7f0000000100)=[{{0x0, 0xfffffffffffffdc1, 0x0}}], 0x2ee, 0x0) 01:15:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001f40)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)={[{@lockproto_nolock='lockproto=lock_nolock'}]}) 01:15:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) close(r2) openat$cgroup_ro(r1, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0}, 0x2000000}], 0x1, 0x0, 0x0) readv(r2, &(0x7f00000002c0), 0x17c) 01:15:43 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') read(r0, 0x0, 0xffffffa8) [ 164.011895][ T9393] loop2: p1 < > p2 < p5 > p3[EZD] [ 164.029046][ T9393] loop2: partition table partially beyond EOD, truncated 01:15:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x2, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0000000]}}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2000) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) [ 164.102580][ T9393] loop2: p1 start 352321537 is beyond EOD, truncated [ 164.127515][ T9393] loop2: p2 size 2 extends beyond EOD, truncated 01:15:43 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) setsockopt(r1, 0x800000000010d, 0x8000000011, &(0x7f00001c9fff), 0xc5) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(r1, &(0x7f0000000100)=[{{0x0, 0xfffffffffffffdc1, 0x0}}], 0x2ee, 0x0) [ 164.172943][ T9393] loop2: p3 size 1802 extends beyond EOD, truncated [ 164.191886][ T9405] gfs2: not a GFS2 filesystem [ 164.239512][ T9393] loop2: p5 size 1802 extends beyond EOD, truncated 01:15:43 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000005070000000e8fc00bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x0, 0x0}, 0x10) [ 164.295979][ T9405] gfs2: not a GFS2 filesystem 01:15:43 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') read(r0, 0x0, 0xffffffa8) 01:15:43 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0x200800000000042) ioctl$FS_IOC_FSGETXATTR(r0, 0x8038550a, &(0x7f0000000180)={0x2, 0x0, 0x0, 0x0, 0x100002000007a, 0x7ff0bdbe}) 01:15:43 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="02000500000001000015ff07000000ffffff850000fc00000000f2ff00000000000055000000000000000a0700000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 01:15:43 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000002480)="11dca50d5e0bcfe47bf070") ppoll(&(0x7f0000000300)=[{r0}, {r1}], 0x2, 0x0, 0x0, 0x0) 01:15:43 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') read(r0, 0x0, 0xffffffa8) 01:15:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) 01:15:43 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000005070000000e8fc00bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x0, 0x0}, 0x10) [ 164.736570][ T9439] vhci_hcd: default hub control req: 0000 v0000 i0000 l25647 01:15:43 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) write$P9_RLOCK(r0, &(0x7f0000000040)={0xfffffffd}, 0x8) [ 164.932412][ T9454] loop2: p1 < > p2 < p5 > p3[EZD] 01:15:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000000)=@ethtool_channels={0xa}}) 01:15:44 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0x200800000000042) ioctl$FS_IOC_FSGETXATTR(r0, 0x8038550a, &(0x7f0000000180)={0x2, 0x0, 0x0, 0x0, 0x100002000007a, 0x7ff0bdbe}) [ 164.953027][ T9454] loop2: partition table partially beyond EOD, truncated 01:15:44 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000005070000000e8fc00bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x0, 0x0}, 0x10) [ 165.048559][ T9454] loop2: p1 start 352321537 is beyond EOD, truncated [ 165.100708][ T9454] loop2: p2 size 2 extends beyond EOD, truncated [ 165.139310][ T9454] loop2: p3 size 1802 extends beyond EOD, truncated 01:15:44 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) write$P9_RLOCK(r0, &(0x7f0000000040)={0xfffffffd}, 0x8) [ 165.167809][ T9454] loop2: p5 size 1802 extends beyond EOD, truncated [ 165.182673][ T9468] vhci_hcd: default hub control req: 0000 v0000 i0000 l25647 01:15:44 executing program 4: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@codepage={'codepage', 0x3d, '\naccyrillic'}}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 01:15:44 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0x200800000000042) ioctl$FS_IOC_FSGETXATTR(r0, 0x8038550a, &(0x7f0000000180)={0x2, 0x0, 0x0, 0x0, 0x100002000007a, 0x7ff0bdbe}) 01:15:44 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000005070000000e8fc00bc700000000000009500000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x0, 0x0}, 0x10) [ 165.507372][ T9479] hfs: unable to load codepage " [ 165.507372][ T9479] accyrillic" [ 165.543573][ T9479] hfs: unable to parse mount options 01:15:44 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x15f) 01:15:44 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) write$P9_RLOCK(r0, &(0x7f0000000040)={0xfffffffd}, 0x8) [ 165.679820][ T9479] hfs: unable to load codepage " [ 165.679820][ T9479] accyrillic" 01:15:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) 01:15:44 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0x200800000000042) ioctl$FS_IOC_FSGETXATTR(r0, 0x8038550a, &(0x7f0000000180)={0x2, 0x0, 0x0, 0x0, 0x100002000007a, 0x7ff0bdbe}) [ 165.773515][ T9479] hfs: unable to parse mount options 01:15:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) 01:15:44 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgrou\x8a7\x95\xc8\xf9\xff \xf6\xbd', 0xea02ffe0, 0x0) 01:15:44 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) write$P9_RLOCK(r0, &(0x7f0000000040)={0xfffffffd}, 0x8) 01:15:44 executing program 4: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@codepage={'codepage', 0x3d, '\naccyrillic'}}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 165.837616][ T9507] vhci_hcd: default hub control req: 0000 v0000 i0000 l25647 01:15:44 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x46, 0x0, &(0x7f00000001c0)) [ 166.041029][ T26] kauditd_printk_skb: 4 callbacks suppressed [ 166.041044][ T26] audit: type=1800 audit(1565918145.063:31): pid=9523 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name=6367726F758A3795C8F9FF20F6BD dev="sda1" ino=16571 res=0 01:15:45 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') read$FUSE(r0, &(0x7f0000000140), 0x1000) readv(r0, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) [ 166.090441][ T9516] hfs: unable to load codepage " [ 166.090441][ T9516] accyrillic" 01:15:45 executing program 0: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[{@show_sys_files_yes='show_sys_files=yeu'}]}) 01:15:45 executing program 2: setresuid(0x0, 0xfffe, 0x0) request_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)='vmnet0\x00', 0x0) [ 166.262198][ T9516] hfs: unable to parse mount options [ 166.397612][ T9535] ntfs: (device loop0): parse_options(): The show_sys_files option requires a boolean argument. 01:15:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0}], 0x0, 0x0) 01:15:45 executing program 4: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@codepage={'codepage', 0x3d, '\naccyrillic'}}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 166.599244][ T9535] ntfs: (device loop0): parse_options(): The show_sys_files option requires a boolean argument. [ 166.921868][ T9556] hfs: unable to load codepage " [ 166.921868][ T9556] accyrillic" [ 166.944663][ T9556] hfs: unable to parse mount options 01:15:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) 01:15:46 executing program 2: setresuid(0x0, 0xfffe, 0x0) request_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)='vmnet0\x00', 0x0) 01:15:46 executing program 0: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[{@show_sys_files_yes='show_sys_files=yeu'}]}) 01:15:46 executing program 5: perf_event_open(&(0x7f0000000000)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:15:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) 01:15:46 executing program 4: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@codepage={'codepage', 0x3d, '\naccyrillic'}}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 01:15:46 executing program 2: setresuid(0x0, 0xfffe, 0x0) request_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)='vmnet0\x00', 0x0) [ 167.219036][ T9577] ntfs: (device loop0): parse_options(): The show_sys_files option requires a boolean argument. 01:15:46 executing program 5: perf_event_open(&(0x7f0000000000)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 167.545922][ T9590] hfs: unable to load codepage " [ 167.545922][ T9590] accyrillic" 01:15:46 executing program 0: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[{@show_sys_files_yes='show_sys_files=yeu'}]}) [ 167.597238][ T9590] hfs: unable to parse mount options 01:15:46 executing program 2: setresuid(0x0, 0xfffe, 0x0) request_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)='vmnet0\x00', 0x0) 01:15:46 executing program 5: perf_event_open(&(0x7f0000000000)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:15:46 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000240)={0x0, 0x102000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x276, 0x0, 0x0, 0xfffffe3d) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x208004}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x68438555caef70a7}, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 167.773304][ T9611] ntfs: (device loop0): parse_options(): The show_sys_files option requires a boolean argument. [ 168.169724][ T9625] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 01:15:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) 01:15:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) 01:15:47 executing program 5: perf_event_open(&(0x7f0000000000)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 01:15:47 executing program 0: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[{@show_sys_files_yes='show_sys_files=yeu'}]}) 01:15:47 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x89e3, &(0x7f0000000000)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x0, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}) 01:15:47 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x89e3, &(0x7f0000000000)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x0, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}) [ 168.362439][ T9635] ntfs: (device loop0): parse_options(): The show_sys_files option requires a boolean argument. 01:15:47 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x2, 0x2, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x58}}, 0x0) 01:15:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r0, 0x0, 0xb, 0x0, &(0x7f0000000100)) 01:15:47 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x89e3, &(0x7f0000000000)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x0, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}) 01:15:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r1) recvmmsg(r0, &(0x7f0000002d80)=[{{0x0, 0x0, 0xfffffffffffffffd}}], 0x1, 0x62, 0x0) 01:15:48 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x89e3, &(0x7f0000000000)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x0, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}) 01:15:48 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000240)={0x0, 0x102000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x276, 0x0, 0x0, 0xfffffe3d) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x208004}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x68438555caef70a7}, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:15:48 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x2, 0x2, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x58}}, 0x0) 01:15:48 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffdbb, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000000c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffdd4) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="8d0960"], 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 01:15:48 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default user:syz 040'], 0x1, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0x2, r0, 0x0, 0x0) 01:15:48 executing program 3: syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) syz_open_dev$sndctrl(0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:15:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000ff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 169.376076][ T9681] encrypted_key: keyword 'new' not allowed when called from .update method 01:15:48 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x2, 0x2, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x58}}, 0x0) 01:15:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x2d) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x32, 0x4) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f00000034c0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0}}], 0x2, 0x0) 01:15:48 executing program 2: r0 = fsopen(&(0x7f0000000200)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000000)='hugetlbfs\x00', &(0x7f0000000240)='no\x02\r\xe2=\xa7\x85\xda\xe7\xfd\x1f\xf0\x92I\xe4-r\xba\xf8\x1f)**/O\x96KL@\xd6\x81V8<\xaewX\x19\x9d\x91\xc2\xc1e\xb7W\xc8xr\x90\x96\x03\x92\xf4@c\xc0\x03X\x8b\xa5\x9c9\xcf\x93\xa6\xc0\x9b\x03\x87\xcd\x1dB\xdf\x9fu\xabe)\xc1\xe0\xd5N^Vx\x1f\\\xd8,\xb1\xe6\xb1w\x9b\xf1\x9d\xefC\xe9\x91:C\xce\xcc\x96g\xfa\xf5p\xd0\xf5\xe6\xb0\x0e\nIR\x05]\xd7\xe6\xc9[\x9f\xb5\xd9\xe8\x8cm.\xfa}\xb7\x9b\x86\xd0\xe1 \xca&\xd5W\xd1\x7f\xdcn\xf1=`\xba\xa2uv8\xc9\xe9.\xbb?\x12\'?^\xe1\x867\x05\xd4\xf5\x84\xab+\x04Pf*\x90/\x1d\x96\x87R\xb6\xb9\x18?\xc61\xd3L\xa5Q\x883+\xb3\xe9A\xe8\x95\x12dn?\x9d\x1e\x91{\xdc\xc6\xad\xe9\x84\x84\x8d\xd7\xff\xe7\xf6\xb2\x89\xffr\xf5\xec\tU\x92\xc4\xf4\xe1\xa4PA\x18\x88\xa6\x9a\x81\x1f0+,\nd\xf8\xcb\xaf\xf2bU$D7\x80\"\xd9BS\x1au\xae\xba\xedx\x9dJW\x1eu', 0x0) 01:15:48 executing program 2: r0 = fsopen(&(0x7f0000000200)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000000)='hugetlbfs\x00', &(0x7f0000000240)='no\x02\r\xe2=\xa7\x85\xda\xe7\xfd\x1f\xf0\x92I\xe4-r\xba\xf8\x1f)**/O\x96KL@\xd6\x81V8<\xaewX\x19\x9d\x91\xc2\xc1e\xb7W\xc8xr\x90\x96\x03\x92\xf4@c\xc0\x03X\x8b\xa5\x9c9\xcf\x93\xa6\xc0\x9b\x03\x87\xcd\x1dB\xdf\x9fu\xabe)\xc1\xe0\xd5N^Vx\x1f\\\xd8,\xb1\xe6\xb1w\x9b\xf1\x9d\xefC\xe9\x91:C\xce\xcc\x96g\xfa\xf5p\xd0\xf5\xe6\xb0\x0e\nIR\x05]\xd7\xe6\xc9[\x9f\xb5\xd9\xe8\x8cm.\xfa}\xb7\x9b\x86\xd0\xe1 \xca&\xd5W\xd1\x7f\xdcn\xf1=`\xba\xa2uv8\xc9\xe9.