Warning: Permanently added '10.128.0.91' (ECDSA) to the list of known hosts. 2019/03/05 03:32:18 fuzzer started [ 53.154129] audit: type=1400 audit(1551756738.666:36): avc: denied { map } for pid=8092 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/03/05 03:32:21 dialing manager at 10.128.0.26:41615 2019/03/05 03:32:21 syscalls: 1 2019/03/05 03:32:21 code coverage: enabled 2019/03/05 03:32:21 comparison tracing: enabled 2019/03/05 03:32:21 extra coverage: extra coverage is not supported by the kernel 2019/03/05 03:32:21 setuid sandbox: enabled 2019/03/05 03:32:21 namespace sandbox: enabled 2019/03/05 03:32:21 Android sandbox: /sys/fs/selinux/policy does not exist 2019/03/05 03:32:21 fault injection: enabled 2019/03/05 03:32:21 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/03/05 03:32:21 net packet injection: enabled 2019/03/05 03:32:21 net device setup: enabled 03:35:15 executing program 0: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000040)={{0x793, 0x48}, {0x1200000000000000}, 0x6, 0x6, 0x5}) prctl$PR_GET_TSC(0x19, &(0x7f00000000c0)) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000100)={0x8, 0xa, 0x4, 0x40000, {0x0, 0x2710}, {0x0, 0x2, 0x47be8bd8, 0x5, 0xef, 0x4, "5fdf32c6"}, 0x7, 0x3, @userptr=0x1f, 0x4}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000180)={0xfff, 0x5, 0x3ff, 'queue0\x00', 0xff}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000240)={'nr0\x00', 0x120}) fcntl$getownex(r0, 0x10, &(0x7f0000000280)={0x0, 0x0}) waitid(0x2, r1, 0x0, 0x80000000, &(0x7f00000002c0)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000380)='trusted.overlay.opaque\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x2) waitid(0x0, r1, &(0x7f0000000400), 0x8, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000480)={@dev, 0x0}, &(0x7f00000004c0)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000500)={@rand_addr="366e31cdfb6832964447f40cc5c13615", 0x6f, r2}) r3 = syz_open_dev$radio(&(0x7f0000000540)='/dev/radio#\x00', 0x0, 0x2) getsockopt$inet6_buf(r3, 0x29, 0x3f, &(0x7f0000000580)=""/4096, &(0x7f0000001580)=0x1000) ioctl$DRM_IOCTL_AGP_ACQUIRE(r3, 0x6430) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f00000015c0)={{&(0x7f0000ffe000/0x2000)=nil, 0x2000}, 0x1}) ioctl$sock_SIOCBRDELBR(r3, 0x89a1, &(0x7f0000001600)='vxcan1\x00') getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000001640)={0x0, 0x1, 0xffffffff80000001, 0x9f, 0xfa3, 0x1ff}, &(0x7f0000001680)=0x14) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f00000016c0)={r4, 0x5}, &(0x7f0000001700)=0x8) sendmsg$nl_route(r3, &(0x7f0000001840)={&(0x7f0000001740)={0x10, 0x0, 0x0, 0x45024000}, 0xc, &(0x7f0000001800)={&(0x7f0000001780)=@can_newroute={0x64, 0x18, 0x0, 0x70bd26, 0x25dfdbfd, {0x1d, 0x1, 0x4}, [@CGW_MOD_AND={0x18, 0x1, {{{0x0, 0x0, 0xff, 0x20}, 0x6, 0x6a6d4c5520a577c2, 0x0, 0x0, "755c758b94ef3d94"}, 0x5}}, @CGW_SRC_IF={0x8, 0x9, r2}, @CGW_MOD_XOR={0x18, 0x3, {{{0x4, 0x9, 0x8001, 0x2}, 0x1, 0x1, 0x0, 0x0, "edd6d078200d0aeb"}, 0x4}}, @CGW_MOD_OR={0x18, 0x2, {{{0x3, 0x1000, 0x7ff}, 0x8, 0x1, 0x0, 0x0, "47bcfeebacdfa7db"}, 0x1}}]}, 0x64}, 0x1, 0x0, 0x0, 0x800}, 0x40000) move_pages(r1, 0x7, &(0x7f0000001880)=[&(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff3000/0x3000)=nil, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff6000/0x4000)=nil, &(0x7f0000ff4000/0x1000)=nil], &(0x7f00000018c0)=[0x0], &(0x7f0000001900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000001940)={0x0, 0x0, 0x2, 0x0, [], [{0x4, 0x7, 0x20000000000, 0x6, 0x1, 0x1ff}, {0x5, 0x200000000, 0x2, 0x0, 0x3, 0x9}], [[], []]}) r6 = syz_open_dev$vcsn(&(0x7f0000001a80)='/dev/vcs#\x00', 0x3, 0x80203) ioctl$FICLONE(r0, 0x40049409, r3) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r6, 0x84, 0x16, &(0x7f0000001ac0)={0x6, [0xa9, 0x407, 0x7f, 0xffff, 0x2, 0x5]}, &(0x7f0000001b00)=0x10) ioctl$VIDIOC_ENUMINPUT(r3, 0xc050561a, &(0x7f0000001b40)={0x6, "94992353001f397346a17568c2c4d6d132c4742ad4517d25bc8379d6be1c1d95", 0x3, 0x13a, 0x5, 0xb702, 0x24, 0x2}) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000001bc0)={r5, 0x626}, 0x8) recvfrom$inet6(r6, &(0x7f0000001c00)=""/104, 0x68, 0x0, &(0x7f0000001c80)={0xa, 0x4e21, 0x3f, @loopback, 0x101}, 0x1c) ioctl$FIBMAP(r0, 0x1, &(0x7f0000001cc0)=0x1000) [ 230.237764] audit: type=1400 audit(1551756915.746:37): avc: denied { map } for pid=8107 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=8145 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 230.359672] IPVS: ftp: loaded support on port[0] = 21 03:35:15 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x1, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000140)={0x214, r1, 0x0, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffffffff44d1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x44225e35}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x97}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xab7}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x200}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x40}]}, @TIPC_NLA_LINK={0xb0, 0x4, [@TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x825b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc1d6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x821}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4c8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xefc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4681}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x101}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x15e}]}, @TIPC_NLA_BEARER={0x1c, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1ff}]}, @TIPC_NLA_MEDIA={0x14, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_NODE={0x34, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xff}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x400}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x55}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}]}]}, 0x214}, 0x1, 0x0, 0x0, 0xc0}, 0x24004050) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000400)=0x5, 0x4) sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x40, r1, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x101}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7f}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x44}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x40}, 0x1, 0x0, 0x0, 0xc000}, 0x4000000) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000540)=[@window={0x3, 0x2, 0x635}, @mss={0x2, 0x40}, @window={0x3, 0xd775, 0x1}], 0x3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={0x0, r0, 0x0, 0x12, &(0x7f0000000580)='/proc/capi/capi20\x00'}, 0x30) waitid(0x1, r2, &(0x7f0000000600), 0x2, &(0x7f0000000680)) getpeername(r0, &(0x7f0000000740)=@alg, &(0x7f00000007c0)=0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000800)={'bcsh0\x00', 0x2703}) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000880)='team\x00') getsockname$packet(r0, &(0x7f0000008400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008440)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000008480)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000008580)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000008680)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000086c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f00000087c0)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000008a80)={@loopback, 0x0}, &(0x7f0000008ac0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000008b00)={{{@in=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000008c00)=0xe8) getsockname$packet(r0, &(0x7f0000008c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000008c80)=0x14) getpeername$packet(r0, &(0x7f0000008cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000008d00)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000008d40)={'vcan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000009dc0)={'vcan0\x00', 0x0}) getsockopt$inet6_mreq(r0, 0x29, 0x1d, &(0x7f0000009e00)={@mcast2, 0x0}, &(0x7f0000009e40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f000000a000)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@mcast1}}, &(0x7f000000a100)=0xe8) getpeername$packet(r0, &(0x7f000000a200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000a240)=0x14) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f000000a340)={@remote, @local, 0x0}, &(0x7f000000a380)=0xc) getpeername$packet(r0, &(0x7f000000a3c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a400)=0x14) recvmsg(r0, &(0x7f000000aa40)={&(0x7f000000a440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f000000a9c0)=[{&(0x7f000000a4c0)=""/97, 0x61}, {&(0x7f000000a540)=""/18, 0x12}, {&(0x7f000000a580)=""/58, 0x3a}, {&(0x7f000000a5c0)=""/185, 0xb9}, {&(0x7f000000a680)=""/197, 0xc5}, {&(0x7f000000a780)=""/153, 0x99}, {&(0x7f000000a840)=""/168, 0xa8}, {&(0x7f000000a900)=""/152, 0x98}], 0x8}, 0x40000000) accept$packet(r0, &(0x7f000000aa80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000aac0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000ab00)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f000000b300)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f000000b2c0)={&(0x7f000000ab40)={0x778, r3, 0x20, 0x70bd2a, 0x25dfdbff, {}, [{{0x8, 0x1, r4}, {0x228, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1d30}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x1000}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r7}, {0x4}}, {{0x8, 0x1, r8}, {0xb8, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfe00000000000000}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}]}}, {{0x8, 0x1, r11}, {0x16c, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r13}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r14}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x8000}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x2c}}}]}}, {{0x8, 0x1, r15}, {0x214, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xd3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xffff}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r16}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x1b}}}]}}, {{0x8, 0x1, r19}, {0x40, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r20}, {0x44, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r21}}, {0x8}}}]}}]}, 0x778}, 0x1, 0x0, 0x0, 0x4000010}, 0x20000000) [ 230.486684] chnl_net:caif_netlink_parms(): no params data found [ 230.528730] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.536223] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.543518] device bridge_slave_0 entered promiscuous mode [ 230.551134] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.557972] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.565292] device bridge_slave_1 entered promiscuous mode [ 230.586370] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 230.602404] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 230.623796] IPVS: ftp: loaded support on port[0] = 21 [ 230.639112] team0: Port device team_slave_0 added [ 230.649058] team0: Port device team_slave_1 added 03:35:16 executing program 2: rt_sigaction(0x1e, &(0x7f0000000100)={&(0x7f0000000000)="66f2436e6466666466664f0f3a22ff00c4c121f18148e7984f430f71f488c4629593940d71000000400f1e5d18c4e379163f7f850e66470f3835b2db040000640f01c1", {0x625}, 0x80000000, &(0x7f0000000080)="672e65440f464fb1c481a5619ecb0000004181c30a000000c4a1fb10a7000880412643c9c4e3654c3d31a125790ec401f9fe27c4610dfed2c401dd5e6000c442259694f0f6860000"}, &(0x7f00000001c0)={&(0x7f0000000140)="c421fa124007c4c2c0f505f137f5ebc403fbf04f861ec441f82ef1c461d454f1643ef3400fbc36660f6e7801c4c2893cf6646726460f50f0f0293a", {}, 0x0, &(0x7f0000000180)="8fa97812c366440f3a20e80df30f0f5f65bb64dcdec401fd5a4caadac4c295b9cec4e16d653500008020c481105eacb973955a3946dd25e25fca5dc4c1ec560f"}, 0x8, &(0x7f0000000200)) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000240)=0x9, 0x4) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/current\x00', 0x2, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f00000002c0)=0x5, 0x4) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f0000000300)=""/150, &(0x7f00000003c0)=0x96) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/checkreqprot\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000440)=@assoc_id=0x0, &(0x7f0000000480)=0x4) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000004c0)={r2, 0x6d76, 0x30, 0x7, 0x800}, &(0x7f0000000500)=0x18) r4 = syz_open_dev$radio(&(0x7f0000000540)='/dev/radio#\x00', 0x3, 0x2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000580)=[@mss={0x2, 0x3}, @sack_perm, @sack_perm, @sack_perm, @mss={0x2, 0x1fffc000}], 0x5) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f0000000600)={0x100000, &(0x7f00000005c0), 0x1, r4}) r5 = gettid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r5, 0x10, &(0x7f0000000640)={0xff}) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000680)={0x9, {0x0, 0x8479, 0x7, 0x10000}, {0x7c9, 0x20, 0xa9d9, 0x6}, {0x5, 0x10000}}) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f00000006c0)) write$P9_RCLUNK(r1, &(0x7f0000000700)={0x7, 0x79, 0x2}, 0x7) ioctl$UFFDIO_UNREGISTER(r4, 0x8010aa01, &(0x7f0000000740)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) ioctl$RTC_WIE_ON(r4, 0x700f) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000780)={0x2, 'ip6erspan0\x00', 0x1}, 0x18) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000007c0)) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000800), 0x4) r6 = accept4$tipc(r1, &(0x7f0000000840)=@id, &(0x7f0000000880)=0x10, 0x80800) setsockopt$inet_sctp_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f00000008c0)={r3, 0x1, 0xffffffffffff7fff, 0x5147e075}, 0x10) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000900)=0x31, 0x2) getsockopt$sock_buf(r6, 0x1, 0x3f, &(0x7f0000000940)=""/62, &(0x7f0000000980)=0x3e) setsockopt$RDS_FREE_MR(r4, 0x114, 0x3, &(0x7f00000009c0)={{0x1f, 0x545e}, 0x18}, 0x10) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r4, 0x4020565b, &(0x7f0000000a00)={0x343840de021af53b, 0x100000001, 0x1}) ioctl$FUSE_DEV_IOC_CLONE(r4, 0x8004e500, &(0x7f0000000a40)=r1) ioctl$VIDIOC_S_PRIORITY(r4, 0x40045644, 0x3) [ 230.746242] device hsr_slave_0 entered promiscuous mode [ 230.772389] device hsr_slave_1 entered promiscuous mode [ 230.848510] IPVS: ftp: loaded support on port[0] = 21 [ 230.867042] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.873617] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.880677] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.887123] bridge0: port 1(bridge_slave_0) entered forwarding state 03:35:16 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x40100, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000040)={0x1, 0x3, 0x3, {}, 0x5, 0xfffffffffffffffe}) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f00000000c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) write$P9_RGETLOCK(r0, &(0x7f0000000180)={0x2d, 0x37, 0x2, {0x1, 0x0, 0x6, r1, 0xf, '/dev/vfio/vfio\x00'}}, 0x2d) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$KVM_S390_VCPU_FAULT(r0, 0x4008ae52, &(0x7f0000000200)=0x80000001) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000240)=0x7, 0x8) socket$vsock_stream(0x28, 0x1, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0xdf92, 0x10001) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f0000000580)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1f4, r4, 0x2, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x60, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x73a80f9f}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1e}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xffffffffffffffc0}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xf60}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x10001}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}]}, @TIPC_NLA_NODE={0x4}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}]}, @TIPC_NLA_BEARER={0x88, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'nlmon0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x10001}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x83}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x800}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x3, @empty, 0xffffffffffffffe1}}, {0x14, 0x2, @in={0x2, 0x4e24, @local}}}}]}, @TIPC_NLA_MEDIA={0xdc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x53}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5297}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}]}]}]}, 0x1f4}, 0x1, 0x0, 0x0, 0x40}, 0x40000) ioctl$PPPIOCSMRU(r3, 0x40047452, &(0x7f00000005c0)=0x3ff) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x4000, 0x0) getsockopt$sock_buf(r5, 0x1, 0x0, &(0x7f0000000640)=""/4096, &(0x7f0000001640)=0x1000) r6 = msgget(0x0, 0x53) msgctl$IPC_RMID(r6, 0x0) getsockopt$sock_buf(r0, 0x1, 0x3b, &(0x7f0000001680)=""/111, &(0x7f0000001700)=0x6f) ioctl$TIOCEXCL(r5, 0x540c) r7 = syz_open_dev$vcsn(&(0x7f0000001740)='/dev/vcs#\x00', 0x534447ae, 0x2000) ioctl(r7, 0x1000, &(0x7f0000001780)="e3ef7239aab1e13948d6adc8f5b56988f0923740556206a9068c8f3ee9376ba42a05e175bd36e07c8f5d978f7836a3198ffc6ea357b6a410e164f2a87cbb2b857dae67") r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000001840)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000001900)={&(0x7f0000001800)={0x10, 0x0, 0x0, 0x20100020}, 0xc, &(0x7f00000018c0)={&(0x7f0000001880)={0x34, r8, 0x300, 0x70bd27, 0x25dfdbfb, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz2\x00'}}}, ["", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) ioctl$KVM_X86_SETUP_MCE(r7, 0x4008ae9c, &(0x7f0000001940)={0x18, 0x0, 0x7fff}) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000001a80)=@buf={0xca, &(0x7f0000001980)="d9c42c92df608f22a78ffbb1f1166033ee22c072357776e4f9df49dda0cace65f493641c29cb6b980f1779143da67cd50ffe9395a5eefb4c38e8f3137b07a1559ce93318aa0e1b24257f27ee365125b3846df279fa412da0a7210f4d18c94132500e5dd9410f6f058ee8f94095e30948916eaeff62b1030c9c1ff2b06c1aad8a36f80a45495b9b44891a0e4b96cdf9e20ce1f69d000d52d4b969bb9d316082d04da6d5101edf4c40c425cd7814dafebd07b89110cffd2555149e0a00b3dac23c4abf369508847697ae99"}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000001ac0)={[0x5, 0x8000, 0x1, 0x9, 0x7, 0x49, 0x80000000, 0x8001, 0x6, 0xff, 0x0, 0xfffffffffffffffc, 0x8, 0x0, 0x5, 0x100000001], 0x2, 0x4}) r9 = syz_open_dev$mice(&(0x7f0000001b80)='/dev/input/mice\x00', 0x0, 0x1) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r9, &(0x7f0000001c80)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x24000}, 0xc, &(0x7f0000001c40)={&(0x7f0000001c00)={0x1c, r8, 0x18, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x50) getsockopt$inet_buf(r5, 0x0, 0x11, &(0x7f0000001cc0)=""/217, &(0x7f0000001dc0)=0xd9) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r7, 0x84, 0x72, &(0x7f0000001e00)={0x0, 0x76, 0x30}, &(0x7f0000001e40)=0xc) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r9, 0x84, 0x71, &(0x7f0000001e80)={r10, 0x5}, 0x8) [ 230.955749] chnl_net:caif_netlink_parms(): no params data found [ 231.071175] 8021q: adding VLAN 0 to HW filter on device bond0 [ 231.125034] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.131389] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.141065] device bridge_slave_0 entered promiscuous mode [ 231.149998] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.156807] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.165980] device bridge_slave_1 entered promiscuous mode [ 231.186858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 231.207088] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.225124] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.233105] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 231.246905] chnl_net:caif_netlink_parms(): no params data found [ 231.259807] IPVS: ftp: loaded support on port[0] = 21 [ 231.271186] bond0: Enslaving bond_slave_0 as an active interface with an up link 03:35:16 executing program 4: r0 = getpid() sched_setaffinity(r0, 0x8, &(0x7f0000000000)=0x2) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x80000, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) sendto$unix(r1, &(0x7f0000000100)="2993cedc3136417dc37767c813802c22bf6a651ab741b7e9b10747f0a08db2cfee4d5223f0145b76f14694f59bf25543fd3fa6701c580066458d1af3d3d2ec10e53c3269530d719f4b06457c27cd05ba3a050c8907a43684ec9e36728ed148795ba3f256cfa1e60b6680a6e9c592564624e21f4f7b924ee67c3e5255875694506d28f74c89cd3ad24c82034b8a39f7aaffc399ce397486f1deca3b5bda7b7d8fc524d07639cf81a6dcd74f157b9e1b519dab2656a751ab96001b70e1ca5cf7c14effd0fbf179156320efd9eaad27d71c53561af919fe8858f945c97985ca", 0xde, 0x90, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000280)={0x0, 0xa5, "d07a9282b6cbe9b1e9444cf00e23006bacfedd122d659a14c24d570cae517663ba200c404f0f70504919ec962d60fd92569bb526470b8de9e11921a4eeb2d058756c18c327b47fc8820867861cf29bb7f24e57e251699f01c64118fe4d561ab8dec4e127471f269050b21ac1269fb9a34a5165f5be2df9f7f7c79f99eef3568d80eb437b23101f7d3bc828f7b7f3bf22abbe61d29d8484ada44314c0b3d4783b64895be3b2"}, &(0x7f0000000340)=0xad) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000380)={r2, 0x2}, 0x8) ptrace$pokeuser(0x6, r0, 0x4538, 0x5) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000003c0)={r2}, &(0x7f0000000400)=0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={r0, r1, 0x0, 0x1b, &(0x7f0000000440)=')}cgroupM+vboxnet1cgroup\\]\x00', 0x0}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=r4, 0x4) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000500)={r3, @in={{0x2, 0x4e23, @local}}}, &(0x7f00000005c0)=0x84) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000600)={0x4, [0x72b, 0xfff, 0x0, 0xaecc]}, &(0x7f0000000640)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000680)={0x1a, 0x0, 0x101}) syz_kvm_setup_cpu$x86(r1, r1, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000700)=[@textreal={0x8, &(0x7f00000006c0)="0f2254296ce1f081a500000b0036260f01cf66b9800000c00f326635000100000f300f22500f01ca0f01c867660f381d2fbaf80c66b8f875cd8666efbafc0ced", 0x40}], 0x1, 0x1, &(0x7f0000000740), 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000780)={0x5, 0x40, 0x9, 0x0, 0x0, [], [], [], 0xffffffff, 0x3}) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f0000000940)={0x800100f, 0x5, 0x3}) ioctl$KDDISABIO(r1, 0x4b37) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000980)={{0x0, 0xa93a, 0x200, 0x6, 0x1ff, 0x7ff}, 0x572, 0x1f, 0x0, 0x5, 0x3b064d0a, "d654a8814a6f886d876d2e8fa643a77c61aeccf99956a60e37a8a7ad44a86916606bf860301f41d994b608a3552240e3e11c3c11ea510b41c95e7195a6b849a69375b08f2f397920727d99cce8e2e7812b4e70c3c5667ce5d837e4667a9479de85c6153fbf952f9a8bcbfbfefc5da7e0fa752802b51fdf9e2b96e7c7983c400a"}) socket$pptp(0x18, 0x1, 0x2) shmget$private(0x0, 0x1000, 0x900, &(0x7f0000ff6000/0x1000)=nil) ioctl$TIOCNXCL(r1, 0x540d) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c00)={r5, 0x0, 0x85, 0xe9, &(0x7f0000000a40)="9dc6a2befaf90bcf2b5ec26379fb120eac4942964af5a76dc86d154e338d99ead055fb0e6d84585e60d0c82e57fb321db936005a966b6053a4e649ccb574165351770d2f02125c8ba3303176b3878e95ebc908ead851064c9c2ccf43ce65ed96f0557396d978c755962a0592de6911213cd68403bc401751fa59765cf240ff97f1b0f290d1", &(0x7f0000000b00)=""/233, 0xd251}, 0x28) ioctl$VIDIOC_DQEVENT(r1, 0x80885659, &(0x7f0000000c40)={0x0, @src_change}) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/status\x00', 0x0, 0x0) write$binfmt_misc(r6, &(0x7f0000000d40)={'syz1', "97ffe451b2f935dbb42317637832bd22672fb37831a3cab093692bf0875c72b46c5eb3ccdeebf1b9a684c14b5da86e9baf638005662cdcc6df9b20e3e68dc87ceb52"}, 0x46) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000e00)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000f00)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000ec0)={&(0x7f0000000e40)={0x4c, r7, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2fc6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x65}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x631}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000080) [ 231.284837] 8021q: adding VLAN 0 to HW filter on device team0 [ 231.306607] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 231.359359] team0: Port device team_slave_0 added [ 231.374617] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.393179] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.399550] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.458431] team0: Port device team_slave_1 added [ 231.478914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.490852] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.497261] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.516752] IPVS: ftp: loaded support on port[0] = 21 [ 231.540167] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 231.556854] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 231.578066] bridge0: port 1(bridge_slave_0) entered blocking state 03:35:17 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x10000, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0xb57d, 0x8}, 0xc) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0x20000010}) r2 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x18000) syz_open_dev$rtc(&(0x7f0000000100)='/dev/rtc#\x00', 0xb7, 0x4000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000140)={{{@in=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setuid(r4) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000280)={{{@in=@rand_addr=0x61, @in=@multicast1, 0x4e23, 0x0, 0x4e22, 0x6, 0xa, 0x80, 0xa0, 0x3c, r3, r4}, {0x10001, 0x8001, 0x6, 0x6, 0x6a, 0x0, 0x6, 0xfffffffffffffff7}, {0x4, 0x8, 0x2, 0x83}, 0xcc93, 0x6e6bba, 0x2, 0x1, 0x3, 0x3}, {{@in=@rand_addr=0xc7, 0x4d3, 0x3c}, 0xa, @in6=@empty, 0x3502, 0x3, 0x3, 0x2, 0x2, 0x5, 0xd9b1}}, 0xe8) mmap(&(0x7f0000feb000/0x13000)=nil, 0x13000, 0x1, 0x812, r0, 0x0) r5 = syz_open_dev$sndseq(&(0x7f0000000380)='/dev/snd/seq\x00', 0x0, 0x200) getsockname$ax25(r0, &(0x7f00000003c0)={{}, [@rose, @default, @netrom, @rose, @rose, @netrom, @netrom]}, &(0x7f0000000440)=0x48) ioctl$DRM_IOCTL_ADD_BUFS(r2, 0xc0206416, &(0x7f0000000480)={0x7f, 0x8beb, 0x80000001, 0xffffffff, 0x10, 0xffffffff}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f00000004c0)={{0x2, 0xfffffffffffffff7}, {0x3f, 0x101}, 0x5, 0x4, 0xc58d}) getsockopt$inet_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000540)=""/141, &(0x7f0000000600)=0x8d) sendmsg$rds(r0, &(0x7f0000001040)={&(0x7f0000000640)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000680)=""/191, 0xbf}, {0x0}, {&(0x7f0000000740)=""/235, 0xeb}], 0x3, &(0x7f0000000e80)=[@rdma_args={0x48, 0x114, 0x1, {{0x101, 0xffff}, {&(0x7f0000000880)=""/17, 0x11}, &(0x7f0000000b00)=[{&(0x7f00000008c0)=""/83, 0x53}, {&(0x7f0000000940)=""/129, 0x81}, {&(0x7f0000000a00)=""/235, 0xeb}], 0x3, 0x42, 0x1f}}, @rdma_args={0x48, 0x114, 0x1, {{0xc3, 0x6}, {&(0x7f0000000b40)=""/56, 0x38}, &(0x7f0000000cc0)=[{&(0x7f0000000b80)=""/158, 0x9e}, {&(0x7f0000000c40)=""/117, 0x75}], 0x2, 0x2, 0x1}}, @mask_fadd={0x58, 0x114, 0x8, {{0x8}, &(0x7f0000000d00), &(0x7f0000000d40)=0x27, 0x6, 0x27f, 0x0, 0x7, 0x45, 0x5}}, @zcopy_cookie={0x18, 0x114, 0xc, 0xfffffffffffffff7}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000d80)=""/12, 0xc}, &(0x7f0000000dc0), 0x10}}, @cswp={0x58, 0x114, 0x7, {{0x55a, 0x7b2}, &(0x7f0000000e00)=0xed09, &(0x7f0000000e40)=0x8, 0x4, 0x1, 0x6, 0x3ff, 0x1, 0x3ff}}], 0x188, 0x40005}, 0x8054) setsockopt$inet_buf(r0, 0x0, 0x11, &(0x7f0000001080)="ef8bec4b441ed9cbc05d75f8ebc56912f23897cd4c326cb031734e2d7e33224e31b243890920be50cb6da28f339b46f90e", 0x31) write$P9_RRENAME(r1, &(0x7f00000010c0)={0x7, 0x15, 0x1}, 0x7) faccessat(r0, &(0x7f0000001100)='./file0\x00', 0x1d, 0x400) ioctl$VIDIOC_G_ENC_INDEX(r5, 0x8818564c, &(0x7f0000001140)) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001980)='/dev/ubi_ctrl\x00', 0x80, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) sendto$isdn(r0, &(0x7f00000019c0)={0x301, 0x7f, "aae7dc0c053e8b84b204f1c1da660abb426cd6ecd26424fe19935f160d873da1a4d1cc5cb57e562e5bbb415a8722841e7a54078612085721c2cb36a8fa588983fa1e7cfbead0a3e80be065aebec83cb6d76af6d53c4deda3bf0599881802216024cdf0584da0f6ae04174deb88719e5f8589e5993838dd8b32fd0b2d5d12f803ee51760367f68c480e896c4f0906351f915cd660f0efa1e7df2688d7fd13788f33a94bd8fedc82b43abedf2f40b64c1c67175c3f464424ba24300ddf81a16f172ab48e1e4c37efd0928b687cca23784c7e1dcbf1ebdaeba6ae8b6f8fb5da6d19a4e3b22e"}, 0xec, 0x8000, &(0x7f0000001ac0)={0x22, 0x3, 0xf45, 0x10001, 0x4}, 0x6) ioctl$KDGKBTYPE(r5, 0x4b33, &(0x7f0000001b00)) r7 = syz_open_dev$swradio(&(0x7f0000001b40)='/dev/swradio#\x00', 0x1, 0x2) ioctl$TIOCGLCKTRMIOS(r7, 0x5456, &(0x7f0000001b80)={0x3ff, 0x3f, 0x1, 0x4, 0x10, 0x1000, 0x4565, 0x8, 0x7f, 0xe3000000000000, 0x0, 0x9}) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r6, 0x84, 0x71, &(0x7f0000001bc0)={0x0, 0x8}, &(0x7f0000001c00)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000001c40)={r8, 0x9}, &(0x7f0000001c80)=0x8) memfd_create(&(0x7f0000001cc0)='\x00', 0x6) ioctl$VIDIOC_ENUM_FREQ_BANDS(r7, 0xc0405665, &(0x7f0000001d00)={0x4, 0x3, 0xfffffffffffffffa, 0x40, 0xffffffff, 0x81, 0x8}) [ 231.586409] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.598856] device bridge_slave_0 entered promiscuous mode [ 231.654259] device hsr_slave_0 entered promiscuous mode [ 231.692293] device hsr_slave_1 entered promiscuous mode [ 231.742257] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 231.750093] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 231.757810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 231.765347] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 231.773428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 231.780783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 231.788491] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 231.795944] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 231.813093] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.819436] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.827607] device bridge_slave_1 entered promiscuous mode [ 231.854783] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 231.861717] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 231.877553] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 231.878089] IPVS: ftp: loaded support on port[0] = 21 [ 231.895459] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 231.907130] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 231.927813] audit: type=1400 audit(1551756917.436:38): avc: denied { associate } for pid=8108 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 232.019084] chnl_net:caif_netlink_parms(): no params data found [ 232.035934] team0: Port device team_slave_0 added 03:35:17 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000000c0)=0x2, 0x4) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) ioctl(r0, 0x19c, &(0x7f0000000100)="93a60fab9f82f3c56a5ec70c53695913f9cb0034e00dddfcfff44c161b8ac167c59d50f62ad2ec52957f5c516ea4122c407777d364dc5a5e42150581e25780368065bf2e10873efc658b7ba06aa6f0dfacb19dc2a541da35cce5b5ab1a4f14fdb946a3721a7a653f72d398a2b62f3844d34eb95b89330bbd7094b8981d2762437268c044df467edd708bbdf552fcd93dce128a7c103594c61c5a0938428a67a1992d3965ea37a4114e19806ef4ec85ef2cd26a95739f0acab8ec9ace12e445dcbdb731e063f9e7ebddbc32191e61079e4b3aae46af7901fb9159edba95fad9") [ 232.068631] team0: Port device team_slave_1 added [ 232.186816] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.193986] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.200847] device bridge_slave_0 entered promiscuous mode 03:35:17 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) sendmmsg(r0, &(0x7f0000006f40)=[{{&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0}}], 0x1, 0x7fa783d32895bb5a) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000040)=0x6cb, 0x4) 03:35:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x4, @ipv4={[], [], @remote}}, 0x1c) connect$l2tp(r1, &(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) bind$rose(r2, &(0x7f0000000040)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, 0x2, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x40) [ 232.254234] device hsr_slave_0 entered promiscuous mode [ 232.292244] device hsr_slave_1 entered promiscuous mode [ 232.335196] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.341544] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.348743] device bridge_slave_1 entered promiscuous mode [ 232.365587] 8021q: adding VLAN 0 to HW filter on device bond0 [ 232.381874] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.388254] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.394929] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.401298] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.418526] chnl_net:caif_netlink_parms(): no params data found [ 232.439292] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.443893] hrtimer: interrupt took 27036 ns [ 232.451540] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.461334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 232.468469] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 