\xbb?\x12\'?^\xe1\x867\x05\xd4\xf5\x84\xab+\x04Pf*\x90/\x1d\x96\x87R\xb6\xb9\x18?\xc61\xd3L\xa5Q\x883+\xb3\xe9A\xe8\x95\x12dn?\x9d\x1e\x91{\xdc\xc6\xad\xe9\x84\x84\x8d\xd7\xff\xe7\xf6\xb2\x89\xffr\xf5\xec\tU\x92\xc4\xf4\xe1\xa4PA\x18\x88\xa6\x9a\x81\x1f0+,\nd\xf8\xcb\xaf\xf2bU$D7\x80\"\xd9BS\x1au\xae\xba\xedx\x9dJW\x1eu', 0x0) 01:15:48 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x2, 0x2, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x58}}, 0x0) 01:15:49 executing program 2: r0 = fsopen(&(0x7f0000000200)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000000)='hugetlbfs\x00', &(0x7f0000000240)='no\x02\r\xe2=\xa7\x85\xda\xe7\xfd\x1f\xf0\x92I\xe4-r\xba\xf8\x1f)**/O\x96KL@\xd6\x81V8<\xaewX\x19\x9d\x91\xc2\xc1e\xb7W\xc8xr\x90\x96\x03\x92\xf4@c\xc0\x03X\x8b\xa5\x9c9\xcf\x93\xa6\xc0\x9b\x03\x87\xcd\x1dB\xdf\x9fu\xabe)\xc1\xe0\xd5N^Vx\x1f\\\xd8,\xb1\xe6\xb1w\x9b\xf1\x9d\xefC\xe9\x91:C\xce\xcc\x96g\xfa\xf5p\xd0\xf5\xe6\xb0\x0e\nIR\x05]\xd7\xe6\xc9[\x9f\xb5\xd9\xe8\x8cm.\xfa}\xb7\x9b\x86\xd0\xe1 \xca&\xd5W\xd1\x7f\xdcn\xf1=`\xba\xa2uv8\xc9\xe9.\xbb?\x12\'?^\xe1\x867\x05\xd4\xf5\x84\xab+\x04Pf*\x90/\x1d\x96\x87R\xb6\xb9\x18?\xc61\xd3L\xa5Q\x883+\xb3\xe9A\xe8\x95\x12dn?\x9d\x1e\x91{\xdc\xc6\xad\xe9\x84\x84\x8d\xd7\xff\xe7\xf6\xb2\x89\xffr\xf5\xec\tU\x92\xc4\xf4\xe1\xa4PA\x18\x88\xa6\x9a\x81\x1f0+,\nd\xf8\xcb\xaf\xf2bU$D7\x80\"\xd9BS\x1au\xae\xba\xedx\x9dJW\x1eu', 0x0) [ 170.163504][ T9674] debugfs: Directory '9674-4' with parent 'kvm' already present! 01:15:49 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000240)={0x0, 0x102000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x276, 0x0, 0x0, 0xfffffe3d) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x208004}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x68438555caef70a7}, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:15:49 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') 01:15:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffdbb, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000000c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffdd4) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="8d0960"], 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 01:15:49 executing program 2: r0 = fsopen(&(0x7f0000000200)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000000)='hugetlbfs\x00', &(0x7f0000000240)='no\x02\r\xe2=\xa7\x85\xda\xe7\xfd\x1f\xf0\x92I\xe4-r\xba\xf8\x1f)**/O\x96KL@\xd6\x81V8<\xaewX\x19\x9d\x91\xc2\xc1e\xb7W\xc8xr\x90\x96\x03\x92\xf4@c\xc0\x03X\x8b\xa5\x9c9\xcf\x93\xa6\xc0\x9b\x03\x87\xcd\x1dB\xdf\x9fu\xabe)\xc1\xe0\xd5N^Vx\x1f\\\xd8,\xb1\xe6\xb1w\x9b\xf1\x9d\xefC\xe9\x91:C\xce\xcc\x96g\xfa\xf5p\xd0\xf5\xe6\xb0\x0e\nIR\x05]\xd7\xe6\xc9[\x9f\xb5\xd9\xe8\x8cm.\xfa}\xb7\x9b\x86\xd0\xe1 \xca&\xd5W\xd1\x7f\xdcn\xf1=`\xba\xa2uv8\xc9\xe9.\xbb?\x12\'?^\xe1\x867\x05\xd4\xf5\x84\xab+\x04Pf*\x90/\x1d\x96\x87R\xb6\xb9\x18?\xc61\xd3L\xa5Q\x883+\xb3\xe9A\xe8\x95\x12dn?\x9d\x1e\x91{\xdc\xc6\xad\xe9\x84\x84\x8d\xd7\xff\xe7\xf6\xb2\x89\xffr\xf5\xec\tU\x92\xc4\xf4\xe1\xa4PA\x18\x88\xa6\x9a\x81\x1f0+,\nd\xf8\xcb\xaf\xf2bU$D7\x80\"\xd9BS\x1au\xae\xba\xedx\x9dJW\x1eu', 0x0) 01:15:49 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x2d) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x32, 0x4) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f00000034c0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0}}], 0x2, 0x0) 01:15:49 executing program 3: syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) syz_open_dev$sndctrl(0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:15:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_create(0x0, 0x0, &(0x7f00000000c0)) timer_getoverrun(0x0) 01:15:49 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x2, 0x4, 0x4, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0x8000000000d, 0x4, 0x4, 0x2, 0x0, r0, 0x0, [0x5f]}, 0x3c) 01:15:49 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x2d) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x32, 0x4) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f00000034c0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0}}], 0x2, 0x0) 01:15:49 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)="d8", 0x1}], 0x1, 0x0) 01:15:49 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x3b7}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x7700, &(0x7f0000000300)=[&(0x7f0000005000/0x2000)=nil], &(0x7f0000000380)=[0x1], 0x0, 0x0) 01:15:50 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x2d) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x32, 0x4) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f00000034c0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0}}], 0x2, 0x0) 01:15:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000240)={0x0, 0x102000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x276, 0x0, 0x0, 0xfffffe3d) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x208004}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x68438555caef70a7}, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:15:50 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)="d8", 0x1}], 0x1, 0x0) 01:15:50 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffdbb, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000000c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffdd4) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="8d0960"], 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 01:15:50 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x0, 0x3e, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a", 0x0, 0x401}, 0x28) 01:15:50 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x3b7}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x7700, &(0x7f0000000300)=[&(0x7f0000005000/0x2000)=nil], &(0x7f0000000380)=[0x1], 0x0, 0x0) 01:15:50 executing program 3: syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) syz_open_dev$sndctrl(0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:15:50 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)="d8", 0x1}], 0x1, 0x0) 01:15:50 executing program 0: r0 = socket$inet(0x2, 0x80001, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r1, &(0x7f00000004c0)={0x2, 0x0, @empty}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 01:15:50 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)="d8", 0x1}], 0x1, 0x0) 01:15:51 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x3b7}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x7700, &(0x7f0000000300)=[&(0x7f0000005000/0x2000)=nil], &(0x7f0000000380)=[0x1], 0x0, 0x0) 01:15:51 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) chroot(&(0x7f0000000280)='./file0\x00') mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000400)='ramfs\x00\x9b\x95\x84\x10D\xfb\x9b\x81R#\x10O\xd3\xb4\xe8\xa3\x1f\x00\r\xf6\xd9\xbbt\x95f\x9e\x02\x06\xf946\\{(\xc8\xa7s\xd2>\x81\x88l\x0e\xc5%\x99\x00\x02\x9d\x85\xfc\xa9\\\x99:\xe4\x9c\xf9z>w\xe7\xa9\xa8=\xe9o\x9f\xfbKE\xd7\x9a\x1b\xf8\x86@\x8e\xe6\x9em\x89\xab\x19\xea1\x8e\xa1\xb5\xd7\xc6\xc62\x05\xc7\xe5\xd2m\xeczV\x1d\x84\xcd\xc0\xdf', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') umount2(&(0x7f0000000040)='./file0\x00', 0x2) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') 01:15:51 executing program 2: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) ppoll(&(0x7f0000000000)=[{r0, 0x200}], 0x1, 0x0, 0x0, 0x0) 01:15:51 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffdbb, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000000c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffdd4) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="8d0960"], 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 01:15:51 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x3b7}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x7700, &(0x7f0000000300)=[&(0x7f0000005000/0x2000)=nil], &(0x7f0000000380)=[0x1], 0x0, 0x0) 01:15:51 executing program 4: openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f0000000040)={0x0, 0x7fff, 0x7f, 0xffffffff, 0x7, 0x8, 0x80000000, 0x9}, &(0x7f00000000c0)={0x1000, 0x3, 0x0, 0xffffffffffffca8a, 0x8, 0x1, 0x8, 0xc9}, &(0x7f0000000100)={0x23ee, 0x0, 0x0, 0x1, 0x1, 0x800, 0x0, 0x1}, &(0x7f0000000180), &(0x7f0000000240)={&(0x7f0000000200)={0x8}, 0x8}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f00000001c0)={&(0x7f0000ffb000/0x4000)=nil, 0x0, 0xd6aeb9b92f94638f, 0x30, &(0x7f0000ffc000/0x4000)=nil, 0x5}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) 01:15:51 executing program 3: syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) syz_open_dev$sndctrl(0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:15:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000880)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x20, r3, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}]}]}, 0x20}}, 0x0) 01:15:51 executing program 0: r0 = socket$inet(0x2, 0x80001, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r1, &(0x7f00000004c0)={0x2, 0x0, @empty}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 01:15:52 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'sy\x17\xe9\x96\x1b\x00\x00r1\x00\x00\x00\x00\r\x00', 0x1}) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f0000000740)) getgroups(0x0, &(0x7f00000003c0)) fchown(r0, 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x7c) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 01:15:52 executing program 2: bind$rxrpc(0xffffffffffffffff, &(0x7f0000000780)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e23, 0x1, @ipv4={[], [], @broadcast}, 0x1e}}, 0x24) listen(0xffffffffffffffff, 0x2) listen(0xffffffffffffffff, 0x4000) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) statfs(0x0, &(0x7f0000000300)=""/38) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000100)=0x74, 0x4) geteuid() fstat(0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000440)=""/195) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000340)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x1017f) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r1, 0x40206417, &(0x7f00000006c0)={0x0, 0x9, 0x2, 0x0, 0x5}) 01:15:52 executing program 4: openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f0000000040)={0x0, 0x7fff, 0x7f, 0xffffffff, 0x7, 0x8, 0x80000000, 0x9}, &(0x7f00000000c0)={0x1000, 0x3, 0x0, 0xffffffffffffca8a, 0x8, 0x1, 0x8, 0xc9}, &(0x7f0000000100)={0x23ee, 0x0, 0x0, 0x1, 0x1, 0x800, 0x0, 0x1}, &(0x7f0000000180), &(0x7f0000000240)={&(0x7f0000000200)={0x8}, 0x8}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f00000001c0)={&(0x7f0000ffb000/0x4000)=nil, 0x0, 0xd6aeb9b92f94638f, 0x30, &(0x7f0000ffc000/0x4000)=nil, 0x5}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) 01:15:52 executing program 5: openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f0000000040)={0x0, 0x7fff, 0x7f, 0xffffffff, 0x7, 0x8, 0x80000000, 0x9}, &(0x7f00000000c0)={0x1000, 0x3, 0x0, 0xffffffffffffca8a, 0x8, 0x1, 0x8, 0xc9}, &(0x7f0000000100)={0x23ee, 0x0, 0x0, 0x1, 0x1, 0x800, 0x0, 0x1}, &(0x7f0000000180), &(0x7f0000000240)={&(0x7f0000000200)={0x8}, 0x8}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f00000001c0)={&(0x7f0000ffb000/0x4000)=nil, 0x0, 0xd6aeb9b92f94638f, 0x30, &(0x7f0000ffc000/0x4000)=nil, 0x5}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) [ 173.655773][ T9834] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 173.726581][ T9834] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 173.843186][ T9834] attempt to access beyond end of device [ 173.888645][ T9834] loop1: rw=12288, want=8200, limit=20 [ 173.895058][ T9834] attempt to access beyond end of device 01:15:52 executing program 0: r0 = socket$inet(0x2, 0x80001, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r1, &(0x7f00000004c0)={0x2, 0x0, @empty}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 01:15:53 executing program 4: openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f0000000040)={0x0, 0x7fff, 0x7f, 0xffffffff, 0x7, 0x8, 0x80000000, 0x9}, &(0x7f00000000c0)={0x1000, 0x3, 0x0, 0xffffffffffffca8a, 0x8, 0x1, 0x8, 0xc9}, &(0x7f0000000100)={0x23ee, 0x0, 0x0, 0x1, 0x1, 0x800, 0x0, 0x1}, &(0x7f0000000180), &(0x7f0000000240)={&(0x7f0000000200)={0x8}, 0x8}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f00000001c0)={&(0x7f0000ffb000/0x4000)=nil, 0x0, 0xd6aeb9b92f94638f, 0x30, &(0x7f0000ffc000/0x4000)=nil, 0x5}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) [ 173.942681][ T9834] loop1: rw=12288, want=12296, limit=20 [ 173.978594][ T9834] F2FS-fs (loop1): Failed to get valid F2FS checkpoint 01:15:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setgroups(0x4000000000000015, &(0x7f0000000200)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00007e5000)={0xffffffffffffffff}) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f0000000000)=""/92, &(0x7f00000000c0)=0x5c) 01:15:53 executing program 5: openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f0000000040)={0x0, 0x7fff, 0x7f, 0xffffffff, 0x7, 0x8, 0x80000000, 0x9}, &(0x7f00000000c0)={0x1000, 0x3, 0x0, 0xffffffffffffca8a, 0x8, 0x1, 0x8, 0xc9}, &(0x7f0000000100)={0x23ee, 0x0, 0x0, 0x1, 0x1, 0x800, 0x0, 0x1}, &(0x7f0000000180), &(0x7f0000000240)={&(0x7f0000000200)={0x8}, 0x8}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f00000001c0)={&(0x7f0000ffb000/0x4000)=nil, 0x0, 0xd6aeb9b92f94638f, 0x30, &(0x7f0000ffc000/0x4000)=nil, 0x5}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) 01:15:53 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'sy\x17\xe9\x96\x1b\x00\x00r1\x00\x00\x00\x00\r\x00', 0x1}) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f0000000740)) getgroups(0x0, &(0x7f00000003c0)) fchown(r0, 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x7c) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 01:15:53 executing program 2: bind$rxrpc(0xffffffffffffffff, &(0x7f0000000780)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e23, 0x1, @ipv4={[], [], @broadcast}, 0x1e}}, 0x24) listen(0xffffffffffffffff, 0x2) listen(0xffffffffffffffff, 0x4000) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) statfs(0x0, &(0x7f0000000300)=""/38) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000100)=0x74, 0x4) geteuid() fstat(0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000440)=""/195) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000340)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x1017f) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r1, 0x40206417, &(0x7f00000006c0)={0x0, 0x9, 0x2, 0x0, 0x5}) 01:15:53 executing program 4: openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f0000000040)={0x0, 0x7fff, 0x7f, 0xffffffff, 0x7, 0x8, 0x80000000, 0x9}, &(0x7f00000000c0)={0x1000, 0x3, 0x0, 0xffffffffffffca8a, 0x8, 0x1, 0x8, 0xc9}, &(0x7f0000000100)={0x23ee, 0x0, 0x0, 0x1, 0x1, 0x800, 0x0, 0x1}, &(0x7f0000000180), &(0x7f0000000240)={&(0x7f0000000200)={0x8}, 0x8}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f00000001c0)={&(0x7f0000ffb000/0x4000)=nil, 0x0, 0xd6aeb9b92f94638f, 0x30, &(0x7f0000ffc000/0x4000)=nil, 0x5}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) 01:15:53 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'sy\x17\xe9\x96\x1b\x00\x00r1\x00\x00\x00\x00\r\x00', 0x1}) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f0000000740)) getgroups(0x0, &(0x7f00000003c0)) fchown(r0, 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x7c) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 01:15:53 executing program 5: openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f0000000040)={0x0, 0x7fff, 0x7f, 0xffffffff, 0x7, 0x8, 0x80000000, 0x9}, &(0x7f00000000c0)={0x1000, 0x3, 0x0, 0xffffffffffffca8a, 0x8, 0x1, 0x8, 0xc9}, &(0x7f0000000100)={0x23ee, 0x0, 0x0, 0x1, 0x1, 0x800, 0x0, 0x1}, &(0x7f0000000180), &(0x7f0000000240)={&(0x7f0000000200)={0x8}, 0x8}) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f00000001c0)={&(0x7f0000ffb000/0x4000)=nil, 0x0, 0xd6aeb9b92f94638f, 0x30, &(0x7f0000ffc000/0x4000)=nil, 0x5}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) [ 174.795766][ T9889] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 174.839821][ T9889] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 174.917767][ T9889] attempt to access beyond end of device [ 174.987072][ T9889] loop1: rw=12288, want=8200, limit=20 [ 175.019555][ T9889] attempt to access beyond end of device 01:15:54 executing program 0: r0 = socket$inet(0x2, 0x80001, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r1, &(0x7f00000004c0)={0x2, 0x0, @empty}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) 01:15:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) [ 175.081053][ T9889] loop1: rw=12288, want=12296, limit=20 [ 175.108679][ T9901] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 175.173363][ T9889] F2FS-fs (loop1): Failed to get valid F2FS checkpoint [ 175.188726][ T9901] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 175.270502][ T9901] attempt to access beyond end of device 01:15:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x19, &(0x7f0000000040)={@dev}, 0x20) [ 175.318782][ T9901] loop3: rw=12288, want=8200, limit=20 [ 175.400419][ T9901] attempt to access beyond end of device [ 175.448568][ T9901] loop3: rw=12288, want=12296, limit=20 [ 175.455173][ T9901] F2FS-fs (loop3): Failed to get valid F2FS checkpoint 01:15:54 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'sy\x17\xe9\x96\x1b\x00\x00r1\x00\x00\x00\x00\r\x00', 0x1}) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f0000000740)) getgroups(0x0, &(0x7f00000003c0)) fchown(r0, 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x7c) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 01:15:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) 01:15:54 executing program 2: bind$rxrpc(0xffffffffffffffff, &(0x7f0000000780)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e23, 0x1, @ipv4={[], [], @broadcast}, 0x1e}}, 0x24) listen(0xffffffffffffffff, 0x2) listen(0xffffffffffffffff, 0x4000) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) statfs(0x0, &(0x7f0000000300)=""/38) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000100)=0x74, 0x4) geteuid() fstat(0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000440)=""/195) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000340)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x1017f) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r1, 0x40206417, &(0x7f00000006c0)={0x0, 0x9, 0x2, 0x0, 0x5}) 01:15:54 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007f9d3be45655f2b6a0080004000c081600f1c46b7b31afdc13f1a088cdbf2a5630d5", 0x28}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000016"], 0x1}}, 0x0) r1 = socket(0x10, 0x800000080002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f00000000c0)=[@op={0x18}], 0x18}], 0x4924924924924c5, 0x0) 01:15:54 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'sy\x17\xe9\x96\x1b\x00\x00r1\x00\x00\x00\x00\r\x00', 0x1}) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f0000000740)) getgroups(0x0, &(0x7f00000003c0)) fchown(r0, 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x7c) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 01:15:55 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000000)={0x0, 0xa, 0x4, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eae3692d"}, 0x0, 0x0, @userptr, 0x4, 0x0, 0x2}) [ 176.044451][ T9929] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) 01:15:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) [ 176.118769][ T9929] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 176.236085][ T9929] attempt to access beyond end of device [ 176.328184][ T9929] loop1: rw=12288, want=8200, limit=20 [ 176.347807][ T9940] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 176.379197][ T9929] attempt to access beyond end of device [ 176.409048][ T9940] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 176.417511][ T9929] loop1: rw=12288, want=12296, limit=20 01:15:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) 01:15:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x4000) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x201, 0x0) dup2(r0, r1) [ 176.447677][ T9929] F2FS-fs (loop1): Failed to get valid F2FS checkpoint [ 176.466420][ T9940] attempt to access beyond end of device [ 176.515241][ T9940] loop3: rw=12288, want=8200, limit=20 [ 176.546356][ T9940] attempt to access beyond end of device [ 176.613720][ T9940] loop3: rw=12288, want=12296, limit=20 01:15:55 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20\x00', 0x0, 0x0) sync_file_range(r0, 0x0, 0x0, 0x3) [ 176.723121][ T9940] F2FS-fs (loop3): Failed to get valid F2FS checkpoint 01:15:55 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'sy\x17\xe9\x96\x1b\x00\x00r1\x00\x00\x00\x00\r\x00', 0x1}) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f0000000740)) getgroups(0x0, &(0x7f00000003c0)) fchown(r0, 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x7c) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 01:15:55 executing program 2: bind$rxrpc(0xffffffffffffffff, &(0x7f0000000780)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e23, 0x1, @ipv4={[], [], @broadcast}, 0x1e}}, 0x24) listen(0xffffffffffffffff, 0x2) listen(0xffffffffffffffff, 0x4000) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) statfs(0x0, &(0x7f0000000300)=""/38) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000100)=0x74, 0x4) geteuid() fstat(0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000440)=""/195) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000340)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x1017f) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r1, 0x40206417, &(0x7f00000006c0)={0x0, 0x9, 0x2, 0x0, 0x5}) 01:15:55 executing program 4: r0 = shmget$private(0x0, 0x600000, 0x0, &(0x7f0000a00000/0x600000)=nil) munmap(&(0x7f0000c00000/0x400000)=nil, 0x400000) shmat(r0, &(0x7f0000e80000/0x2000)=nil, 0x0) syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = syz_open_procfs(0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) ioctl$KVM_GET_ONE_REG(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000140)={0x5}) mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) 01:15:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x4000) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x201, 0x0) dup2(r0, r1) 01:15:56 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f00000000c0), 0x4) 01:15:56 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'sy\x17\xe9\x96\x1b\x00\x00r1\x00\x00\x00\x00\r\x00', 0x1}) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f0000000740)) getgroups(0x0, &(0x7f00000003c0)) fchown(r0, 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x7c) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 01:15:56 executing program 4: r0 = shmget$private(0x0, 0x600000, 0x0, &(0x7f0000a00000/0x600000)=nil) munmap(&(0x7f0000c00000/0x400000)=nil, 0x400000) shmat(r0, &(0x7f0000e80000/0x2000)=nil, 0x0) syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = syz_open_procfs(0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) ioctl$KVM_GET_ONE_REG(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000140)={0x5}) mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) [ 177.379348][ T9969] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 177.443041][ T9969] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock 01:15:56 executing program 4: r0 = shmget$private(0x0, 0x600000, 0x0, &(0x7f0000a00000/0x600000)=nil) munmap(&(0x7f0000c00000/0x400000)=nil, 0x400000) shmat(r0, &(0x7f0000e80000/0x2000)=nil, 0x0) syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = syz_open_procfs(0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) ioctl$KVM_GET_ONE_REG(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000140)={0x5}) mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) [ 177.502781][ T9988] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 177.528559][ T9988] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 177.536489][ T9969] attempt to access beyond end of device 01:15:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x4000) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x201, 0x0) dup2(r0, r1) [ 177.571361][ T9988] attempt to access beyond end of device [ 177.590064][ T9969] loop1: rw=12288, want=8200, limit=20 [ 177.597165][ T9988] loop3: rw=12288, want=8200, limit=20 [ 177.624425][ T9969] attempt to access beyond end of device [ 177.652372][ T9988] attempt to access beyond end of device 01:15:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x7f) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab", 0x4) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)="fe5bcc15add63afde2b786576521c17489e9e86ab36b92e56ab041dff7bbd6f40fce9dfb71fc53766789a72a7cbe4f2c30beb17888d1c728e6414b9eac4634e53b0f06360d4033d904000000149b61a9588b3d8f524cd980", 0x58}], 0x1}], 0x1, 0x0) recvmsg(r1, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b500)=""/153, 0x99}], 0x1}, 0x0) [ 177.670189][ T9969] loop1: rw=12288, want=12296, limit=20 [ 177.686691][ T9969] F2FS-fs (loop1): Failed to get valid F2FS checkpoint [ 177.692407][ T9988] loop3: rw=12288, want=12296, limit=20 [ 177.751832][ T9988] F2FS-fs (loop3): Failed to get valid F2FS checkpoint 01:15:56 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f0000000080)=""/121) 01:15:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x4000) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x201, 0x0) dup2(r0, r1) 01:15:57 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup(r0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 01:15:57 executing program 4: r0 = shmget$private(0x0, 0x600000, 0x0, &(0x7f0000a00000/0x600000)=nil) munmap(&(0x7f0000c00000/0x400000)=nil, 0x400000) shmat(r0, &(0x7f0000e80000/0x2000)=nil, 0x0) syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = syz_open_procfs(0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) ioctl$KVM_GET_ONE_REG(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000140)={0x5}) mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) 01:15:57 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000040)='./file0\x00', r1, r2) 01:15:57 executing program 5: r0 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x16, 0x0, r0, 0x0, 0x0) 01:15:57 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x3bd, 0x200007fd, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='hybla\x00', 0x6) sendmmsg$inet(r0, &(0x7f0000000b40)=[{{0x0, 0xfffffffffffffcfb, &(0x7f0000000200)=[{&(0x7f0000000100)="8cb08f70aca1f2e24e7dc4636db1607852800ad7239bfbb123065f68cd67943bc81a1d56defee801abbb295542689614ad3cf075062ecc8fff703998f05b4a75cd21c51a0cdf5c1d22ec6c88b2f328c35d2284ce373751008f2fe11265fc7b892d9211b9f2b8d60d65de6a11b376b8379dea0e24d9d54997f9b0c35fdbb691b6a85b1dd235877eaf2c6b56cdebc12feefdd198891969cc07ec80aa29bcc95a7fa0866e97a784c0ac21edab15d06cfb51b0f47e5f4404000000000000", 0xbc}, {&(0x7f0000000340)="4520d8c1ee8e08b9ee293229", 0x28c}], 0x2}}, {{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000500)='B', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000640)="6704848d55e654ad6f06f85d5c8caed968361a080c9a53252ca10c8e9f2257b4300eccf6f7e8f49e10382d24c8e304851ba9f674097b80c63dc396090a3762753a1400aba6fc2b7dcec89c4c03bb4f4a995e7f0d40", 0x55}], 0x1}}], 0x3, 0x40000) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x1472, 0x11, 0x0, 0x1d) 01:15:57 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x9, &(0x7f0000000180)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 01:15:57 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000040)={0x3, 0x0, 0x7}) 01:15:57 executing program 1: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) ftruncate(r0, 0x1045) io_submit(0x0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000001080)='d', 0x1}]) write$P9_RREAD(r0, &(0x7f0000000000)={0xb}, 0xb) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) [ 178.508236][ C0] [ 178.510597][ C0] ======================================================== [ 178.517771][ C0] WARNING: possible irq lock inversion dependency detected [ 178.524954][ C0] 5.3.0-rc4-next-20190814 #66 Not tainted [ 178.530651][ C0] -------------------------------------------------------- [ 178.538683][ C0] kworker/u4:0/7 just changed the state of lock: [ 178.545408][ C0] ffff88808843fb58 (&(&ctx->ctx_lock)->rlock){..-.}, at: free_ioctx_users+0x2d/0x490 [ 178.554865][ C0] but this lock took another, SOFTIRQ-unsafe lock in the past: [ 178.562386][ C0] (&fiq->waitq){+.+.