232.478026] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 232.489137] 8021q: adding VLAN 0 to HW filter on device team0 03:35:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) ioctl$CAPI_GET_ERRCODE(r0, 0x80024321, &(0x7f0000000040)) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f00000000c0)=r1) syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x0, 0x2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r2, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r3 = syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) setns(r3, 0x10000000) accept$alg(r3, 0x0, 0x0) sendto$unix(r0, &(0x7f00000002c0)="f7e3c72e0056b0af47fef8e88ebfb64f5b400931a040b426a105000000000000ed3152c34dcd4eff1a5bb81c23eeb716c8f9799dc18fd9d4fed707dc8a0a467bd553e73b27e2108fd983bd03304b88429ff9863332f4f6948c066c4087b15fbc30b5bb6e6224ca1c72a361fad8d01e0a8bb27b9557e56a2a471dc98811a32e321c714256a50ac85d9014b68aaab4425279a6c061d953", 0x96, 0x4040051, 0x0, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r3, 0x110, 0x3) [ 232.536301] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 232.624629] team0: Port device team_slave_0 added [ 232.634258] audit: type=1400 audit(1551756918.126:39): avc: denied { create } for pid=8148 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 232.638759] chnl_net:caif_netlink_parms(): no params data found [ 232.668769] audit: type=1400 audit(1551756918.166:40): avc: denied { ioctl } for pid=8148 comm="syz-executor.0" path="socket:[28877]" dev="sockfs" ino=28877 ioctlcmd=0x8991 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 232.701251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 232.709497] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 232.717392] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.723771] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.731725] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 232.739891] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 232.747615] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 232.755261] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.761580] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.774995] team0: Port device team_slave_1 added [ 232.807514] bond0: Releasing backup interface bond_slave_1 [ 232.903126] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.909543] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.917324] device bridge_slave_0 entered promiscuous mode [ 232.924489] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.930924] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.938586] device bridge_slave_1 entered promiscuous mode 03:35:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) tgkill(r2, r2, 0x8) ptrace$cont(0x1f, r2, 0x4, 0x1) ptrace$setsig(0x4203, r2, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x5b6}) [ 232.994506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 233.013508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 233.031066] 8021q: adding VLAN 0 to HW filter on device bond0 [ 233.073964] device hsr_slave_0 entered promiscuous mode [ 233.112355] device hsr_slave_1 entered promiscuous mode [ 233.167645] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 233.194263] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.200723] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.208395] device bridge_slave_0 entered promiscuous mode [ 233.232801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 233.248365] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 233.256077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 233.268308] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 233.276029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 233.287586] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 233.295028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 233.306688] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 233.315644] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 233.328102] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 233.339592] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.356334] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.363674] device bridge_slave_1 entered promiscuous mode [ 233.371835] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 233.392377] 8021q: adding VLAN 0 to HW filter on device team0 [ 233.409316] team0: Port device team_slave_0 added [ 233.430956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.439442] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 233.461681] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 233.482301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.490439] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 233.503339] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.509676] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.520585] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 233.529079] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 233.540094] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.546463] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.558774] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 233.566782] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 233.598527] team0: Port device team_slave_1 added [ 233.622110] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 233.631741] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 233.681401] audit: type=1400 audit(1551756919.186:41): avc: denied { create } for pid=8160 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 233.705920] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 233.715383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 233.724383] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 233.741176] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 233.742187] audit: type=1400 audit(1551756919.186:42): avc: denied { write } for pid=8160 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 233.773270] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 03:35:19 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="2410f9021300290a0000ffff0000000207000000", @ANYRES32=r2, @ANYBLOB="000000000000000004000c00"], 0x24}}, 0x0) [ 233.775239] audit: type=1400 audit(1551756919.186:43): avc: denied { read } for pid=8160 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 233.795648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 233.828095] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 03:35:19 executing program 1: ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e22, @multicast1}, 0xfffffffffffffd33) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) [ 233.841425] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 233.854775] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 233.862972] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 233.870118] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 233.919578] 8021q: adding VLAN 0 to HW filter on device bond0 [ 233.958805] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 233.996733] 8021q: adding VLAN 0 to HW filter on device team0 [ 234.056686] device hsr_slave_0 entered promiscuous mode [ 234.127564] device hsr_slave_1 entered promiscuous mode [ 234.193204] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 234.221572] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 234.268468] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 234.332123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 234.339996] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 234.369424] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.375892] bridge0: port 1(bridge_slave_0) entered forwarding state [ 234.388454] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 234.397479] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 234.411074] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.417498] bridge0: port 2(bridge_slave_1) entered forwarding state 03:35:19 executing program 1: r0 = socket(0x40000000015, 0x805, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bcsf0\x00', {0x2, 0x4e22, @rand_addr=0xa1c6}}) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) unshare(0x8020000) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x480001, 0x1f9) ioctl$VIDIOC_G_MODULATOR(r1, 0xc0445636, &(0x7f00000000c0)={0x7, "c3823eb3930f2f94189d28ab3fd30ec0e3621e81c25eb56eee2c76efe1ca4f9d", 0x20, 0x8001, 0x3, 0x6, 0x7}) [ 234.445586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 234.480010] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 234.492717] team0: Port device team_slave_0 added [ 234.530637] audit: type=1400 audit(1551756920.036:44): avc: denied { sys_admin } for pid=8175 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 234.557374] 8021q: adding VLAN 0 to HW filter on device bond0 [ 234.608428] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 234.636177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 03:35:20 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) getgroups(0x3, &(0x7f0000000240)=[0x0, 0xffffffffffffffff, 0x0]) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f00000000c0)="33c5d26241fe6410a53e8bca1c75d5ddfb651a4e82c307650942311ea49b8e89390b14b5043f1e", 0x27, 0xfd11}, {&(0x7f0000000100)="d01d578d530cb4a0f7c244238a8959b7566202b90708be4f1242596a006750a760e00c660bfc9c57ef42249dbf13482b082df1ad6ce5837b1c1e1dc815aa144a3f95dc69afff6ebdfdb0ff8b02fa02c70a1a1c91b579cb0ca7035d99bbb35fa5fd7368dab207d67bd9898e1240f68f6953c79879abe9d8a5d91cf82bd7ed948f1a89966ee5a769c82ff9a177e9de143c660b5e1dc513aabd949ca79d62cb8d9d8c25451f70a4b987dbbd4750636028ae3c335a92b9ee3f72cad5ba7b3c55c06e8ad6b95753f6a7e6de768a25e055107acb2e663abc93465eae7fc1f600842dc713", 0xe1, 0x7fffffff}], 0x881000, &(0x7f0000000340)={[{@resgid={'resgid', 0x3d, r1}}], [{@uid_lt={'uid<', r2}}]}) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, &(0x7f00000006c0)=[{0x0}], 0xffffff1f}}], 0x48}, 0x0) [ 234.667629] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 234.686913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 234.698377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 234.716447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 234.736043] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 234.749447] team0: Port device team_slave_1 added [ 234.763419] 8021q: adding VLAN 0 to HW filter on device team0 [ 234.787324] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 234.807781] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 234.857189] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 234.871125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 234.882197] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 234.889765] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 234.915257] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 234.928965] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.935357] bridge0: port 1(bridge_slave_0) entered forwarding state [ 234.948001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 234.955949] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 235.035013] device hsr_slave_0 entered promiscuous mode [ 235.072385] device hsr_slave_1 entered promiscuous mode [ 235.117844] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 235.124828] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 235.131810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 235.143551] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 235.151094] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.157483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.169817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 235.177789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 235.195942] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 235.219712] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 235.235118] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 235.248777] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 235.259366] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 235.269038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 235.279728] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 235.289508] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 235.299330] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 235.309371] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 235.319013] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 235.346991] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 235.355357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 235.367584] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 235.469013] 8021q: adding VLAN 0 to HW filter on device bond0 [ 235.495099] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 235.513814] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.524895] 8021q: adding VLAN 0 to HW filter on device team0 [ 235.555739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 235.565261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 235.565687] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.565727] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.573675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 235.574164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 235.574618] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 235.577316] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.577341] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.577691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 235.582943] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 235.593114] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 235.593815] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 03:35:21 executing program 3: prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000002700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x200000, 0x100) socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$alg(r1, &(0x7f0000002680)=[{0x0, 0x0, &(0x7f0000002380)=[{&(0x7f00000001c0)="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", 0x1000}, {&(0x7f00000011c0)="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", 0x1000}, {&(0x7f0000000080)="2c250339f1361c9c1b0500273dc740706ed1fca0b56768519b59bcd491b8a207bd629a15ce86e8714b36e1dc8dbde669bad692625a336328e3b94f46ef5e6c16fffe83db303f2453c9941f7829f58488ae01663876374ef1027d2ca2f31da73e752a96f502b426f3cc13daa5b127ae2e73377cd5fb9a24248a7d65737a5d2fe3640dbd75cd2027e874662fd2009cdabd3b28dff791709d92f826206706e1e6353193d9f30febdcab50cdc135819230f2d33956", 0xb3}, {&(0x7f00000021c0)="0246da6e2b3bc3b222136261b95eaa04fb290f254c1be5bcd46e0eae1d5c138bcc5116a1c6a5099deca3fc1fc3cd1ea48748d4ec9cc7d0488d6daa269ea14838", 0x40}, {&(0x7f0000002200)="cb37d952acf79ef32ddc78551028b6702483158b95e4ab648be5980c634f848edd7727c5eb4377b827cdb3f37e0266dba4ff7e370fa10957c56fb7552101a7d9444addecbd6070a9a83a35658e155310eace27b7fe4b0f760715cdbf08f96af7818cda2a601ff8e36e6efa73036d53e308f679ed6b42fca3a488fa6f96512f6e25f4a4faccc02c979d375a808bf180adeedf52c99843cdd5c7cc6182", 0x9c}, {&(0x7f00000022c0)="ccaebbd728970d8a7e17ef399903f8c2477fdbe5536cc8f9007f9ff7a165adbe6e8e2ab779a365b2a39a4f36fcfe59c0c1b5605d2be6771e4db6798ed82cb9bd9ee84ed0176e76b36e70a9c86d9f848ab5551f6bdd76f9f607c5b49686e4314fb5687061d3eec1128416abba82d6acb2f89436628803629ed9ad4e2f514fbd196d27fd7d662d6a3a5fa3a98c247d38ec4e45ff00d0bff4ac3f00935e263e", 0x9e}], 0x6, &(0x7f0000002400)=[@assoc={0x18, 0x117, 0x4, 0x1}], 0x18, 0x10}, {0x0, 0x0, &(0x7f0000002480)=[{&(0x7f0000002440)="76dfa8386e78adfdf224abc516d0a2dd548c16ca6e75838fb278347a410604dba4156ff8a8c9a26ad18ec9df0f2461dc5409ac9fdd", 0x35}], 0x1, &(0x7f00000024c0)=ANY=[@ANYBLOB="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"], 0x1a8, 0x20000004}], 0x2, 0x800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a07750600000000000000ed5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) fgetxattr(r3, &(0x7f0000002740)=@random={'trusted.', 'skcipher\x00'}, &(0x7f0000002780)=""/2, 0x2) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") recvmmsg(r2, &(0x7f0000006ec0)=[{{0x0, 0x0, &(0x7f0000000080)}, 0xffffffffffffffe1}], 0x1, 0x0, 0x0) [ 235.594502] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 235.598348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 235.599016] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 235.612449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 03:35:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000440)={0x10, 0x0, 0x0, 0x2000000}, 0xc) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x141000) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) getsockopt$netlink(r0, 0x10e, 0x9, 0xfffffffffffffffe, &(0x7f0000000140)=0x9) [ 235.823478] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 235.839618] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 235.888623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 235.911101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 235.921680] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 235.998582] 8021q: adding VLAN 0 to HW filter on device batadv0 03:35:21 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000180)="3e0fbbf5037b5b2ab3ec14e58994e96666ab1bb8590c6b15efa3e541c12e7483fd97e0f166675985ee40c4dfd327f35540a6c97a45e1333591aac6971b05b7f5b526979a9651c46a6909e392abe48886cca9f7dac48cb3f632"}, {&(0x7f0000000200)="eb84538f753d176eaba5c853641172b392499fb35f8ed981c6f7b8f5daef2047df489038dc76191bb604bfe22662a6f39b5a93e61861c99eb9bb374108c39c2f6f5dbb75c7838bcd3cbb03b7521d9b36ba268040361ced346c6eb906ee1863eeee8a4e31b217551d70f60c05396393f6715390e99d7407309005298535c2f460aaef03134bb2beaef9cc90ae6ea84467ceb4819e4b36bf0d2ecdaa01f770250c4792f3a994e2b44a85710c1ca16bed01349fe957253c8d91138def3aee8ecee502e0223c731a4c127abe2ff59e495b3ca4c4e87c8cbce6f234c0d15aed3fe725c0e08dfe52ddfdb8bc697ff249d9d6cec50db324db38a2b3b9b319d915"}, {&(0x7f0000000300)="28884e37853a67f58ac317b5f134973917071508084149bf71093e8406c3b67026fa"}, {&(0x7f0000000340)="3609b30a550af8ec6958730f78c13c22b41bf337ae3096d0baf2c07d32c8788e822af9975a32201f1dff023bcd7a808971401f6ae3586582e0ba275cff45f0e4efa4c8f2b4be1c6616c69f22481c0820f18920f32b72485bf9d21dcc2babe4e0445ae5a61a2b0adb453cbf8f1129bfa792106c2ebbc391329b7058872d2c4d910f6ff289bc6f2ff5c163e76746a9b4fc4dc6ad414e1b8811ee0fad66b38a248101be19b85630a4d75a6644648df5796b09d011c17705a47434b5"}, {&(0x7f00000004c0)="ff79fc0e20972760da471adf38f854610f66706b44cb2a4a82b1d436587178fd66f234962ea52e14ddccc62963ddb612eeb4e2a1f3e101f6d90759d77659678c8b139fe833b027cb8e2cc4cba389981a5064f884b04f943e8a9ba3b2017479c66e7662b94eb144fc1999a0b34d9da505b89422855cee854a5164f04e1aeb878e5cf0bda1e0ecc43236bc76f5934d70fbb3a57fbd716bc0aaaa980b865ea6e8b381f87e390c3f25b20d98ab01ed6e786012c445a9e214a1dd5b34cd7775ac1d4a86f043325f4c28317215afcdd12a7e076d62697e44db6042c35e4759b051", 0xfea9}, {&(0x7f0000000400)="5bcc526b37a44d5454eca4e48100f79d289889314e1fe2db6666ccba113368a1412c2ab8cade5226734db89c8382417c4bafbb1c4e64d262d1b840eb808a470ba34924b6ca3c3666241dc2388c1062548c2ec12841331e4ecc5b950e66bed84e62cf2fb46e9f30eb7750b5131b1d500817cf85da6870f8"}, {&(0x7f0000000740)="acf0636a2618a241f63d6db91331d4757981c6812cea49ae056c07655dd62e18f5d57526f33d3ecf897ae7b29d004399888832f39d966531076151f502b73d802d65ba48944d6edc89707cc0caa3960264fa6d1ea9efa3ad992d44ee5549de529dc16ba041d8a0466fa37a6e"}], 0x10000000000003df) 03:35:21 executing program 1: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x1}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000140)={r2, 0x1, 0x1, [0x2]}, 0xa) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8e2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf2, 0x0, @perf_config_ext, 0x0, 0x40, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r1, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001780)=[{0x0}, {0x0}], 0x2}, 0x10) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x5, 0xb000}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\x00', 0x2761, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) 03:35:21 executing program 4: r0 = socket$kcm(0x29, 0x3, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x3e6, 0xf687, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000600)='./file0\x00', 0x0, 0x10}, 0xfffffffffffffd3d) close(r0) r3 = socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8981, &(0x7f0000000400)=0x400) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r3, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="d0000000000000001d01000007000000c468b029d8c620a28adf19fe4cb328a6321021969af7ddc2eaf4fc71fd3ca692e014bf516030d17e660400000033074c7b1df6370f320a6c06782e5053ea357f5707e68ed5be8d39ea37b7717f41f6205f383ed37db61e162c79aca215502c5e4a9230d0e0841c2fe1a5076597512ef625c5031406e96e9aba5efd662a14b06e5503ca5ecd2671a125f8764922375fecadfbc176618ef31a4e6826da36f2c1f25da9a075f8d0095c9d5153d245d90931cf4d9de9df495f5ed0f7960000000000"], 0xd0}, 0x200) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x23ffe, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', r2}, 0x10) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x200082}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000004c0)={r0, r6}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$TUNATTACHFILTER(r8, 0x401054d5, &(0x7f0000000340)={0x3, &(0x7f0000000300)=[{0xfffffffffffffffa, 0x0, 0x1, 0x400}, {0x401, 0xfff, 0x3ff, 0x5}, {0x40, 0x1000, 0x1f, 0x200}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) sendmsg(r3, &(0x7f0000000140)={&(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000900)="b046149aa952a80d444f0f9ee0d725ff602d48ad443c530b6ce69da95fc4419e926b8b19a0a8d8ba93ad90322ed1e0178f689e924ee560d07b71016875904cae3590d142bf21f31f2a2b97957b0a727d8b71a3aee41b3f34d3e323d21c3eeed80dad61afb912d13bc385837eaa1bccd949625e5e99cc7a71194c5a053f6525c957c7125d934517b64fcec10f", 0x8c}], 0x1, 0x0, 0x0, 0x4000}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$cgroup_ro(r7, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) ioctl$SIOCSIFHWADDR(r10, 0x8924, &(0x7f00000000c0)={'bond0\x00', @random="01003a1e2410"}) perf_event_open(&(0x7f0000000540)={0x7, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0xc8, 