} [ 178.562395][ C0] [ 178.562395][ C0] [ 178.562395][ C0] and interrupts could create inverse lock ordering between them. [ 178.562395][ C0] [ 178.582662][ C0] [ 178.582662][ C0] other info that might help us debug this: [ 178.590706][ C0] Possible interrupt unsafe locking scenario: [ 178.590706][ C0] [ 178.599007][ C0] CPU0 CPU1 [ 178.604355][ C0] ---- ---- [ 178.609700][ C0] lock(&fiq->waitq); [ 178.613754][ C0] local_irq_disable(); [ 178.620598][ C0] lock(&(&ctx->ctx_lock)->rlock); [ 178.628301][ C0] lock(&fiq->waitq); [ 178.634866][ C0] [ 178.638303][ C0] lock(&(&ctx->ctx_lock)->rlock); [ 178.643653][ C0] [ 178.643653][ C0] *** DEADLOCK *** [ 178.643653][ C0] [ 178.651787][ C0] 5 locks held by kworker/u4:0/7: [ 178.656786][ C0] #0: ffff888216018ba8 ((wq_completion)bat_events){+.+.}, at: process_one_work+0x88b/0x1740 [ 178.666940][ C0] #1: ffff8880a989fdc0 ((work_completion)(&(&bat_priv->nc.work)->work)){+.+.}, at: process_one_work+0x8c1/0x1740 [ 178.678908][ C0] #2: ffffffff88fa9a80 (rcu_read_lock){....}, at: batadv_nc_process_nc_paths.part.0+0xab/0x3c0 [ 178.689354][ C0] #3: ffffffff88fa99c0 (rcu_callback){....}, at: rcu_core+0x60e/0x1560 [ 178.697703][ C0] #4: ffffffff88fa9a00 (rcu_read_lock_sched){....}, at: percpu_ref_switch_to_atomic_rcu+0x20e/0x570 [ 178.708545][ C0] [ 178.708545][ C0] the shortest dependencies between 2nd lock and 1st lock: [ 178.719392][ C0] -> (&fiq->waitq){+.+.} { [ 178.723883][ C0] HARDIRQ-ON-W at: [ 178.727953][ C0] lock_acquire+0x190/0x410 [ 178.734265][ C0] _raw_spin_lock+0x2f/0x40 [ 178.740584][ C0] flush_bg_queue+0x1f3/0x3c0 [ 178.747073][ C0] fuse_request_queue_background+0x2f8/0x5a0 [ 178.754861][ C0] fuse_request_send_background+0x58/0x110 [ 178.763198][ C0] cuse_channel_open+0x5ba/0x830 [ 178.769949][ C0] misc_open+0x395/0x4c0 [ 178.775998][ C0] chrdev_open+0x245/0x6b0 [ 178.782233][ C0] do_dentry_open+0x4df/0x1250 [ 178.788821][ C0] vfs_open+0xa0/0xd0 [ 178.794616][ C0] path_openat+0x10e9/0x4630 [ 178.801018][ C0] do_filp_open+0x1a1/0x280 [ 178.807326][ C0] do_sys_open+0x3fe/0x5d0 [ 178.813568][ C0] __x64_sys_openat+0x9d/0x100 [ 178.820142][ C0] do_syscall_64+0xfa/0x760 [ 178.826459][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 178.834153][ C0] SOFTIRQ-ON-W at: [ 178.838213][ C0] lock_acquire+0x190/0x410 [ 178.844525][ C0] _raw_spin_lock+0x2f/0x40 [ 178.850840][ C0] flush_bg_queue+0x1f3/0x3c0 [ 178.857322][ C0] fuse_request_queue_background+0x2f8/0x5a0 [ 178.865111][ C0] fuse_request_send_background+0x58/0x110 [ 178.872732][ C0] cuse_channel_open+0x5ba/0x830 [ 178.879506][ C0] misc_open+0x395/0x4c0 [ 178.885556][ C0] chrdev_open+0x245/0x6b0 [ 178.891781][ C0] do_dentry_open+0x4df/0x1250 [ 178.898354][ C0] vfs_open+0xa0/0xd0 [ 178.904158][ C0] path_openat+0x10e9/0x4630 [ 178.910559][ C0] do_filp_open+0x1a1/0x280 [ 178.916869][ C0] do_sys_open+0x3fe/0x5d0 [ 178.923090][ C0] __x64_sys_openat+0x9d/0x100 [ 178.929680][ C0] do_syscall_64+0xfa/0x760 [ 178.935993][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 178.943694][ C0] INITIAL USE at: [ 178.947663][ C0] lock_acquire+0x190/0x410 [ 178.953887][ C0] _raw_spin_lock+0x2f/0x40 [ 178.960116][ C0] flush_bg_queue+0x1f3/0x3c0 [ 178.966513][ C0] fuse_request_queue_background+0x2f8/0x5a0 [ 178.974216][ C0] fuse_request_send_background+0x58/0x110 [ 178.981743][ C0] cuse_channel_open+0x5ba/0x830 [ 178.988401][ C0] misc_open+0x395/0x4c0 [ 178.994375][ C0] chrdev_open+0x245/0x6b0 [ 179.000529][ C0] do_dentry_open+0x4df/0x1250 [ 179.007017][ C0] vfs_open+0xa0/0xd0 [ 179.012725][ C0] path_openat+0x10e9/0x4630 [ 179.019037][ C0] do_filp_open+0x1a1/0x280 [ 179.025260][ C0] do_sys_open+0x3fe/0x5d0 [ 179.031397][ C0] __x64_sys_openat+0x9d/0x100 [ 179.037886][ C0] do_syscall_64+0xfa/0x760 [ 179.044112][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 179.051720][ C0] } [ 179.054321][ C0] ... key at: [] __key.45697+0x0/0x40 [ 179.061842][ C0] ... acquired at: [ 179.065733][ C0] _raw_spin_lock+0x2f/0x40 [ 179.070422][ C0] io_submit_one+0xefa/0x2ef0 [ 179.075284][ C0] __x64_sys_io_submit+0x1bd/0x570 [ 179.080558][ C0] do_syscall_64+0xfa/0x760 [ 179.085219][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 179.091289][ C0] [ 179.093605][ C0] -> (&(&ctx->ctx_lock)->rlock){..-.} { [ 179.099136][ C0] IN-SOFTIRQ-W at: [ 179.103109][ C0] lock_acquire+0x190/0x410 [ 179.109246][ C0] _raw_spin_lock_irq+0x60/0x80 [ 179.115733][ C0] free_ioctx_users+0x2d/0x490 [ 179.122131][ C0] percpu_ref_switch_to_atomic_rcu+0x4c0/0x570 [ 179.129922][ C0] rcu_core+0x581/0x1560 [ 179.135808][ C0] rcu_core_si+0x9/0x10 [ 179.141615][ C0] __do_softirq+0x262/0x98c [ 179.147757][ C0] irq_exit+0x19b/0x1e0 [ 179.153550][ C0] smp_apic_timer_interrupt+0x1a3/0x610 [ 179.160731][ C0] apic_timer_interrupt+0xf/0x20 [ 179.167303][ C0] debug_lockdep_rcu_enabled+0x71/0xa0 [ 179.174400][ C0] batadv_nc_process_nc_paths.part.0+0x220/0x3c0 [ 179.182364][ C0] batadv_nc_worker+0x5e4/0x760 [ 179.188851][ C0] process_one_work+0x9af/0x1740 [ 179.195422][ C0] worker_thread+0x98/0xe40 [ 179.201560][ C0] kthread+0x361/0x430 [ 179.207263][ C0] ret_from_fork+0x24/0x30 [ 179.213308][ C0] INITIAL USE at: [ 179.217192][ C0] lock_acquire+0x190/0x410 [ 179.223246][ C0] _raw_spin_lock_irq+0x60/0x80 [ 179.229650][ C0] io_submit_one+0xeb5/0x2ef0 [ 179.235874][ C0] __x64_sys_io_submit+0x1bd/0x570 [ 179.242534][ C0] do_syscall_64+0xfa/0x760 [ 179.248585][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 179.256019][ C0] } [ 179.258511][ C0] ... key at: [] __key.54228+0x0/0x40 [ 179.265942][ C0] ... acquired at: [ 179.269740][ C0] mark_lock+0x517/0x1220 [ 179.274226][ C0] __lock_acquire+0x1eaf/0x4e70 [ 179.279235][ C0] lock_acquire+0x190/0x410 [ 179.283895][ C0] _raw_spin_lock_irq+0x60/0x80 [ 179.288905][ C0] free_ioctx_users+0x2d/0x490 [ 179.293833][ C0] percpu_ref_switch_to_atomic_rcu+0x4c0/0x570 [ 179.300144][ C0] rcu_core+0x581/0x1560 [ 179.304543][ C0] rcu_core_si+0x9/0x10 [ 179.308858][ C0] __do_softirq+0x262/0x98c [ 179.313515][ C0] irq_exit+0x19b/0x1e0 [ 179.317828][ C0] smp_apic_timer_interrupt+0x1a3/0x610 [ 179.323534][ C0] apic_timer_interrupt+0xf/0x20 [ 179.328645][ C0] debug_lockdep_rcu_enabled+0x71/0xa0 [ 179.334264][ C0] batadv_nc_process_nc_paths.part.0+0x220/0x3c0 [ 179.340763][ C0] batadv_nc_worker+0x5e4/0x760 [ 179.345772][ C0] process_one_work+0x9af/0x1740 [ 179.350867][ C0] worker_thread+0x98/0xe40 [ 179.355528][ C0] kthread+0x361/0x430 [ 179.359839][ C0] ret_from_fork+0x24/0x30 [ 179.364402][ C0] [ 179.366708][ C0] [ 179.366708][ C0] stack backtrace: [ 179.372588][ C0] CPU: 0 PID: 7 Comm: kworker/u4:0 Not tainted 5.3.0-rc4-next-20190814 #66 [ 179.381149][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.391204][ C0] Workqueue: bat_events batadv_nc_worker [ 179.396815][ C0] Call Trace: [ 179.400092][ C0] [ 179.402939][ C0] dump_stack+0x172/0x1f0 [ 179.407262][ C0] print_irq_inversion_bug.part.0+0x2e4/0x2f1 [ 179.413318][ C0] check_usage_forwards.cold+0x20/0x29 [ 179.418764][ C0] ? check_usage_backwards+0x330/0x330 [ 179.424205][ C0] ? stack_trace_consume_entry+0x190/0x190 [ 179.430003][ C0] mark_lock+0x517/0x1220 [ 179.434319][ C0] ? check_usage_backwards+0x330/0x330 [ 179.439766][ C0] __lock_acquire+0x1eaf/0x4e70 [ 179.444604][ C0] ? __kasan_check_read+0x11/0x20 [ 179.449618][ C0] ? mark_lock+0xc2/0x1220 [ 179.454039][ C0] ? mark_held_locks+0xf0/0xf0 [ 179.458794][ C0] lock_acquire+0x190/0x410 [ 179.463287][ C0] ? free_ioctx_users+0x2d/0x490 [ 179.468211][ C0] _raw_spin_lock_irq+0x60/0x80 [ 179.473046][ C0] ? free_ioctx_users+0x2d/0x490 [ 179.477971][ C0] free_ioctx_users+0x2d/0x490 [ 179.482725][ C0] ? rcu_dynticks_curr_cpu_in_eqs+0x54/0xb0 [ 179.488608][ C0] percpu_ref_switch_to_atomic_rcu+0x4c0/0x570 [ 179.494748][ C0] ? percpu_ref_exit+0xd0/0xd0 [ 179.499494][ C0] rcu_core+0x581/0x1560 [ 179.503727][ C0] ? __rcu_read_unlock+0x6b0/0x6b0 [ 179.508827][ C0] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 179.514376][ C0] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 179.520361][ C0] rcu_core_si+0x9/0x10 [ 179.524503][ C0] __do_softirq+0x262/0x98c [ 179.528991][ C0] ? sched_clock_cpu+0x1b/0x1b0 [ 179.533827][ C0] irq_exit+0x19b/0x1e0 [ 179.538603][ C0] smp_apic_timer_interrupt+0x1a3/0x610 [ 179.545553][ C0] apic_timer_interrupt+0xf/0x20 [ 179.551365][ C0] [ 179.554295][ C0] RIP: 0010:debug_lockdep_rcu_enabled+0x71/0xa0 [ 179.560525][ C0] Code: ff df 48 89 c1 83 e0 07 48 c1 e9 03 83 c0 03 0f b6 14 11 38 d0 7c 04 84 d2 75 23 8b 05 cc e7 67 08 85 c0 74 07 e8 2f ff ff ff <5d> c3 31 c0 5d c3 48 c7 c7 70 41 c6 89 e8 9d 82 4e 00 eb a9 48 c7 [ 179.580115][ C0] RSP: 0018:ffff8880a989fc58 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 179.588510][ C0] RAX: 0000000000000001 RBX: ffff8880a0b1b708 RCX: 1ffffffff138ce4e [ 179.596476][ C0] RDX: 0000000000000000 RSI: ffffffff8724ec2b RDI: ffff8880a9890a54 [ 179.604429][ C0] RBP: ffff8880a989fc58 R08: ffff8880a98901c0 R09: ffffed1015d06ad5 [ 179.612385][ C0] R10: ffffed1015d06ad4 R11: ffff8880ae8356a3 R12: 0000000000000000 [ 179.620344][ C0] R13: ffff8880a7a6c500 R14: ffff88808bdc2000 R15: dffffc0000000000 [ 179.628317][ C0] ? batadv_nc_process_nc_paths.part.0+0x21b/0x3c0 [ 179.634829][ C0] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 179.640449][ C0] batadv_nc_process_nc_paths.part.0+0x220/0x3c0 [ 179.646762][ C0] ? batadv_nc_to_purge_nc_path_decoding+0x160/0x160 [ 179.653426][ C0] batadv_nc_worker+0x5e4/0x760 [ 179.658268][ C0] process_one_work+0x9af/0x1740 [ 179.663190][ C0] ? __schedule+0x776/0x17d0 [ 179.667765][ C0] ? pwq_dec_nr_in_flight+0x320/0x320 [ 179.673123][ C0] ? lock_acquire+0x190/0x410 [ 179.677790][ C0] worker_thread+0x98/0xe40 [ 179.682287][ C0] kthread+0x361/0x430 [ 179.686341][ C0] ? process_one_work+0x1740/0x1740 [ 179.691522][ C0] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 179.697767][ C0] ret_from_fork+0x24/0x30 01:15:58 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) syz_mount_image$erofs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000001c0)="25c788ba3061e4646fc390c0474aef34cc4a59003f2afb30437640724f12216100fa238e5ead1c536660632e8e683037a955a2e36ce61db32dc182c587ad75f0fa61ed4a5967955256fb9099e50fbb0d0aabd70c250527d12a64ef9c4b8842b992fcc596e0de7acd9784f9341f160c930830577f546acf15e050d0ffe1303bc19e", 0x81}], 0x0, 0x0) ioctl(r0, 0x100000c2604110, &(0x7f0000000040)="215d2c4b8c151316908868650907e4b4ab28e1f570ff07cbda756cff3d305db1010400000001") 01:15:58 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x3bd, 0x200007fd, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='hybla\x00', 0x6) sendmmsg$inet(r0, &(0x7f0000000b40)=[{{0x0, 0xfffffffffffffcfb, &(0x7f0000000200)=[{&(0x7f0000000100)="8cb08f70aca1f2e24e7dc4636db1607852800ad7239bfbb123065f68cd67943bc81a1d56defee801abbb295542689614ad3cf075062ecc8fff703998f05b4a75cd21c51a0cdf5c1d22ec6c88b2f328c35d2284ce373751008f2fe11265fc7b892d9211b9f2b8d60d65de6a11b376b8379dea0e24d9d54997f9b0c35fdbb691b6a85b1dd235877eaf2c6b56cdebc12feefdd198891969cc07ec80aa29bcc95a7fa0866e97a784c0ac21edab15d06cfb51b0f47e5f4404000000000000", 0xbc}, {&(0x7f0000000340)="4520d8c1ee8e08b9ee293229", 0x28c}], 0x2}}, {{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000500)='B', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000640)="6704848d55e654ad6f06f85d5c8caed968361a080c9a53252ca10c8e9f2257b4300eccf6f7e8f49e10382d24c8e304851ba9f674097b80c63dc396090a3762753a1400aba6fc2b7dcec89c4c03bb4f4a995e7f0d40", 0x55}], 0x1}}], 0x3, 0x40000) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x1472, 0x11, 0x0, 0x1d) 01:15:58 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000040)={0x3, 0x0, 0x7}) 01:15:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup(r0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) [ 179.713534][ T3895] kobject: 'loop0' (0000000061f4815a): kobject_uevent_env [ 179.733295][ T3895] kobject: 'loop0' (0000000061f4815a): fill_kobj_path: path = '/devices/virtual/block/loop0' 01:15:58 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x9, &(0x7f0000000180)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 179.785229][ T3895] kobject: 'loop1' (000000007a2b61a7): kobject_uevent_env [ 179.799529][T10049] kobject: 'loop0' (0000000061f4815a): kobject_uevent_env [ 179.806822][T10049] kobject: 'loop0' (0000000061f4815a): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 179.820162][ T3895] kobject: 'loop1' (000000007a2b61a7): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 179.833503][ T3895] kobject: 'loop3' (000000001b4a3d25): kobject_uevent_env [ 179.840900][ T3895] kobject: 'loop3' (000000001b4a3d25): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 179.848404][T10049] kobject: 'loop0' (0000000061f4815a): kobject_uevent_env [ 179.858279][T10049] kobject: 'loop0' (0000000061f4815a): fill_kobj_path: path = '/devices/virtual/block/loop0' 01:15:58 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) syz_mount_image$erofs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000001c0)="25c788ba3061e4646fc390c0474aef34cc4a59003f2afb30437640724f12216100fa238e5ead1c536660632e8e683037a955a2e36ce61db32dc182c587ad75f0fa61ed4a5967955256fb9099e50fbb0d0aabd70c250527d12a64ef9c4b8842b992fcc596e0de7acd9784f9341f160c930830577f546acf15e050d0ffe1303bc19e", 0x81}], 0x0, 0x0) ioctl(r0, 0x100000c2604110, &(0x7f0000000040)="215d2c4b8c151316908868650907e4b4ab28e1f570ff07cbda756cff3d305db1010400000001") [ 179.896906][ T3895] kobject: 'loop2' (0000000049adde0d): kobject_uevent_env 01:15:59 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000040)={0x3, 0x0, 0x7}) 01:15:59 executing program 1: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) ftruncate(r0, 0x1045) io_submit(0x0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000001080)='d', 0x1}]) write$P9_RREAD(r0, &(0x7f0000000000)={0xb}, 0xb) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) [ 179.955751][ T3895] kobject: 'loop2' (0000000049adde0d): fill_kobj_path: path = '/devices/virtual/block/loop2' 01:15:59 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000040)={0x3, 0x0, 0x7}) [ 180.001197][ T3895] kobject: 'loop5' (0000000034e358b6): kobject_uevent_env [ 180.017638][T10074] kobject: 'loop0' (0000000061f4815a): kobject_uevent_env [ 180.025530][T10074] kobject: 'loop0' (0000000061f4815a): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 180.038231][ T3895] kobject: 'loop5' (0000000034e358b6): fill_kobj_path: path = '/devices/virtual/block/loop5' 01:15:59 