0x81, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0xfffffffffffffffe, 0x20, 0xfff, 0x0, 0x2, 0x0, 0x10001, 0x0, 0x0, 0x7fff, 0x2, 0x9, 0x8, 0x0, 0x85, 0xe67, 0x0, 0x7fa5, 0x0, 0x100000000, 0x0, @perf_config_ext, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x39a74eb3, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r9, &(0x7f0000000440), 0xffffffffffffff0c) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000200)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00') 03:35:21 executing program 3: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'}, 0x48) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e21, @empty}, 0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x200, 0x20}, &(0x7f0000000280)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={r2, 0x2d4f}, &(0x7f0000000300)=0x8) set_tid_address(&(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000440)='syz1\x00', 0x1ff) 03:35:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f00000000c0)={0x4, 0x2, {0x2, 0x3, 0x1, 0x0, 0x100000000}}) write$P9_RUNLINKAT(r1, &(0x7f0000000140)={0x7, 0x4d, 0x2}, 0x7) socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="480000001000030d000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000280012000c000100697036746e6c00001800020014006be840a7159c332ffe59ce81b8b2fc1a26525f5cd009000000000000004d575ee27be0aa3205312b0d0687"], 0x48}}, 0x0) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f00000001c0)='NET_DM\x00') r4 = inotify_add_watch(r2, &(0x7f0000000340)='./file0\x00', 0x1) inotify_rm_watch(r1, r4) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000300)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2000}, 0xfffffffffffffda4, &(0x7f00000002c0)={&(0x7f0000000380)={0x14, r3, 0x500, 0x70bd27, 0x25dfdbff, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40004008000}, 0x20000000) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000780)={{{@in6=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000880)=0xe8) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f0000000440)='erofs\x00', &(0x7f0000000480)='./file0/file0\x00', 0x101, 0x3, &(0x7f0000000700)=[{&(0x7f00000004c0)="03e4f21ce232593dea771349d63737f59f7bce5bba8944c458320758297a51edb2f289226ac1aa0d13b726b22a8fc18163482f4eec2509c6ddea15619bd1d2a84444d95214e892de1e9b07480f29903c88750b62582a4267214682640c33a423331c7ba649ada76589e6fa179a4f5aaae4d5abbe617313bdea812c54c1ca1fc2b9aa56c851f92bd2e951c56e9750873a98e9232eab22198c06eca186322f314a8f05067d58c81e59647a3acddc5d0b2104ece78a7b2094c8acc529cb06f8eb0bdfdd140e1e95bf36fcb85b39316463c6eee0ef4bd2eaf6014b09d18aa2c894caefc8614b345d02cfe021519f63bd30e217914f6a73", 0xf5, 0x5}, {&(0x7f00000005c0)="c1c7514462a5f53f5141ff1df0e54307196ce8e38dede11a2e8c6e7d16d263811f7a40a9b3dbf7a68562ad88f5d180", 0x2f, 0x1000}, {&(0x7f0000000600)="d9321c9f1cc75e711c02607975276324e52f4e1064062fe632e8d5c7d9348a7b9847d3af258f66635010cb5e406404753132c4deaeb2e47f17f7e9fbf8d2571aba7706c188c0cb1064cec3e5f951eafbba9d642c377e0ec876e5a24b41552bc431634f197cf13190157ae54ae830a63e5a7db6b4d392722a8fc430ea13f3848009b5ad80553d68523edba597d87d90c1b21a32cbb36686a0dec4691c7a51250e6c0a4367d9bec6a082b9820dcadb8a21b22345c0c888723cbafb5d102c1e1231ab51ef297855028780f2156b48c60e537656a9dda3b348a74ae4bfcdf84a10bbe31879b5613fa281c4c9be95a3da66fc8e76", 0xf2, 0x2}], 0x800000, &(0x7f0000000a40)={[{@acl='acl'}, {@user_xattr='user_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@acl='acl'}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}], [{@uid_lt={'uid<', r5}}, {@smackfsroot={'smackfsroot', 0x3d, '/cgroupeth0vmnet1self}'}}, {@audit='audit'}, {@euid_gt={'euid>', r6}}, {@uid_gt={'uid>', r7}}, {@appraise_type='appraise_type=imasig'}]}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={0x0, 0x1aa167d0, 0x0, 0x5, 0x10000}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000400)={r8, 0x9, 0xfff, 0xf48}, 0x10) [ 236.188302] audit: type=1400 audit(1551756921.696:45): avc: denied { prog_load } for pid=8239 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 236.232113] protocol 88fb is buggy, dev hsr_slave_0 [ 236.237374] protocol 88fb is buggy, dev hsr_slave_1 [ 236.325776] raw_sendmsg: syz-executor.4 forgot to set AF_INET. Fix it! [ 236.444330] audit: type=1400 audit(1551756921.956:46): avc: denied { map_create } for pid=8236 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:36:18 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = eventfd(0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$eventfd(r0, &(0x7f0000000040), 0xfffffffffffffd57) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/psched\x00') sendfile(r0, r1, 0x0, 0xffffffff) 03:36:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000002c0)={0x2, &(0x7f0000000280)=[{0x3, 0x1, 0x9}, {0x9, 0x9, 0xfdf2, 0xc9ee}]}, 0x10) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='bpf\x00', 0x6, &(0x7f0000000140)={[{@mode={'mode', 0x3d, 0x1000000000000}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x2623fa78}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0x68a0a6b5}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xffff}}, {@mode={'mode', 0x3d, 0x81}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}]}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x880, 0x0) 03:36:18 executing program 2: r0 = socket(0x10, 0x100000000002, 0x0) sendto(r0, &(0x7f0000000000)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(r0, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000600)=0x14) getsockname$packet(r0, &(0x7f0000000640)={0x11, 0x0, 0x0}, &(0x7f0000000680)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000006c0)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@initdev}}, &(0x7f00000007c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000800)={'team0\x00', 0x0}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='highspeed\x00', 0xa) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f00000001c0)={0x3, @default, r5}) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000a00)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="60010000", @ANYRES16=r1, @ANYBLOB="01032dfa26a25e29c5c038eebd7000fbdbdf", @ANYRES32=r2, @ANYBLOB="bc0002003c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000000c000400faffed01cc00000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b000000080004000600000008000700000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="800002003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r6, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b00000008000400030000000800070000000000"], 0x160}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000800) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x1210}, {&(0x7f00000024c0)=""/4096, 0x1008}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x22}], 0x2, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 03:36:18 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffa}, 0x0, 0x8) gettid() r0 = syz_open_dev$media(&(0x7f0000000a40)='/dev/media#\x00', 0x7ff, 0x58000) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000a80)) timer_create(0x0, &(0x7f0000000040)={0x0, 0x8, 0x3, @thr={&(0x7f00000007c0)="510529cabd5b66d4c333611db2d533de695e6cac7cab1f941bed12b4468e1fc5b1764f2ffe2c31baa94ad2f3315c9a1d4569c2530f5abb1484f3d26949cad897b939fca0b87c5e9a177d48eee7ca12c34dbddc68b93a64241dd2088253afd9acc4f80de4f176753cd0974a57daf4bf94863874e0e7e219825e482aaa3a1d7d32b323dd1617632937268c41651cfa392292404f2cc40616796be3f799faa3a3f240a807b3a9a8a253fa2051f0fbf3e6f375a7599aeb0342aa8605058caf858733d52a6d47616137", &(0x7f00000008c0)="8a7c350b0dd10fb12e4c1185291c734a375eede22cd6e01e39d5d7b703ad514b247ef5953d012a5c95c0b2161f85d6c68e89ff07690eddce6dd279d52241adc3485830841efdf57150aeb5e222ba4d8b577fb7ee6769df4daa714ee6bbad59f3b856208a96ff3c841f445e74913aa0d9c243fa342feb5090347e3ad6acd8f7adafdfe5ab6224f150475010d351480981c5cbaaac56f5c29ba8aaf2859ed4bd5b43b67f8c4b0b2b59d0025d8812"}}, &(0x7f0000000100)) r1 = getuid() syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2a8, 0x4, &(0x7f0000000380)=[{&(0x7f0000000180)="08d81db7dd11b2a006be97e37f60d6ed58713ba9f23bdb02d61b9dd84379259c9575ce94c06c7e48108b452506883e0b1896849b6df38e5633cc5a69d5e06e0577294cb8a849011862fa38969b13ab1e6beab862f0d7f52b21f824bd318cc97312", 0x61, 0x5}, {&(0x7f0000000200)="4513a9dc38c65164ccc46a52afe96bd3e2e0202771ecbb4f1b563b518a05170b440d008d60fba8b6e79e8b966a321388ea25d32e6cc76691b3b775bf5cc0d8da29e5d03ebee806cf9843d832f8fc1f4dcaf46d28bcebbd6324944e2d50c12265159930dacd87896505ee1fa2db316e6141fc589b80e15d57e16b24bff6616659ee91cf128f9b3c2bc9165cb2c2dc51b69247360476d667cfb3909bcafdf141244cc28b6e111046ee527e64bf5b3a645536729630824bb02f5bdb0e7a37fd3e321cb46d8438ff42fdaf4a22b1cf3f787d885bae55571eb03e39b18ed0e73fc1b1ba309de5c0f7f326eb86ef73", 0xec}, {&(0x7f0000000440)="8bbb1f360d5dadc449e33134d719eb9437273ed7d0b1b4eee75448b1c8fb74a8c27a60729137db854eb4ce6a2e32974f0f54e8dc9d196bf334e2fefb3c023e143dde4db8d29f89eb4e5cfd67bd860f045ae46206130be91328a77b4f888a9902ef9d4f841700d6aeff68626b9e5469117dcc3396c499ec652d253d2f614635536f28b3db47bf68f75aae514571faf18a66b9b9d033af07f7b9ef49f3b36b527718dd7c6d5e91dd94c8b87d7977d5e0228c1544d09a2737b8240d135b6dd3", 0xbe, 0xfc}, {&(0x7f0000000500)="41b0bb5acb7f09fccb7738b57203f614f30d03ee942af579526311c004746fb0adbcecba1bb60296bba82e0741e8fbd0398543391754e514f0fc147758fcff093ecc85eb97998a4f013dec920c8f7f9957b684be340bf2b7c4d8b04cdb6d457f49ae54d290c2544099ae4ab86c8b28bc77f24143259dfa8c0124f0c2ed54c666249c7de4165d363bd4b050896c24bd58ebdb25522988b5abcd36e7add618dd2fbb1e25dc67959c33753ab6efb450", 0xae, 0x3}], 0x4db4394e1f506eab, &(0x7f00000006c0)=ANY=[@ANYBLOB="6e642c696e746567726974792c646973636172646c726573698c653db0a2690f8dc4d701007830300d30303030303030303030656d6f756e742d726f2c666f776e65723e00000000000000000000000000000000e229bb0c7c61984c5996ea536f1bd4ea6e694783bcc57bdbff4eebcd8fcc636f983d70adfd399b3e7f95d7f579969b3776855e63167183020c5b66ab7a63c99907e940cd0c208083899cc2686a8d138eb4c3f150c0603cfcd8f3498ab7683018edcc50181d0396f0ccfbf6a5", @ANYRESDEC=r1, @ANYBLOB=',\x00']) r2 = syz_open_dev$dri(&(0x7f0000000300)='/dev/dri/card#\x00', 0x0, 0x40000) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000980)='/proc/capi/capi20\x00', 0x900, 0x0) ioctl$KVM_GET_MSRS(r3, 0xc008ae88, &(0x7f00000009c0)={0x5, 0x0, [{}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_AGP_ENABLE(r2, 0x40086432, &(0x7f00000005c0)=0x400) timer_settime(0x0, 0x1, &(0x7f0000000000)={{0x77359400}, {0x0, 0xe4c}}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) accept4(r3, 0x0, &(0x7f0000000b00), 0x80000) r4 = syz_open_dev$audion(&(0x7f0000000600)='/dev/audio#\x00', 0x9, 0x0) ioctl$sock_rose_SIOCDELRT(r4, 0x890c, &(0x7f0000000640)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6, @bcast, @netrom={'nr', 0x0}, 0x5, [@null, @null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) timer_settime(0x0, 0x10, &(0x7f0000000340), &(0x7f0000000400)) r5 = shmget$private(0x0, 0x1000, 0x400, &(0x7f0000ffc000/0x1000)=nil) shmctl$SHM_INFO(r5, 0xe, &(0x7f0000000ac0)=""/8) 03:36:18 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) clock_nanosleep(0x0, 0x1, &(0x7f0000000000), &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) kexec_load(0x0, 0x10, &(0x7f00000000c0)=[{0x0}], 0x1) 03:36:18 executing program 4: r0 = socket$kcm(0x29, 0x3, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x3e6, 0xf687, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000600)='./file0\x00', 0x0, 0x10}, 0xfffffffffffffd3d) close(r0) r3 = socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8981, &(0x7f0000000400)=0x400) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r3, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="d0000000000000001d01000007000000c468b029d8c620a28adf19fe4cb328a6321021969af7ddc2eaf4fc71fd3ca692e014bf516030d17e660400000033074c7b1df6370f320a6c06782e5053ea357f5707e68ed5be8d39ea37b7717f41f6205f383ed37db61e162c79aca215502c5e4a9230d0e0841c2fe1a5076597512ef625c5031406e96e9aba5efd662a14b06e5503ca5ecd2671a125f8764922375fecadfbc176618ef31a4e6826da36f2c1f25da9a075f8d0095c9d5153d245d90931cf4d9de9df495f5ed0f7960000000000"], 0xd0}, 0x200) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x23ffe, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', r2}, 0x10) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x200082}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000004c0)={r0, r6}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$TUNATTACHFILTER(r8, 0x401054d5, &(0x7f0000000340)={0x3, &(0x7f0000000300)=[{0xfffffffffffffffa, 0x0, 0x1, 0x400}, {0x401, 0xfff, 0x3ff, 0x5}, {0x40, 0x1000, 0x1f, 0x200}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) sendmsg(r3, &(0x7f0000000140)={&(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000900)="b046149aa952a80d444f0f9ee0d725ff602d48ad443c530b6ce69da95fc4419e926b8b19a0a8d8ba93ad90322ed1e0178f689e924ee560d07b71016875904cae3590d142bf21f31f2a2b97957b0a727d8b71a3aee41b3f34d3e323d21c3eeed80dad61afb912d13bc385837eaa1bccd949625e5e99cc7a71194c5a053f6525c957c7125d934517b64fcec10f", 0x8c}], 0x1, 0x0, 0x0, 0x4000}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$cgroup_ro(r7, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) ioctl$SIOCSIFHWADDR(r10, 0x8924, &(0x7f00000000c0)={'bond0\x00', @random="01003a1e2410"}) perf_event_open(&(0x7f0000000540)={0x7, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0xc8, 0x81, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0xfffffffffffffffe, 0x20, 0xfff, 0x0, 0x2, 0x0, 0x10001, 0x0, 0x0, 0x7fff, 0x2, 0x9, 0x8, 0x0, 0x85, 0xe67, 0x0, 0x7fa5, 0x0, 0x100000000, 0x0, @perf_config_ext, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x39a74eb3, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r9, &(0x7f0000000440), 0xffffffffffffff0c) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000200)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00') 03:36:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x0) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[@ANYRES32], 0x4) sendfile(r0, r1, &(0x7f0000000000), 0xffff) 03:36:18 executing program 1: r0 = memfd_create(&(0x7f00000005c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x0) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) fchmod(r0, 0x0) 03:36:18 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) gettid() ftruncate(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x14, 0x40000000000013, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}}, 0x0) 03:36:18 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) request_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000000)={'sy.', 0x2}, 0x0, 0x0) 03:36:19 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fstat(r0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x1, 0x1, &(0x7f0000000740)=[{0x0, 0x0, 0x8}], 0x0, &(0x7f00000008c0)={[{@minixdf='minixdf'}, {@data_err_abort='data_err=abort'}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0xe371aee43937e6cf, 0x31, 0x61, 0x62, 0x32, 0x33, 0x62], 0x2d, [0x73, 0x37, 0x62, 0x67], 0x2d, [0x67, 0x35, 0x39, 0x35], 0x2d, [0x75, 0x7b, 0x3e, 0x75], 0x2d, [0x36, 0x77, 0x77, 0x63, 0x63, 0x37, 0x30, 0x32]}}}, {@fowner_eq={'fowner', 0x3d, r2}}]}) getitimer(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x0, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x1000000004e23, @local}, 0x10) sendto$inet(r1, &(0x7f0000000b40)="762d013abf428f831f537d10987f3f009e134c11cb6b5d479d61fac22b7c399e31904cab65dc1f2efc95ac1348db76ab634cf0fbde36acede0e45438773d28036919fd3c82e3622eb6f099", 0x4b, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000006dc0)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000006b80)=[{{&(0x7f0000000a00)=@can, 0x80, &(0x7f0000003dc0)=[{&(0x7f0000000a80)=""/175, 0xaf}, {&(0x7f0000003bc0)=""/112, 0x70}, {&(0x7f0000003c40)=""/92, 0x5c}, {&(0x7f0000003cc0)=""/176, 0xb0}, {&(0x7f0000003d80)=""/14, 0xe}], 0x5, &(0x7f0000003e40)=""/230, 0xe6}, 0xb492}, {{&(0x7f0000003f40)=@ipx, 0x80, &(0x7f0000004140)=[{&(0x7f0000003fc0)=""/71, 0x47}, {&(0x7f0000004040)=""/227, 0xe3}], 0x2, &(0x7f0000004180)=""/25, 0x19}, 0x6}, {{&(0x7f00000041c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000004340)=[{&(0x7f0000004240)=""/227, 0xe3}], 0x1}, 0x400}, {{&(0x7f0000004480)=@generic, 0x80, &(0x7f00000046c0)=[{&(0x7f0000004500)=""/210, 0xd2}, {&(0x7f0000004600)=""/173, 0xad}], 0x2, &(0x7f0000004700)=""/103, 0x67}, 0x37378a17}, {{0x0, 0x0, &(0x7f0000004b80)=[{&(0x7f0000004880)}, {&(0x7f00000048c0)=""/141, 0x8d}, {&(0x7f0000004980)=""/55, 0x37}, {&(0x7f00000049c0)=""/209, 0xd1}, {0x0}], 0x5, &(0x7f0000004c00)=""/4096, 0x1000}, 0xffffffffffffff80}, {{&(0x7f0000005c00)=@nfc, 0x80, &(0x7f0000006340)=[{&(0x7f0000005c80)=""/160, 0xa0}, {&(0x7f0000005d40)=""/8, 0x8}, {&(0x7f0000005d80)=""/232, 0xe8}, {&(0x7f0000005e80)=""/128, 0x80}, {&(0x7f0000005f00)=""/142, 0x8e}, {&(0x7f0000005fc0)=""/195, 0xc3}, {&(0x7f0000006140)=""/201, 0xc9}, {&(0x7f0000006240)=""/255, 0xff}], 0x8, &(0x7f0000006400)=""/122, 0x7a}, 0x8}, {{&(0x7f0000006480)=@nfc, 0x80, &(0x7f0000006680)=[{&(0x7f0000006500)=""/127, 0x7f}, {&(0x7f0000006580)=""/2, 0x2}, {&(0x7f00000065c0)=""/189, 0xbd}], 0x3}, 0x6}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000006700)=""/128, 0x80}}, {{&(0x7f0000006780)=@tipc, 0x80, &(0x7f0000006b00)=[{&(0x7f0000006800)=""/197, 0xc5}, {&(0x7f0000006900)=""/242, 0xf2}, {&(0x7f0000006a00)=""/206, 0xce}], 0x3, &(0x7f0000006b40)=""/54, 0x36}, 0x9}], 0x9, 0x40000100, &(0x7f0000006e00)={r3, r4+30000000}) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000002c0)=0xda8, 0x171) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000980)={0x0, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @rand_addr=0x9}, {0x2, 0x4e24, @rand_addr=0xed9}, 0x0, 0x0, 0x0, 0x0, 0x8870, &(0x7f0000000940)='netdevsim0\x00', 0xffffffffffffffff, 0xd311, 0x2}) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f00000001c0)=0x3) unlink(&(0x7f0000000000)='./file0\x00') ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000080)='teql0\x00') 03:36:19 executing program 3: r0 = socket$kcm(0x29, 0x3, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x3e6, 0xf687, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000600)='./file0\x00', 0x0, 0x10}, 0xfffffffffffffd3d) close(r0) r3 = socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8981, &(0x7f0000000400)=0x400) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r3, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="d0000000000000001d01000007000000c468b029d8c620a28adf19fe4cb328a6321021969af7ddc2eaf4fc71fd3ca692e014bf516030d17e660400000033074c7b1df6370f320a6c06782e5053ea357f5707e68ed5be8d39ea37b7717f41f6205f383ed37db61e162c79aca215502c5e4a9230d0e0841c2fe1a5076597512ef625c5031406e96e9aba5efd662a14b06e5503ca5ecd2671a125f8764922375fecadfbc176618ef31a4e6826da36f2c1f25da9a075f8d0095c9d5153d245d90931cf4d9de9df495f5ed0f7960000000000"], 0xd0}, 0x200) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x23ffe, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', r2}, 0x10) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x200082}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000004c0)={r0, r6}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$TUNATTACHFILTER(r8, 0x401054d5, &(0x7f0000000340)={0x3, &(0x7f0000000300)=[{0xfffffffffffffffa, 0x0, 0x1, 0x400}, {0x401, 0xfff, 0x3ff, 0x5}, {0x40, 0x1000, 0x1f, 0x200}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) sendmsg(r3, &(0x7f0000000140)={&(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000900)="b046149aa952a80d444f0f9ee0d725ff602d48ad443c530b6ce69da95fc4419e926b8b19a0a8d8ba93ad90322ed1e0178f689e924ee560d07b71016875904cae3590d142bf21f31f2a2b97957b0a727d8b71a3aee41b3f34d3e323d21c3eeed80dad61afb912d13bc385837eaa1bccd949625e5e99cc7a71194c5a053f6525c957c7125d934517b64fcec10f", 0x8c}], 0x1, 0x0, 0x0, 0x4000}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$cgroup_ro(r7, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) ioctl$SIOCSIFHWADDR(r10, 0x8924, &(0x7f00000000c0)={'bond0\x00', @random="01003a1e2410"}) perf_event_open(&(0x7f0000000540)={0x7, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0xc8, 0x81, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0xfffffffffffffffe, 0x20, 0xfff, 0x0, 0x2, 0x0, 0x10001, 0x0, 0x0, 0x7fff, 0x2, 0x9, 0x8, 0x0, 0x85, 0xe67, 0x0, 0x7fa5, 0x0, 0x100000000, 0x0, @perf_config_ext, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x39a74eb3, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r9, &(0x7f0000000440), 0xffffffffffffff0c) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000200)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00') [ 293.721203] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 293.785337] device bridge_slave_1 left promiscuous mode [ 293.812858] bridge0: port 2(bridge_slave_1) entered disabled state [ 293.907605] device bridge_slave_0 left promiscuous mode [ 293.927749] bridge0: port 1(bridge_slave_0) entered disabled state [ 294.237341] device hsr_slave_1 left promiscuous mode [ 294.304161] device hsr_slave_0 left promiscuous mode [ 294.365071] team0 (unregistering): Port device team_slave_1 removed [ 294.386043] team0 (unregistering): Port device team_slave_0 removed [ 294.422764] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 294.586289] bond0 (unregistering): Released all slaves [ 295.651465] IPVS: ftp: loaded support on port[0] = 21 [ 295.754458] chnl_net:caif_netlink_parms(): no params data found [ 295.793282] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.799752] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.806905] device bridge_slave_0 entered promiscuous mode [ 295.814821] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.821233] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.830850] device bridge_slave_1 entered promiscuous mode [ 295.849074] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 295.859064] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 295.892467] team0: Port device team_slave_0 added [ 295.898954] team0: Port device team_slave_1 