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup(r0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) [ 180.066299][ T3895] kobject: 'loop4' (000000008693d45d): kobject_uevent_env [ 180.073556][ T3895] kobject: 'loop4' (000000008693d45d): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 180.092906][ T3895] kobject: 'loop5' (0000000034e358b6): kobject_uevent_env [ 180.104509][ T3895] kobject: 'loop5' (0000000034e358b6): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 180.114927][T10074] kobject: 'loop0' (0000000061f4815a): kobject_uevent_env [ 180.136133][T10074] kobject: 'loop0' (0000000061f4815a): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 180.161761][ T3895] kobject: 'loop1' (000000007a2b61a7): kobject_uevent_env [ 180.168969][ T3895] kobject: 'loop1' (000000007a2b61a7): fill_kobj_path: path = '/devices/virtual/block/loop1' 01:15:59 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) ftruncate(r0, 0x1045) io_submit(0x0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000001080)='d', 0x1}]) write$P9_RREAD(r0, &(0x7f0000000000)={0xb}, 0xb) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) 01:15:59 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x9, &(0x7f0000000180)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 01:15:59 executing program 1: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) ftruncate(r0, 0x1045) io_submit(0x0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000001080)='d', 0x1}]) write$P9_RREAD(r0, &(0x7f0000000000)={0xb}, 0xb) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) [ 180.323869][ T3895] kobject: 'loop4' (000000008693d45d): kobject_uevent_env 01:15:59 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x3bd, 0x200007fd, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='hybla\x00', 0x6) sendmmsg$inet(r0, &(0x7f0000000b40)=[{{0x0, 0xfffffffffffffcfb, &(0x7f0000000200)=[{&(0x7f0000000100)="8cb08f70aca1f2e24e7dc4636db1607852800ad7239bfbb123065f68cd67943bc81a1d56defee801abbb295542689614ad3cf075062ecc8fff703998f05b4a75cd21c51a0cdf5c1d22ec6c88b2f328c35d2284ce373751008f2fe11265fc7b892d9211b9f2b8d60d65de6a11b376b8379dea0e24d9d54997f9b0c35fdbb691b6a85b1dd235877eaf2c6b56cdebc12feefdd198891969cc07ec80aa29bcc95a7fa0866e97a784c0ac21edab15d06cfb51b0f47e5f4404000000000000", 0xbc}, {&(0x7f0000000340)="4520d8c1ee8e08b9ee293229", 0x28c}], 0x2}}, {{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000500)='B', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000640)="6704848d55e654ad6f06f85d5c8caed968361a080c9a53252ca10c8e9f2257b4300eccf6f7e8f49e10382d24c8e304851ba9f674097b80c63dc396090a3762753a1400aba6fc2b7dcec89c4c03bb4f4a995e7f0d40", 0x55}], 0x1}}], 0x3, 0x40000) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x1472, 0x11, 0x0, 0x1d) 01:15:59 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) syz_mount_image$erofs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000001c0)="25c788ba3061e4646fc390c0474aef34cc4a59003f2afb30437640724f12216100fa238e5ead1c536660632e8e683037a955a2e36ce61db32dc182c587ad75f0fa61ed4a5967955256fb9099e50fbb0d0aabd70c250527d12a64ef9c4b8842b992fcc596e0de7acd9784f9341f160c930830577f546acf15e050d0ffe1303bc19e", 0x81}], 0x0, 0x0) ioctl(r0, 0x100000c2604110, &(0x7f0000000040)="215d2c4b8c151316908868650907e4b4ab28e1f570ff07cbda756cff3d305db1010400000001") [ 180.368258][ T3895] kobject: 'loop4' (000000008693d45d): fill_kobj_path: path = '/devices/virtual/block/loop4' 01:15:59 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x9, &(0x7f0000000180)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 180.463469][ T3895] kobject: 'loop3' (000000001b4a3d25): kobject_uevent_env 01:15:59 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup(r0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 01:15:59 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) ftruncate(r0, 0x1045) io_submit(0x0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000001080)='d', 0x1}]) write$P9_RREAD(r0, &(0x7f0000000000)={0xb}, 0xb) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) [ 180.518027][ T3895] kobject: 'loop3' (000000001b4a3d25): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 180.547227][T10106] kobject: 'loop0' (0000000061f4815a): kobject_uevent_env [ 180.554500][T10106] kobject: 'loop0' (0000000061f4815a): fill_kobj_path: path = '/devices/virtual/block/loop0' 01:15:59 executing program 4: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) ftruncate(r0, 0x1045) io_submit(0x0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000001080)='d', 0x1}]) write$P9_RREAD(r0, &(0x7f0000000000)={0xb}, 0xb) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) [ 180.589527][T10106] kobject: 'loop0' (0000000061f4815a): kobject_uevent_env [ 180.590202][ T3895] kobject: 'loop1' (000000007a2b61a7): kobject_uevent_env [ 180.596700][T10106] kobject: 'loop0' (0000000061f4815a): fill_kobj_path: path = '/devices/virtual/block/loop0' 01:15:59 executing program 1: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) ftruncate(r0, 0x1045) io_submit(0x0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000001080)='d', 0x1}]) write$P9_RREAD(r0, &(0x7f0000000000)={0xb}, 0xb) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) 01:15:59 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) ftruncate(r0, 0x1045) io_submit(0x0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000001080)='d', 0x1}]) write$P9_RREAD(r0, &(0x7f0000000000)={0xb}, 0xb) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) 01:15:59 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x3bd, 0x200007fd, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='hybla\x00', 0x6) sendmmsg$inet(r0, &(0x7f0000000b40)=[{{0x0, 0xfffffffffffffcfb, &(0x7f0000000200)=[{&(0x7f0000000100)="8cb08f70aca1f2e24e7dc4636db1607852800ad7239bfbb123065f68cd67943bc81a1d56defee801abbb295542689614ad3cf075062ecc8fff703998f05b4a75cd21c51a0cdf5c1d22ec6c88b2f328c35d2284ce373751008f2fe11265fc7b892d9211b9f2b8d60d65de6a11b376b8379dea0e24d9d54997f9b0c35fdbb691b6a85b1dd235877eaf2c6b56cdebc12feefdd198891969cc07ec80aa29bcc95a7fa0866e97a784c0ac21edab15d06cfb51b0f47e5f4404000000000000", 0xbc}, {&(0x7f0000000340)="4520d8c1ee8e08b9ee293229", 0x28c}], 0x2}}, {{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000500)='B', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000640)="6704848d55e654ad6f06f85d5c8caed968361a080c9a53252ca10c8e9f2257b4300eccf6f7e8f49e10382d24c8e304851ba9f674097b80c63dc396090a3762753a1400aba6fc2b7dcec89c4c03bb4f4a995e7f0d40", 0x55}], 0x1}}], 0x3, 0x40000) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x1472, 0x11, 0x0, 0x1d) 01:15:59 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) syz_mount_image$erofs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000001c0)="25c788ba3061e4646fc390c0474aef34cc4a59003f2afb30437640724f12216100fa238e5ead1c536660632e8e683037a955a2e36ce61db32dc182c587ad75f0fa61ed4a5967955256fb9099e50fbb0d0aabd70c250527d12a64ef9c4b8842b992fcc596e0de7acd9784f9341f160c930830577f546acf15e050d0ffe1303bc19e", 0x81}], 0x0, 0x0) ioctl(r0, 0x100000c2604110, &(0x7f0000000040)="215d2c4b8c151316908868650907e4b4ab28e1f570ff07cbda756cff3d305db1010400000001") [ 180.707304][ T3895] kobject: 'loop1' (000000007a2b61a7): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 180.769100][ T3895] kobject: 'loop2' (0000000049adde0d): kobject_uevent_env [ 180.776264][ T3895] kobject: 'loop2' (0000000049adde0d): fill_kobj_path: path = '/devices/virtual/block/loop2' 01:15:59 executing program 2: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) ftruncate(r0, 0x1045) io_submit(0x0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000001080)='d', 0x1}]) write$P9_RREAD(r0, &(0x7f0000000000)={0xb}, 0xb) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) [ 180.843090][T10125] kobject: 'loop0' (0000000061f4815a): kobject_uevent_env [ 180.850342][T10125] kobject: 'loop0' (0000000061f4815a): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 180.871563][T10125] kobject: 'loop0' (0000000061f4815a): kobject_uevent_env [ 180.878801][T10125] kobject: 'loop0' (0000000061f4815a): fill_kobj_path: path = '/devices/virtual/block/loop0' 01:15:59 executing program 1: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) ftruncate(r0, 0x1045) io_submit(0x0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000001080)='d', 0x1}]) write$P9_RREAD(r0, &(0x7f0000000000)={0xb}, 0xb) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) 01:15:59 executing program 4: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) ftruncate(r0, 0x1045) io_submit(0x0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000001080)='d', 0x1}]) write$P9_RREAD(r0, &(0x7f0000000000)={0xb}, 0xb) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) 01:15:59 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) syz_mount_image$erofs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000001c0)="25c788ba3061e4646fc390c0474aef34cc4a59003f2afb30437640724f12216100fa238e5ead1c536660632e8e683037a955a2e36ce61db32dc182c587ad75f0fa61ed4a5967955256fb9099e50fbb0d0aabd70c250527d12a64ef9c4b8842b992fcc596e0de7acd9784f9341f160c930830577f546acf15e050d0ffe1303bc19e", 0x81}], 0x0, 0x0) ioctl(r0, 0x100000c2604110, &(0x7f0000000040)="215d2c4b8c151316908868650907e4b4ab28e1f570ff07cbda756cff3d305db1010400000001") [ 180.891642][ T3895] kobject: 'loop5' (0000000034e358b6): kobject_uevent_env 01:15:59 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) syz_mount_image$erofs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000001c0)="25c788ba3061e4646fc390c0474aef34cc4a59003f2afb30437640724f12216100fa238e5ead1c536660632e8e683037a955a2e36ce61db32dc182c587ad75f0fa61ed4a5967955256fb9099e50fbb0d0aabd70c250527d12a64ef9c4b8842b992fcc596e0de7acd9784f9341f160c930830577f546acf15e050d0ffe1303bc19e", 0x81}], 0x0, 0x0) ioctl(r0, 0x100000c2604110, &(0x7f0000000040)="215d2c4b8c151316908868650907e4b4ab28e1f570ff07cbda756cff3d305db1010400000001") [ 180.966869][ T3895] kobject: 'loop5' (0000000034e358b6): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 181.000870][ T3895] kobject: 'loop4' (000000008693d45d): kobject_uevent_env 01:16:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup(r0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) [ 181.008019][ T3895] kobject: 'loop4' (000000008693d45d): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 181.018493][T10138] kobject: 'loop5' (0000000034e358b6): kobject_uevent_env [ 181.025710][T10138] kobject: 'loop5' (0000000034e358b6): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 181.050368][ T3895] kobject: 'loop1' (000000007a2b61a7): kobject_uevent_env 01:16:00 executing program 1: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) ftruncate(r0, 0x1045) io_submit(0x0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000001080)='d', 0x1}]) write$P9_RREAD(r0, &(0x7f0000000000)={0xb}, 0xb) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) 01:16:00 executing program 4: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) ftruncate(r0, 0x1045) io_submit(0x0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000001080)='d', 0x1}]) write$P9_RREAD(r0, &(0x7f0000000000)={0xb}, 0xb) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) 01:16:00 executing program 2: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) ftruncate(r0, 0x1045) io_submit(0x0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000001080)='d', 0x1}]) write$P9_RREAD(r0, &(0x7f0000000000)={0xb}, 0xb) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) [ 181.073783][ T3895] kobject: 'loop1' (000000007a2b61a7): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 181.085901][T10143] kobject: 'loop0' (0000000061f4815a): kobject_uevent_env [ 181.096401][T10143] kobject: 'loop0' (0000000061f4815a): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 181.102841][ T3895] kobject: 'loop5' (0000000034e358b6): kobject_uevent_env [ 181.122904][ T3895] kobject: 'loop5' (0000000034e358b6): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 181.149635][T10138] kobject: 'loop5' (0000000034e358b6): kobject_uevent_env [ 181.149906][ T3895] kobject: 'loop3' (000000001b4a3d25): kobject_uevent_env [ 181.156944][T10138] kobject: 'loop5' (0000000034e358b6): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 181.164812][ T3895] kobject: 'loop3' (000000001b4a3d25): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 181.222020][ T3895] kobject: 'loop2' (0000000049adde0d): kobject_uevent_env [ 181.229373][T10143] kobject: 'loop0' (0000000061f4815a): kobject_uevent_env [ 181.236638][T10143] kobject: 'loop0' (0000000061f4815a): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 181.251076][ T3895] kobject: 'loop2' (0000000049adde0d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 181.264140][ T3895] kobject: 'loop1' (000000007a2b61a7): kobject_uevent_env 01:16:00 executing program 1: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) ftruncate(r0, 0x1045) io_submit(0x0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000001080)='d', 0x1}]) write$P9_RREAD(r0, &(0x7f0000000000)={0xb}, 0xb) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) 01:16:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup(r0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) [ 181.297042][ T3895] kobject: 'loop1' (000000007a2b61a7): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 181.331478][ T3895] kobject: 'loop5' (0000000034e358b6): kobject_uevent_env 01:16:00 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) syz_mount_image$erofs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000001c0)="25c788ba3061e4646fc390c0474aef34cc4a59003f2afb30437640724f12216100fa238e5ead1c536660632e8e683037a955a2e36ce61db32dc182c587ad75f0fa61ed4a5967955256fb9099e50fbb0d0aabd70c250527d12a64ef9c4b8842b992fcc596e0de7acd9784f9341f160c930830577f546acf15e050d0ffe1303bc19e", 0x81}], 0x0, 0x0) ioctl(r0, 0x100000c2604110, &(0x7f0000000040)="215d2c4b8c151316908868650907e4b4ab28e1f570ff07cbda756cff3d305db1010400000001") 01:16:00 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) syz_mount_image$erofs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000001c0)="25c788ba3061e4646fc390c0474aef34cc4a59003f2afb30437640724f12216100fa238e5ead1c536660632e8e683037a955a2e36ce61db32dc182c587ad75f0fa61ed4a5967955256fb9099e50fbb0d0aabd70c250527d12a64ef9c4b8842b992fcc596e0de7acd9784f9341f160c930830577f546acf15e050d0ffe1303bc19e", 0x81}], 0x0, 0x0) ioctl(r0, 0x100000c2604110, &(0x7f0000000040)="215d2c4b8c151316908868650907e4b4ab28e1f570ff07cbda756cff3d305db1010400000001") [ 181.343995][ T3895] kobject: 'loop5' (0000000034e358b6): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 181.386492][ T3895] kobject: 'loop4' (000000008693d45d): kobject_uevent_env 01:16:00 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000040)={0x3, 0x0, 0x7}) [ 181.430813][ T3895] kobject: 'loop4' (000000008693d45d): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 181.434344][T10164] kobject: 'loop5' (0000000034e358b6): kobject_uevent_env 01:16:00 executing program 2: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) ftruncate(r0, 0x1045) io_submit(0x0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000001080)='d', 0x1}]) write$P9_RREAD(r0, &(0x7f0000000000)={0xb}, 0xb) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) 01:16:00 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1f, 0xb, 0x5c}}) [ 181.473090][T10164] kobject: 'loop5' (0000000034e358b6): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 181.508049][ T3895] kobject: 'loop1' (000000007a2b61a7): kobject_uevent_env [ 181.511970][T10167] kobject: 'loop0' (0000000061f4815a): kobject_uevent_env [ 181.523816][T10167] kobject: 'loop0' (0000000061f4815a): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 181.552539][ T3895] kobject: 'loop1' (000000007a2b61a7): fill_kobj_path: path = '/devices/virtual/block/loop1' 01:16:00 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000040)={0x3, 0x0, 0x7}) [ 181.579297][T10164] kobject: 'loop5' (0000000034e358b6): kobject_uevent_env [ 181.591653][ T3895] kobject: 'loop4' (000000008693d45d): kobject_uevent_env [ 181.597097][T10164] kobject: 'loop5' (0000000034e358b6): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 181.608218][ T3895] kobject: 'loop4' (000000008693d45d): fill_kobj_path: path = '/devices/virtual/block/loop4' 01:16:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000380)={0x0, 0xfdfdffff}) 01:16:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup(r0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) [ 181.648927][ T3895] kobject: 'loop2' (0000000049adde0d): kobject_uevent_env [ 181.664184][ T3895] kobject: 'loop2' (0000000049adde0d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 181.668363][T10167] kobject: 'loop0' (0000000061f4815a): kobject_uevent_env [ 181.684073][T10167] kobject: 'loop0' (0000000061f4815a): fill_kobj_path: path = '/devices/virtual/block/loop0' 01:16:00 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1f, 0xb, 0x5c}}) [ 181.685456][ T3895] kobject: 'loop5' (0000000034e358b6): kobject_uevent_env 01:16:00 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) syz_mount_image$erofs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000001c0)="25c788ba3061e4646fc390c0474aef34cc4a59003f2afb30437640724f12216100fa238e5ead1c536660632e8e683037a955a2e36ce61db32dc182c587ad75f0fa61ed4a5967955256fb9099e50fbb0d0aabd70c250527d12a64ef9c4b8842b992fcc596e0de7acd9784f9341f160c930830577f546acf15e050d0ffe1303bc19e", 0x81}], 0x0, 0x0) ioctl(r0, 0x100000c2604110, &(0x7f0000000040)="215d2c4b8c151316908868650907e4b4ab28e1f570ff07cbda756cff3d305db1010400000001") [ 181.743280][ T3895] kobject: 'loop5' (0000000034e358b6): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 181.744322][T10184] kobject: 'kvm' (00000000482e36bb): kobject_uevent_env 01:16:00 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) syz_mount_image$erofs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000001c0)="25c788ba3061e4646fc390c0474aef34cc4a59003f2afb30437640724f12216100fa238e5ead1c536660632e8e683037a955a2e36ce61db32dc182c587ad75f0fa61ed4a5967955256fb9099e50fbb0d0aabd70c250527d12a64ef9c4b8842b992fcc596e0de7acd9784f9341f160c930830577f546acf15e050d0ffe1303bc19e", 0x81}], 0x0, 0x0) ioctl(r0, 0x100000c2604110, &(0x7f0000000040)="215d2c4b8c151316908868650907e4b4ab28e1f570ff07cbda756cff3d305db1010400000001") 01:16:00 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000040)={0x3, 0x0, 0x7}) [ 181.801214][ T3895] kobject: 'loop1' (000000007a2b61a7): kobject_uevent_env [ 181.827860][T10184] kobject: 'kvm' (00000000482e36bb): fill_kobj_path: path = '/devices/virtual/misc/kvm' 01:16:00 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1f, 0xb, 0x5c}}) 01:16:00 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1f, 0xb, 0x5c}}) [ 181.846358][T10192] kobject: 'loop5' (0000000034e358b6): kobject_uevent_env [ 181.849787][ T3895] kobject: 'loop1' (000000007a2b61a7): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 181.859167][T10192] kobject: 'loop5' (0000000034e358b6): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 181.876525][T10183] kobject: 'kvm' (00000000482e36bb): kobject_uevent_env 01:16:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x12000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x6a) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f0000000180)=0x80000000001, 0x4) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RREMOVE(r1, &(0x7f0000000000)={0x7}, 0x7) recvmmsg(r0, &(0x7f00000001c0), 0x315, 0xea225aec34b1dd0e, 0x0) syz_genetlink_get_family_id$tipc(0x0) [ 181.918297][T10192] kobject: 'loop5' (0000000034e358b6): kobject_uevent_env [ 181.928266][T10192] kobject: 'loop5' (0000000034e358b6): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 181.928550][T10183] kobject: 'kvm' (00000000482e36bb): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 181.944495][ T3895] kobject: 'loop3' (000000001b4a3d25): kobject_uevent_env [ 181.958246][ T3895] kobject: 'loop3' (000000001b4a3d25): fill_kobj_path: path = '/devices/virtual/block/loop3' 01:16:01 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x11) ioctl$TCSETS(r0, 0x8924, 0x0) [ 181.975809][T10194] kobject: 'loop0' (0000000061f4815a): kobject_uevent_env [ 181.984499][T10194] kobject: 'loop0' (0000000061f4815a): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 181.999973][ T3895] kobject: 'loop5' (0000000034e358b6): kobject_uevent_env [ 182.019073][ T3895] kobject: 'loop5' (0000000034e358b6): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 182.040858][ T3895] kobject: 'loop2' (0000000049adde0d): kobject_uevent_env [ 182.048024][ T3895] kobject: 'loop2' (0000000049adde0d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 182.065880][T10209] kobject: 'slcan0' (000000003ee4e423): kobject_add_internal: parent: 'net', set: 'devices' 01:16:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x0) connect$ax25(0xffffffffffffffff, 0x0, 0x0) 01:16:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f088ca000300000000000063a377fbac141414e9", 0x0, 0x100}, 0x28) 01:16:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000380)={0x0, 0xfdfdffff}) [ 182.068479][T10194] kobject: 'loop0' (0000000061f4815a): kobject_uevent_env [ 182.083135][ T3895] kobject: 'loop4' (000000008693d45d): kobject_uevent_env [ 182.083166][ T3895] kobject: 'loop4' (000000008693d45d): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 182.093192][ T3895] kobject: 'loop5' (0000000034e358b6): kobject_uevent_env [ 182.135655][T10209] kobject: 'slcan0' (000000003ee4e423): kobject_uevent_env [ 182.141908][T10194] kobject: 'loop0' (0000000061f4815a): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 182.174368][ T3895] kobject: 'loop5' (0000000034e358b6): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 182.188583][T10215] kobject: 'kvm' (00000000482e36bb): kobject_uevent_env [ 182.203189][T10209] kobject: 'slcan0' (000000003ee4e423): fill_kobj_path: path = '/devices/virtual/net/slcan0' 01:16:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) [ 182.233043][ T3895] kobject: 'loop2' (0000000049adde0d): kobject_uevent_env [ 182.233618][ T5] kobject: '0000:0000:0000.0001' (00000000e3398cb5): kobject_add_internal: parent: 'uhid', set: 'devices' [ 182.251850][T10209] kobject: 'queues' (00000000c42eae79): kobject_add_internal: parent: 'slcan0', set: '' [ 182.268676][T10215] kobject: 'kvm' (00000000482e36bb): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 182.285510][ T5] kobject: '0000:0000:0000.0001' (00000000e3398cb5): kobject_uevent_env [ 182.289397][ T3895] kobject: 'loop2' (0000000049adde0d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 182.294093][T10209] kobject: 'queues' (00000000c42eae79): kobject_uevent_env [ 182.331772][ T5] kobject: '0000:0000:0000.0001' (00000000e3398cb5): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0001' [ 182.344788][T10209] kobject: 'queues' (00000000c42eae79): kobject_uevent_env: filter function caused the event to drop! [ 182.356161][T10213] kobject: 'kvm' (00000000482e36bb): kobject_uevent_env [ 182.360289][ T3895] kobject: 'loop4' (000000008693d45d): kobject_uevent_env [ 182.363809][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 01:16:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f088ca000300000000000063a377fbac141414e9", 0x0, 0x100}, 0x28) 01:16:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x12000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x6a) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f0000000180)=0x80000000001, 0x4) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RREMOVE(r1, &(0x7f0000000000)={0x7}, 0x7) recvmmsg(r0, &(0x7f00000001c0), 0x315, 0xea225aec34b1dd0e, 0x0) syz_genetlink_get_family_id$tipc(0x0) [ 182.389122][ T3895] kobject: 'loop4' (000000008693d45d): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 182.400214][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 182.406225][T10209] kobject: 'rx-0' (00000000ac5fcfea): kobject_add_internal: parent: 'queues', set: 'queues' [ 182.422804][ T3895] kobject: 'loop3' (000000001b4a3d25): kobject_uevent_env [ 182.424096][T10213] kobject: 'kvm' (00000000482e36bb): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 182.430070][ T3895] kobject: 'loop3' (000000001b4a3d25): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 182.445549][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 182.460263][T10209] kobject: 'rx-0' (00000000ac5fcfea): kobject_uevent_env [ 182.467629][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 182.475675][ T3895] kobject: 'loop0' (0000000061f4815a): kobject_uevent_env [ 182.481322][ T5] kobject: 'hidraw' (00000000bf460214): kobject_add_internal: parent: '0000:0000:0000.0001', set: '(null)' [ 182.494338][ T3895] kobject: 'loop0' (0000000061f4815a): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 182.508532][T10209] kobject: 'rx-0' (00000000ac5fcfea): fill_kobj_path: path = '/devices/virtual/net/slcan0/queues/rx-0' [ 182.529227][T10209] kobject: 'tx-0' (00000000153d8689): kobject_add_internal: parent: 'queues', set: 'queues' [ 182.532915][ T3895] kobject: 'loop5' (0000000034e358b6): kobject_uevent_env [ 182.543265][ T5] kobject: 'hidraw0' (0000000005dd1214): kobject_add_internal: parent: 'hidraw', set: 'devices' [ 182.602274][ T3895] kobject: 'loop5' (0000000034e358b6): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 182.628439][T10209] kobject: 'tx-0' (00000000153d8689): kobject_uevent_env [ 182.640930][ T3895] kobject: 'loop0' (0000000061f4815a): kobject_uevent_env [ 182.648343][ T5] kobject: 'hidraw0' (0000000005dd1214): kobject_uevent_env [ 182.656575][ T3895] kobject: 'loop0' (0000000061f4815a): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 182.680891][T10209] kobject: 'tx-0' (00000000153d8689): fill_kobj_path: path = '/devices/virtual/net/slcan0/queues/tx-0' [ 182.681224][ T3895] kobject: 'loop4' (000000008693d45d): kobject_uevent_env 01:16:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x12000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x6a) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f0000000180)=0x80000000001, 0x4) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RREMOVE(r1, &(0x7f0000000000)={0x7}, 0x7) recvmmsg(r0, &(0x7f00000001c0), 0x315, 0xea225aec34b1dd0e, 0x0) syz_genetlink_get_family_id$tipc(0x0) [ 182.692250][ T5] kobject: 'hidraw0' (0000000005dd1214): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0001/hidraw/hidraw0' [ 182.712547][ T3895] kobject: 'loop4' (000000008693d45d): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 182.735419][ T3895] kobject: 'loop5' (0000000034e358b6): kobject_uevent_env [ 182.745705][ T3895] kobject: 'loop5' (0000000034e358b6): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 182.757994][T10206] kobject: 'rx-0' (00000000ac5fcfea): kobject_cleanup, parent 00000000c42eae79 [ 182.775199][ T3895] kobject: 'loop3' (000000001b4a3d25): kobject_uevent_env [ 182.784271][T10206] kobject: 'rx-0' (00000000ac5fcfea): auto cleanup 'remove' event [ 182.797300][ T3895] kobject: 'loop3' (000000001b4a3d25): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 182.801678][ T5] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz1 [ 182.817574][ T5] kobject: '0000:0000:0000.0001' (00000000e3398cb5): kobject_uevent_env [ 182.821286][T10206] kobject: 'rx-0' (00000000ac5fcfea): kobject_uevent_env [ 182.828123][ T5] kobject: '0000:0000:0000.0001' (00000000e3398cb5): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0001' 01:16:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000380)={0x0, 0xfdfdffff}) [ 182.859334][T10216] kobject: 'hidraw0' (0000000005dd1214): kobject_uevent_env [ 182.863370][ T3895] kobject: 'loop4' (000000008693d45d): kobject_uevent_env [ 182.867128][T10216] kobject: 'hidraw0' (0000000005dd1214): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0001/hidraw/hidraw0' [ 182.893510][T10216] kobject: 'hidraw' (00000000bf460214): kobject_cleanup, parent 000000006aaf0cee [ 182.903379][T10216] kobject: 'hidraw' (00000000bf460214): calling ktype release [ 182.911128][T10206] kobject: 'rx-0' (00000000ac5fcfea): fill_kobj_path: path = '/devices/virtual/net/slcan0/queues/rx-0' [ 182.911820][T10216] kobject: 'hidraw': free name [ 182.928449][T10216] kobject: 'hidraw0' (0000000005dd1214): kobject_cleanup, parent 000000006aaf0cee [ 182.946537][T10216] kobject: 'hidraw0' (0000000005dd1214): calling ktype release [ 182.948219][ T3895] kobject: 'loop4' (000000008693d45d): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 182.954795][T10216] kobject: 'hidraw0': free name [ 182.979149][T10206] kobject: 'rx-0' (00000000ac5fcfea): auto cleanup kobject_del [ 183.000503][T10239] kobject: 'kvm' (00000000482e36bb): kobject_uevent_env [ 183.025395][ T5] kobject: '0000:0000:0000.0002' (00000000876f817b): kobject_add_internal: parent: 'uhid', set: 'devices' [ 183.028536][ T3895] kobject: 'loop5' (0000000034e358b6): kobject_uevent_env [ 183.038529][T10216] kobject: '0000:0000:0000.0001' (00000000e3398cb5): kobject_uevent_env [ 183.044385][T10239] kobject: 'kvm' (00000000482e36bb): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 183.055325][T10206] kobject: 'rx-0' (00000000ac5fcfea): calling ktype release [ 183.079658][ T5] kobject: '0000:0000:0000.0002' (00000000876f817b): kobject_uevent_env [ 183.101199][ T5] kobject: '0000:0000:0000.0002' (00000000876f817b): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0002' [ 183.113563][ T3895] kobject: 'loop5' (0000000034e358b6): fill_kobj_path: path = '/devices/virtual/block/loop5' 01:16:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x12000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x6a) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f0000000180)=0x80000000001, 0x4) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RREMOVE(r1, &(0x7f0000000000)={0x7}, 0x7) recvmmsg(r0, &(0x7f00000001c0), 0x315, 0xea225aec34b1dd0e, 0x0) syz_genetlink_get_family_id$tipc(0x0) [ 183.119122][T10216] kobject: '0000:0000:0000.0001' (00000000e3398cb5): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0001' [ 183.150069][T10206] kobject: 'rx-0': free name [ 183.163629][ T5] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.163921][ T3895] kobject: 'loop2' (0000000049adde0d): kobject_uevent_env [ 183.175745][T10206] kobject: 'tx-0' (00000000153d8689): kobject_cleanup, parent 00000000c42eae79 [ 183.185771][T10238] kobject: 'kvm' (00000000482e36bb): kobject_uevent_env [ 183.192542][T10216] kobject: '0000:0000:0000.0001' (00000000e3398cb5): kobject_uevent_env [ 183.207078][ T5] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.212779][T10238] kobject: 'kvm' (00000000482e36bb): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 183.215614][T10206] kobject: 'tx-0' (00000000153d8689): auto cleanup 'remove' event [ 183.235347][ T3895] kobject: 'loop2' (0000000049adde0d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 183.237036][ T5] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.260525][T10216] kobject: '0000:0000:0000.0001' (00000000e3398cb5): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0001' [ 183.276218][T10216] kobject: '0000:0000:0000.0001' (00000000e3398cb5): kobject_cleanup, parent 000000006aaf0cee [ 183.294369][T10206] kobject: 'tx-0' (00000000153d8689): kobject_uevent_env [ 183.301757][ T5] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 183.310683][ T3895] kobject: 'loop1' (000000007a2b61a7): kobject_uevent_env [ 183.317824][ T3895] kobject: 'loop1' (000000007a2b61a7): fill_kobj_path: path = '/devices/virtual/block/loop1' 01:16:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000002c0)) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000380)={0x0, 0xfdfdffff}) [ 183.343450][ T5] kobject: 'hidraw' (00000000d9ae18e3): kobject_add_internal: parent: '0000:0000:0000.0002', set: '(null)' [ 183.360544][T10216] kobject: '0000:0000:0000.0001' (00000000e3398cb5): calling ktype release [ 183.373762][T10206] kobject: 'tx-0' (00000000153d8689): fill_kobj_path: path = '/devices/virtual/net/slcan0/queues/tx-0' [ 183.385446][ T3895] kobject: 'loop3' (000000001b4a3d25): kobject_uevent_env [ 183.395824][T10216] kobject: '0000:0000:0000.0001': free name [ 183.401107][ T5] kobject: 'hidraw0' (000000003abefd25): kobject_add_internal: parent: 'hidraw', set: 'devices' [ 183.415605][T10206] kobject: 'tx-0' (00000000153d8689): auto cleanup kobject_del [ 183.424825][ T5] kobject: 'hidraw0' (000000003abefd25): kobject_uevent_env [ 183.430651][ T3895] kobject: 'loop3' (000000001b4a3d25): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 183.435196][T10206] kobject: 'tx-0' (00000000153d8689): calling ktype release [ 183.457009][ T5] kobject: 'hidraw0' (000000003abefd25): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0002/hidraw/hidraw0' [ 183.458329][T10206] kobject: 'tx-0': free name [ 183.477607][T10250] kobject: 'kvm' (00000000482e36bb): kobject_uevent_env [ 183.484848][ T5] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz1 01:16:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f088ca000300000000000063a377fbac141414e9", 0x0, 0x100}, 0x28) [ 183.484893][ T3895] kobject: 'loop2' (0000000049adde0d): kobject_uevent_env [ 183.497538][T10250] kobject: 'kvm' (00000000482e36bb): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 183.504782][T10206] kobject: 'queues' (00000000c42eae79): kobject_cleanup, parent 000000006aaf0cee [ 183.522342][ T3895] kobject: 'loop2' (0000000049adde0d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 183.525119][ T5] kobject: '0000:0000:0000.0002' (00000000876f817b): kobject_uevent_env [ 183.532825][T10206] kobject: 'queues' (00000000c42eae79): calling ktype release [ 183.558634][ T3895] kobject: 'loop3' (000000001b4a3d25): kobject_uevent_env [ 183.574432][T10206] kobject: 'queues' (00000000c42eae79): kset_release [ 183.583844][ T3895] kobject: 'loop3' (000000001b4a3d25): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 183.587171][ T5] kobject: '0000:0000:0000.0002' (00000000876f817b): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0002' [ 183.607346][T10206] kobject: 'queues': free name [ 183.622168][T10240] kobject: 'hidraw0' (000000003abefd25): kobject_uevent_env [ 183.632879][T10249] kobject: 'kvm' (00000000482e36bb): kobject_uevent_env [ 183.640024][T10240] kobject: 'hidraw0' (000000003abefd25): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0002/hidraw/hidraw0' [ 183.640257][T10206] kobject: 'slcan0' (000000003ee4e423): kobject_uevent_env [ 183.653762][T10249] kobject: 'kvm' (00000000482e36bb): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 183.670827][ T3895] kobject: 'loop1' (000000007a2b61a7): kobject_uevent_env [ 183.671010][T10240] kobject: 'hidraw' (00000000d9ae18e3): kobject_cleanup, parent 000000006aaf0cee [ 183.689138][ T3895] kobject: 'loop1' (000000007a2b61a7): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 183.698241][T10240] kobject: 'hidraw' (00000000d9ae18e3): calling ktype release [ 183.706850][T10240] kobject: 'hidraw': free name [ 183.709381][T10206] kobject: 'slcan0' (000000003ee4e423): fill_kobj_path: path = '/devices/virtual/net/slcan0' [ 183.727775][T10240] kobject: 'hidraw0' (000000003abefd25): kobject_cleanup, parent 000000006aaf0cee [ 183.730518][ T3895] kobject: 'loop3' (000000001b4a3d25): kobject_uevent_env [ 183.758652][T10240] kobject: 'hidraw0' (000000003abefd25): calling ktype release [ 183.759378][ T3895] kobject: 'loop3' (000000001b4a3d25): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 183.774125][T10240] kobject: 'hidraw0': free name [ 183.798685][T10206] kobject: 'slcan0' (000000003ee4e423): kobject_cleanup, parent 000000006aaf0cee [ 183.841983][ T3895] kobject: 'loop2' (0000000049adde0d): kobject_uevent_env [ 183.849563][T10240] kobject: '0000:0000:0000.0002' (00000000876f817b): kobject_uevent_env [ 183.858391][T10206] kobject: 'slcan0' (000000003ee4e423): calling ktype release [ 183.873290][ T3895] kobject: 'loop2' (0000000049adde0d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 183.881552][T10240] kobject: '0000:0000:0000.0002' (00000000876f817b): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0002' [ 183.896925][T10206] kobject: 'slcan0': free name [ 183.900695][T10240] kobject: '0000:0000:0000.0002' (00000000876f817b): kobject_uevent_env [ 183.904090][T10209] kobject: 'slcan0' (0000000054f85a52): kobject_add_internal: parent: 'net', set: 'devices' [ 183.912975][T10240] kobject: '0000:0000:0000.0002' (00000000876f817b): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0002' [ 184.014162][T10240] kobject: '0000:0000:0000.0002' (00000000876f817b): kobject_cleanup, parent 000000006aaf0cee [ 184.088274][T10240] kobject: '0000:0000:0000.0002' (00000000876f817b): calling ktype release [ 184.098064][T10209] kobject: 'slcan0' (0000000054f85a52): kobject_uevent_env [ 184.122494][T10209] kobject: 'slcan0' (0000000054f85a52): fill_kobj_path: path = '/devices/virtual/net/slcan0' [ 184.138420][T10240] kobject: '0000:0000:0000.0002': free name [ 184.222325][T10209] kobject: 'queues' (00000000dc4ad4f8): kobject_add_internal: parent: 'slcan0', set: '' [ 184.306192][T10209] kobject: 'queues' (00000000dc4ad4f8): kobject_uevent_env [ 184.316979][ T3895] kobject: 'loop5' (0000000034e358b6): kobject_uevent_env [ 184.348217][T10209] kobject: 'queues' (00000000dc4ad4f8): kobject_uevent_env: filter function caused the event to drop! [ 184.359909][ T3895] kobject: 'loop5' (0000000034e358b6): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 184.393241][T10209] kobject: 'rx-0' (0000000041c13395): kobject_add_internal: parent: 'queues', set: 'queues' [ 184.422523][T10209] kobject: 'rx-0' (0000000041c13395): kobject_uevent_env [ 184.450159][T10209] kobject: 'rx-0' (0000000041c13395): fill_kobj_path: path = '/devices/virtual/net/slcan0/queues/rx-0' [ 184.510949][T10209] kobject: 'tx-0' (0000000022968b57): kobject_add_internal: parent: 'queues', set: 'queues' [ 184.573269][T10209] kobject: 'tx-0' (0000000022968b57): kobject_uevent_env [ 184.620692][T10209] kobject: 'tx-0' (0000000022968b57): fill_kobj_path: path = '/devices/virtual/net/slcan0/queues/tx-0' [ 184.705060][T10209] kobject: 'rx-0' (0000000041c13395): kobject_cleanup, parent 00000000dc4ad4f8 [ 184.747071][T10209] kobject: 'rx-0' (0000000041c13395): auto cleanup 'remove' event [ 184.791553][T10209] kobject: 'rx-0' (0000000041c13395): kobject_uevent_env [ 184.824915][T10209] kobject: 'rx-0' (0000000041c13395): fill_kobj_path: path = '/devices/virtual/net/slcan0/queues/rx-0' [ 184.876144][T10209] kobject: 'rx-0' (0000000041c13395): auto cleanup kobject_del [ 184.908933][T10209] kobject: 'rx-0' (0000000041c13395): calling ktype release [ 184.916314][T10209] kobject: 'rx-0': free name [ 184.937428][T10209] kobject: 'tx-0' (0000000022968b57): kobject_cleanup, parent 00000000dc4ad4f8 [ 184.957532][T10209] kobject: 'tx-0' (0000000022968b57): auto cleanup 'remove' event [ 184.988201][T10209] kobject: 'tx-0' (0000000022968b57): kobject_uevent_env [ 184.995888][T10209] kobject: 'tx-0' (0000000022968b57): fill_kobj_path: path = '/devices/virtual/net/slcan0/queues/tx-0' [ 185.048375][T10209] kobject: 'tx-0' (0000000022968b57): auto cleanup kobject_del [ 185.056009][T10209] kobject: 'tx-0' (0000000022968b57): calling ktype release [ 185.088539][T10209] kobject: 'tx-0': free name [ 185.115094][T10209] kobject: 'queues' (00000000dc4ad4f8): kobject_cleanup, parent 000000006aaf0cee [ 185.160913][T10209] kobject: 'queues' (00000000dc4ad4f8): calling ktype release [ 185.178292][T10209] kobject: 'queues' (00000000dc4ad4f8): kset_release [ 185.184986][T10209] kobject: 'queues': free name [ 185.198551][T10209] kobject: 'slcan0' (0000000054f85a52): kobject_uevent_env [ 185.205784][T10209] kobject: 'slcan0' (0000000054f85a52): fill_kobj_path: path = '/devices/virtual/net/slcan0' [ 185.281316][T10209] kobject: 'slcan0' (0000000054f85a52): kobject_cleanup, parent 000000006aaf0cee 01:16:04 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x11) ioctl$TCSETS(r0, 0x8924, 0x0) 01:16:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x12000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x6a) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f0000000180)=0x80000000001, 0x4) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RREMOVE(r1, &(0x7f0000000000)={0x7}, 0x7) recvmmsg(r0, &(0x7f00000001c0), 0x315, 0xea225aec34b1dd0e, 0x0) syz_genetlink_get_family_id$tipc(0x0) 01:16:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 01:16:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 01:16:04 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f088ca000300000000000063a377fbac141414e9", 0x0, 0x100}, 0x28) 01:16:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x0) connect$ax25(0xffffffffffffffff, 0x0, 0x0) [ 185.324498][T10209] kobject: 'slcan0' (0000000054f85a52): calling ktype release [ 185.361002][T10209] kobject: 'slcan0': free name [ 185.456342][ T3895] kobject: 'loop4' (000000008693d45d): kobject_uevent_env [ 185.486394][ T3895] kobject: 'loop4' (000000008693d45d): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 185.493088][ T5] kobject: '0000:0000:0000.0003' (000000002af94b6e): kobject_add_internal: parent: 'uhid', set: 'devices' [ 185.558270][T10342] kobject: 'slcan0' (0000000049a378c3): kobject_add_internal: parent: 'net', set: 'devices' [ 185.564085][ T5] kobject: '0000:0000:0000.0003' (000000002af94b6e): kobject_uevent_env 01:16:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 01:16:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) [ 185.673124][T10342] kobject: 'slcan0' (0000000049a378c3): kobject_uevent_env [ 185.680685][ T5] kobject: '0000:0000:0000.0003' (000000002af94b6e): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0003' [ 185.701492][ T3895] kobject: 'loop2' (0000000049adde0d): kobject_uevent_env [ 185.725458][ T3895] kobject: 'loop2' (0000000049adde0d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 185.764631][T10342] kobject: 'slcan0' (0000000049a378c3): fill_kobj_path: path = '/devices/virtual/net/slcan0' [ 185.794355][ T5] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 185.823579][T10342] kobject: 'queues' (00000000a79642be): kobject_add_internal: parent: 'slcan0', set: '' 01:16:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x12000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x6a) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f0000000180)=0x80000000001, 0x4) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RREMOVE(r1, &(0x7f0000000000)={0x7}, 0x7) recvmmsg(r0, &(0x7f00000001c0), 0x315, 0xea225aec34b1dd0e, 0x0) syz_genetlink_get_family_id$tipc(0x0) [ 185.849155][ T3895] kobject: 'loop0' (0000000061f4815a): kobject_uevent_env [ 185.868077][ T5] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 185.902024][T10342] kobject: 'queues' (00000000a79642be): kobject_uevent_env [ 185.912843][ T3895] kobject: 'loop0' (0000000061f4815a): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 185.927153][ T5] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 185.945550][T10342] kobject: 'queues' (00000000a79642be): kobject_uevent_env: filter function caused the event to drop! [ 185.982818][ T3895] kobject: 'loop3' (000000001b4a3d25): kobject_uevent_env [ 185.986301][ T5] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 186.025681][T10342] kobject: 'rx-0' (0000000032a40303): kobject_add_internal: parent: 'queues', set: 'queues' [ 186.029701][ T5] kobject: 'hidraw' (0000000098483644): kobject_add_internal: parent: '0000:0000:0000.0003', set: '(null)' [ 186.040958][ T3895] kobject: 'loop3' (000000001b4a3d25): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 186.119281][T10342] kobject: 'rx-0' (0000000032a40303): kobject_uevent_env [ 186.160567][ T5] kobject: 'hidraw0' (00000000cfa2366f): kobject_add_internal: parent: 'hidraw', set: 'devices' [ 186.172841][T10342] kobject: 'rx-0' (0000000032a40303): fill_kobj_path: path = '/devices/virtual/net/slcan0/queues/rx-0' [ 186.242311][ T5] kobject: 'hidraw0' (00000000cfa2366f): kobject_uevent_env [ 186.287584][ T5] kobject: 'hidraw0' (00000000cfa2366f): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0003/hidraw/hidraw0' [ 186.343617][T10342] kobject: 'tx-0' (00000000026f3003): kobject_add_internal: parent: 'queues', set: 'queues' [ 186.357994][ T5] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz1] on syz1 [ 186.383303][T10342] kobject: 'tx-0' (00000000026f3003): kobject_uevent_env 01:16:05 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x11) ioctl$TCSETS(r0, 0x8924, 0x0) [ 186.395562][ T5] kobject: '0000:0000:0000.0003' (000000002af94b6e): kobject_uevent_env [ 186.410375][T10342] kobject: 'tx-0' (00000000026f3003): fill_kobj_path: path = '/devices/virtual/net/slcan0/queues/tx-0' [ 186.434199][ T3895] kobject: 'loop1' (000000007a2b61a7): kobject_uevent_env [ 186.435294][ T5] kobject: '0000:0000:0000.0003' (000000002af94b6e): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0003' [ 186.461427][ T3895] kobject: 'loop1' (000000007a2b61a7): fill_kobj_path: path = '/devices/virtual/block/loop1' 01:16:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x12000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x6a) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f0000000180)=0x80000000001, 0x4) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RREMOVE(r1, &(0x7f0000000000)={0x7}, 0x7) recvmmsg(r0, &(0x7f00000001c0), 0x315, 0xea225aec34b1dd0e, 0x0) syz_genetlink_get_family_id$tipc(0x0) 01:16:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) [ 186.496083][T10340] kobject: 'hidraw0' (00000000cfa2366f): kobject_uevent_env [ 186.505645][T10347] kobject: 'rx-0' (0000000032a40303): kobject_cleanup, parent 00000000a79642be [ 186.519188][T10340] kobject: 'hidraw0' (00000000cfa2366f): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0003/hidraw/hidraw0' [ 186.576334][T10347] kobject: 'rx-0' (0000000032a40303): auto cleanup 'remove' event [ 186.587494][ T3895] kobject: 'loop3' (000000001b4a3d25): kobject_uevent_env [ 186.591562][T10340] kobject: 'hidraw' (0000000098483644): kobject_cleanup, parent 000000006aaf0cee [ 186.601331][ T3895] kobject: 'loop3' (000000001b4a3d25): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 186.624176][T10347] kobject: 'rx-0' (0000000032a40303): kobject_uevent_env [ 186.636713][T10340] kobject: 'hidraw' (0000000098483644): calling ktype release [ 186.652093][ T3895] kobject: 'loop2' (0000000049adde0d): kobject_uevent_env [ 186.655118][T10340] kobject: 'hidraw': free name [ 186.680829][T10347] kobject: 'rx-0' (0000000032a40303): fill_kobj_path: path = '/devices/virtual/net/slcan0/queues/rx-0' [ 186.681086][ T3895] kobject: 'loop2' (0000000049adde0d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 186.692417][T10340] kobject: 'hidraw0' (00000000cfa2366f): kobject_cleanup, parent 000000006aaf0cee [ 186.720555][T10347] kobject: 'rx-0' (0000000032a40303): auto cleanup kobject_del [ 186.737120][T10340] kobject: 'hidraw0' (00000000cfa2366f): calling ktype release [ 186.750452][T10347] kobject: 'rx-0' (0000000032a40303): calling ktype release [ 186.774954][T10340] kobject: 'hidraw0': free name [ 186.779937][ T3895] kobject: 'loop0' (0000000061f4815a): kobject_uevent_env [ 186.784501][T10347] kobject: 'rx-0': free name [ 186.794088][ T3895] kobject: 'loop0' (0000000061f4815a): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 186.796974][T10340] kobject: '0000:0000:0000.0003' (000000002af94b6e): kobject_uevent_env [ 186.822262][T10347] kobject: 'tx-0' (00000000026f3003): kobject_cleanup, parent 00000000a79642be [ 186.844507][T10340] kobject: '0000:0000:0000.0003' (000000002af94b6e): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0003' [ 186.888562][T10347] kobject: 'tx-0' (00000000026f3003): auto cleanup 'remove' event [ 186.918004][T10340] kobject: '0000:0000:0000.0003' (000000002af94b6e): kobject_uevent_env [ 186.926611][T10347] kobject: 'tx-0' (00000000026f3003): kobject_uevent_env [ 186.961861][T10340] kobject: '0000:0000:0000.0003' (000000002af94b6e): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0003' [ 186.976156][ T3895] kobject: 'loop3' (000000001b4a3d25): kobject_uevent_env [ 186.989750][ T3895] kobject: 'loop3' (000000001b4a3d25): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 187.002956][T10347] kobject: 'tx-0' (00000000026f3003): fill_kobj_path: path = '/devices/virtual/net/slcan0/queues/tx-0' [ 187.027868][T10340] kobject: '0000:0000:0000.0003' (000000002af94b6e): kobject_cleanup, parent 000000006aaf0cee [ 187.046757][T10347] kobject: 'tx-0' (00000000026f3003): auto cleanup kobject_del [ 187.071060][T10340] kobject: '0000:0000:0000.0003' (000000002af94b6e): calling ktype release [ 187.087199][T10347] kobject: 'tx-0' (00000000026f3003): calling ktype release [ 187.103580][T10347] kobject: 'tx-0': free name [ 187.104322][T10340] kobject: '0000:0000:0000.0003': free name [ 187.113855][T10347] kobject: 'queues' (00000000a79642be): kobject_cleanup, parent 000000006aaf0cee [ 187.135701][T10347] kobject: 'queues' (00000000a79642be): calling ktype release [ 187.154500][T10347] kobject: 'queues' (00000000a79642be): kset_release [ 187.168688][T10347] kobject: 'queues': free name [ 187.173808][T10347] kobject: 'slcan0' (0000000049a378c3): kobject_uevent_env [ 187.181962][ T3895] kobject: 'loop5' (0000000034e358b6): kobject_uevent_env [ 187.192623][ T3895] kobject: 'loop5' (0000000034e358b6): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 187.203448][T10347] kobject: 'slcan0' (0000000049a378c3): fill_kobj_path: path = '/devices/virtual/net/slcan0' [ 187.224690][T10374] kobject: 'slcan1' (00000000083c21e3): kobject_add_internal: parent: 'net', set: 'devices' [ 187.244586][T10374] kobject: 'slcan1' (00000000083c21e3): kobject_uevent_env [ 187.259498][T10374] kobject: 'slcan1' (00000000083c21e3): fill_kobj_path: path = '/devices/virtual/net/slcan1' [ 187.305523][T10374] kobject: 'queues' (00000000ba9957ec): kobject_add_internal: parent: 'slcan1', set: '' [ 187.357222][T10374] kobject: 'queues' (00000000ba9957ec): kobject_uevent_env [ 187.380706][T10374] kobject: 'queues' (00000000ba9957ec): kobject_uevent_env: filter function caused the event to drop! [ 187.410060][T10374] kobject: 'rx-0' (00000000e179d2d4): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.428375][T10374] kobject: 'rx-0' (00000000e179d2d4): kobject_uevent_env [ 187.435665][T10374] kobject: 'rx-0' (00000000e179d2d4): fill_kobj_path: path = '/devices/virtual/net/slcan1/queues/rx-0' [ 187.450199][T10374] kobject: 'tx-0' (0000000029b0cf01): kobject_add_internal: parent: 'queues', set: 'queues' [ 187.460566][T10374] kobject: 'tx-0' (0000000029b0cf01): kobject_uevent_env [ 187.467671][T10374] kobject: 'tx-0' (0000000029b0cf01): fill_kobj_path: path = '/devices/virtual/net/slcan1/queues/tx-0' [ 187.490957][T10374] kobject: 'rx-0' (00000000e179d2d4): kobject_cleanup, parent 00000000ba9957ec [ 187.510533][T10374] kobject: 'rx-0' (00000000e179d2d4): auto cleanup 'remove' event [ 187.524326][T10374] kobject: 'rx-0' (00000000e179d2d4): kobject_uevent_env [ 187.545913][T10374] kobject: 'rx-0' (00000000e179d2d4): fill_kobj_path: path = '/devices/virtual/net/slcan1/queues/rx-0' [ 187.577171][T10374] kobject: 'rx-0' (00000000e179d2d4): auto cleanup kobject_del [ 187.601468][T10374] kobject: 'rx-0' (00000000e179d2d4): calling ktype release [ 187.620455][T10374] kobject: 'rx-0': free name [ 187.628369][T10374] kobject: 'tx-0' (0000000029b0cf01): kobject_cleanup, parent 00000000ba9957ec [ 187.648209][T10374] kobject: 'tx-0' (0000000029b0cf01): auto cleanup 'remove' event [ 187.656076][T10374] kobject: 'tx-0' (0000000029b0cf01): kobject_uevent_env [ 187.678308][T10374] kobject: 'tx-0' (0000000029b0cf01): fill_kobj_path: path = '/devices/virtual/net/slcan1/queues/tx-0' [ 187.709265][T10374] kobject: 'tx-0' (0000000029b0cf01): auto cleanup kobject_del [ 187.716833][T10374] kobject: 'tx-0' (0000000029b0cf01): calling ktype release [ 187.750239][T10374] kobject: 'tx-0': free name [ 187.763430][T10374] kobject: 'queues' (00000000ba9957ec): kobject_cleanup, parent 000000006aaf0cee [ 187.790326][T10374] kobject: 'queues' (00000000ba9957ec): calling ktype release [ 187.810301][T10374] kobject: 'queues' (00000000ba9957ec): kset_release [ 187.828277][T10374] kobject: 'queues': free name [ 187.833504][T10374] kobject: 'slcan1' (00000000083c21e3): kobject_uevent_env [ 187.848017][T10374] kobject: 'slcan1' (00000000083c21e3): fill_kobj_path: path = '/devices/virtual/net/slcan1' [ 187.863042][T10347] kobject: 'slcan0' (0000000049a378c3): kobject_cleanup, parent 000000006aaf0cee [ 187.874551][T10347] kobject: 'slcan0' (0000000049a378c3): calling ktype release [ 187.888315][T10374] kobject: 'slcan1' (00000000083c21e3): kobject_cleanup, parent 000000006aaf0cee [ 187.901968][T10374] kobject: 'slcan1' (00000000083c21e3): calling ktype release [ 187.910743][ T3895] kobject: 'loop2' (0000000049adde0d): kobject_uevent_env [ 187.917893][ T3895] kobject: 'loop2' (0000000049adde0d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 187.928359][T10347] kobject: 'slcan0': free name [ 187.959361][T10374] kobject: 'slcan1': free name 01:16:07 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x11) ioctl$TCSETS(r0, 0x8924, 0x0) 01:16:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 01:16:07 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x11) ioctl$TCSETS(r0, 0x8924, 0x0) 01:16:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x0) connect$ax25(0xffffffffffffffff, 0x0, 0x0) 01:16:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x0) connect$ax25(0xffffffffffffffff, 0x0, 0x0) [ 187.985963][ T3895] kobject: 'loop4' (000000008693d45d): kobject_uevent_env 01:16:07 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x11) ioctl$TCSETS(r0, 0x8924, 0x0) [ 188.027365][ T3895] kobject: 'loop4' (000000008693d45d): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 188.039270][T10408] kobject: 'slcan0' (000000008f33002e): kobject_add_internal: parent: 'net', set: 'devices' [ 188.086173][ T22] kobject: '0000:0000:0000.0004' (00000000ac62bbc4): kobject_add_internal: parent: 'uhid', set: 'devices' [ 188.088730][ T3895] kobject: 'loop1' (000000007a2b61a7): kobject_uevent_env [ 188.108675][T10412] kobject: '(null)' (00000000513a06fb): kobject_cleanup, parent 000000006aaf0cee [ 188.114627][T10408] kobject: 'slcan0' (000000008f33002e): kobject_uevent_env [ 188.131799][ T22] kobject: '0000:0000:0000.0004' (00000000ac62bbc4): kobject_uevent_env [ 188.147558][ T3895] kobject: 'loop1' (000000007a2b61a7): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 188.161622][T10412] kobject: '(null)' (00000000513a06fb): calling ktype release [ 188.177744][ T22] kobject: '0000:0000:0000.0004' (00000000ac62bbc4): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0004' [ 188.186213][T10408] kobject: 'slcan0' (000000008f33002e): fill_kobj_path: path = '/devices/virtual/net/slcan0' [ 188.202802][ T22] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 01:16:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000240), 0x4) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x0) connect$ax25(0xffffffffffffffff, 0x0, 0x0) [ 188.235887][T10408] kobject: 'queues' (00000000617e4847): kobject_add_internal: parent: 'slcan0', set: '' [ 188.250532][ T22] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 188.270910][T10408] kobject: 'queues' (00000000617e4847): kobject_uevent_env [ 188.283992][ T22] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 188.297890][T10408] kobject: 'queues' (00000000617e4847): kobject_uevent_env: filter function caused the event to drop! [ 188.310176][ T3895] kobject: 'loop2' (0000000049adde0d): kobject_uevent_env [ 188.314989][ T22] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 188.317319][ T3895] kobject: 'loop2' (0000000049adde0d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 188.332274][T10408] kobject: 'rx-0' (000000000cc28398): kobject_add_internal: parent: 'queues', set: 'queues' [ 188.380020][T10408] kobject: 'rx-0' (000000000cc28398): kobject_uevent_env [ 188.389321][ T22] kobject: 'hidraw' (00000000fc234d86): kobject_add_internal: parent: '0000:0000:0000.0004', set: '(null)' [ 188.403826][ T22] kobject: 'hidraw0' (00000000a366367f): kobject_add_internal: parent: 'hidraw', set: 'devices' [ 188.404289][ T5] kobject: '0000:0000:0000.0005' (00000000710c7dd6): kobject_add_internal: parent: 'uhid', set: 'devices' [ 188.415047][ T22] kobject: 'hidraw0' (00000000a366367f): kobject_uevent_env [ 188.436178][T10408] kobject: 'rx-0' (000000000cc28398): fill_kobj_path: path = '/devices/virtual/net/slcan0/queues/rx-0' [ 188.437021][ T22] kobject: 'hidraw0' (00000000a366367f): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0004/hidraw/hidraw0' [ 188.473764][ T22] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz1] on syz1 [ 188.475267][ T5] kobject: '0000:0000:0000.0005' (00000000710c7dd6): kobject_uevent_env [ 188.486455][ T22] kobject: '0000:0000:0000.0004' (00000000ac62bbc4): kobject_uevent_env [ 188.495406][T10408] kobject: 'tx-0' (000000002631cb02): kobject_add_internal: parent: 'queues', set: 'queues' [ 188.515859][ T22] kobject: '0000:0000:0000.0004' (00000000ac62bbc4): fill_kobj_path: path = '/devices/virtual/misc/uhid/0000:0000:0000.0004'