added [ 295.984831] device hsr_slave_0 entered promiscuous mode [ 296.022317] device hsr_slave_1 entered promiscuous mode [ 296.072016] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.078374] bridge0: port 2(bridge_slave_1) entered forwarding state [ 296.085037] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.091510] bridge0: port 1(bridge_slave_0) entered forwarding state [ 296.127981] 8021q: adding VLAN 0 to HW filter on device bond0 [ 296.138380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 296.146859] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.154353] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.161729] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 296.172886] 8021q: adding VLAN 0 to HW filter on device team0 [ 296.181708] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 296.190324] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.196724] bridge0: port 1(bridge_slave_0) entered forwarding state [ 296.213676] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 296.221275] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.227689] bridge0: port 2(bridge_slave_1) entered forwarding state [ 296.235359] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 296.243328] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 296.253626] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 296.264951] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 296.276735] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 296.287209] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 296.294598] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 296.310117] 8021q: adding VLAN 0 to HW filter on device batadv0 03:36:22 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) write$binfmt_elf32(r0, &(0x7f0000000880)=ANY=[@ANYBLOB="7f454c460101093a02000000000057590dffd9e0dfff29d2b3830000030003000400000065010000380000006703000002000000080020000200190001000900000000000700000009000000000000003f00000000000000380200000700000008000000060000009b000000080000000400000007000000be0a0000010000000100010074d7a15fd20e76ef51343fdbb394bceaf38c401c4f1b41ff132db21e8bef856f8eab1268c705574093394a543f051160d58fed737ea57885667493280466bb1f148964691f32b458bd1fe389b8c21a6494837b27da0f038f6953ce09e1d4951b3db92888a89887231fe2b5a490e7881cd0562533de00030614fb87992b0e762de8b1d7584be1ee841e36cbaee7887073cbc8718460038b3c28455f86c9be9e84271643a27fa9c03ed057d198a9a41cb7f7854232eb593a4eea15a607ff9e0a0613367da3c099e165da9a2760edf76b46bbd5c02b27c2c43629f8b4bcbb02fc1bb29e8f74545656308a8e2f875970e2aa63205c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x36b) r1 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x5, 0x8002) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000300)={0x5342bd4b, 0x6, 0x4, 0x2, {r2, r3/1000+30000}, {0x3, 0x2, 0x0, 0x4, 0xfffffffffffffffb, 0x2, "0c67489c"}, 0x10000000, 0x3, @planes=&(0x7f00000002c0)={0xffffffff00000001, 0x8fe, @fd, 0x10000}, 0x4}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0xfcda) setsockopt$inet_int(r0, 0x0, 0x12, &(0x7f00000000c0)=0x2, 0x4) sendto$unix(r0, 0x0, 0x0, 0x1, &(0x7f0000000100)=@abs={0x0, 0x0, 0x10000e0}, 0x451) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, &(0x7f0000000180)="46403a54405268aaa34d94028385646a33273cb1b3850aa2e179282dbb0c045fa38ccba6b500a5cfb7191c7a42ab892bdd095bf10f371cfc193b236bfe94b06fffc5ebef872b8f22c9b1d9e9b4256a1111b2f7d94dc9a11a024201a5c035d3f4bb14d8a02b3eaef6b20d8c16f31e7667", 0x70) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000000080)=0x4, 0x4) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/175, 0x33}], 0x1) 03:36:22 executing program 2: r0 = socket$kcm(0x29, 0x3, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x3e6, 0xf687, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000600)='./file0\x00', 0x0, 0x10}, 0xfffffffffffffd3d) close(r0) r3 = socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8981, &(0x7f0000000400)=0x400) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r3, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="d0000000000000001d01000007000000c468b029d8c620a28adf19fe4cb328a6321021969af7ddc2eaf4fc71fd3ca692e014bf516030d17e660400000033074c7b1df6370f320a6c06782e5053ea357f5707e68ed5be8d39ea37b7717f41f6205f383ed37db61e162c79aca215502c5e4a9230d0e0841c2fe1a5076597512ef625c5031406e96e9aba5efd662a14b06e5503ca5ecd2671a125f8764922375fecadfbc176618ef31a4e6826da36f2c1f25da9a075f8d0095c9d5153d245d90931cf4d9de9df495f5ed0f7960000000000"], 0xd0}, 0x200) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x23ffe, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', r2}, 0x10) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x200082}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000004c0)={r0, r6}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$TUNATTACHFILTER(r8, 0x401054d5, &(0x7f0000000340)={0x3, &(0x7f0000000300)=[{0xfffffffffffffffa, 0x0, 0x1, 0x400}, {0x401, 0xfff, 0x3ff, 0x5}, {0x40, 0x1000, 0x1f, 0x200}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) sendmsg(r3, &(0x7f0000000140)={&(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000900)="b046149aa952a80d444f0f9ee0d725ff602d48ad443c530b6ce69da95fc4419e926b8b19a0a8d8ba93ad90322ed1e0178f689e924ee560d07b71016875904cae3590d142bf21f31f2a2b97957b0a727d8b71a3aee41b3f34d3e323d21c3eeed80dad61afb912d13bc385837eaa1bccd949625e5e99cc7a71194c5a053f6525c957c7125d934517b64fcec10f", 0x8c}], 0x1, 0x0, 0x0, 0x4000}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$cgroup_ro(r7, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) ioctl$SIOCSIFHWADDR(r10, 0x8924, &(0x7f00000000c0)={'bond0\x00', @random="01003a1e2410"}) perf_event_open(&(0x7f0000000540)={0x7, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0xc8, 0x81, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0xfffffffffffffffe, 0x20, 0xfff, 0x0, 0x2, 0x0, 0x10001, 0x0, 0x0, 0x7fff, 0x2, 0x9, 0x8, 0x0, 0x85, 0xe67, 0x0, 0x7fa5, 0x0, 0x100000000, 0x0, @perf_config_ext, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x39a74eb3, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r9, &(0x7f0000000440), 0xffffffffffffff0c) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000200)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00') 03:36:22 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "00f40c442848cb166b002ee8dc4da7ae20d7c965d4fab6ad71c0ff03aa506b39b663e1c4c87d263fc05a6a042b6feba7da240eb2ca83e630e3b925b24361dc", 0x5}, 0x60) bind$nfc_llcp(r0, &(0x7f0000000080)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "6cb782e4ad88b89d1fd309169f44a72107130ee55d660510420aaa96759ecbc36eb9bb12b6124793608dd0e7316d1d4f4dbac39877e4ac714b7ecefa8a934a"}, 0x60) 03:36:22 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000040)=ANY=[@ANYBLOB="020000000000000000001600020000a1000000000000092bab3b0000000000d315010000000000000000f9845ca000000000010000000000"]) 03:36:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x8000, 0x6, 0x81, 0x1, 0xffff, 0x1}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) 03:36:22 executing program 3: r0 = socket$kcm(0x29, 0x3, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x3e6, 0xf687, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000600)='./file0\x00', 0x0, 0x10}, 0xfffffffffffffd3d) close(r0) r3 = socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8981, &(0x7f0000000400)=0x400) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r3, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="d0000000000000001d01000007000000c468b029d8c620a28adf19fe4cb328a6321021969af7ddc2eaf4fc71fd3ca692e014bf516030d17e660400000033074c7b1df6370f320a6c06782e5053ea357f5707e68ed5be8d39ea37b7717f41f6205f383ed37db61e162c79aca215502c5e4a9230d0e0841c2fe1a5076597512ef625c5031406e96e9aba5efd662a14b06e5503ca5ecd2671a125f8764922375fecadfbc176618ef31a4e6826da36f2c1f25da9a075f8d0095c9d5153d245d90931cf4d9de9df495f5ed0f7960000000000"], 0xd0}, 0x200) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x23ffe, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', r2}, 0x10) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x200082}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000004c0)={r0, r6}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$TUNATTACHFILTER(r8, 0x401054d5, &(0x7f0000000340)={0x3, &(0x7f0000000300)=[{0xfffffffffffffffa, 0x0, 0x1, 0x400}, {0x401, 0xfff, 0x3ff, 0x5}, {0x40, 0x1000, 0x1f, 0x200}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) sendmsg(r3, &(0x7f0000000140)={&(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000900)="b046149aa952a80d444f0f9ee0d725ff602d48ad443c530b6ce69da95fc4419e926b8b19a0a8d8ba93ad90322ed1e0178f689e924ee560d07b71016875904cae3590d142bf21f31f2a2b97957b0a727d8b71a3aee41b3f34d3e323d21c3eeed80dad61afb912d13bc385837eaa1bccd949625e5e99cc7a71194c5a053f6525c957c7125d934517b64fcec10f", 0x8c}], 0x1, 0x0, 0x0, 0x4000}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$cgroup_ro(r7, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) ioctl$SIOCSIFHWADDR(r10, 0x8924, &(0x7f00000000c0)={'bond0\x00', @random="01003a1e2410"}) perf_event_open(&(0x7f0000000540)={0x7, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0xc8, 0x81, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0xfffffffffffffffe, 0x20, 0xfff, 0x0, 0x2, 0x0, 0x10001, 0x0, 0x0, 0x7fff, 0x2, 0x9, 0x8, 0x0, 0x85, 0xe67, 0x0, 0x7fa5, 0x0, 0x100000000, 0x0, @perf_config_ext, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x39a74eb3, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r9, &(0x7f0000000440), 0xffffffffffffff0c) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000200)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00') 03:36:22 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xffffffffffffffe0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffe84) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) [ 297.253345] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 03:36:22 executing program 1: clone(0x602102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x80001, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x101080, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000140)=0x7) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @multicast1}, 0x10) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x4e21, @empty}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @loopback}, 0x10) 03:36:23 executing program 4: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000600)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iqv\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x00\x00\x00\x00\x00\x00\x00\xae\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00.g\x10H\xa8\xc9\x1f\xfc\x1e\xdfF\x16K\a@\x8c7\x1d!\xfd\xb0\xefW\x8f\xb8\x19\x8dS\xcer\x00SE\xdcD\xd2\x98\fy\x8dQ?7m\x9a\xe3\xca\xb0~\xdb*\xa7\xbf\xeftV\xa1\x94\x911\xa7\x8cYiY\xd2\xecF\xec\xb4/\xca\x97~^o\xd74\x11\'\xe1\xce\x06\xe1\xebV\xfd\xaa\x19\xd3\x14\xad\xea=o\xf2\x15g\xa9\xca\xa7\xc6\xd6\xaa\x86\xcc\x03\xcfD\xfe\x0f\xd4\xa7\x9f\xd8\n\x13T\x83\xdb\x19}\xf1\xa9\xac\x9eV\xb9\x15\x852\xfd\xaea\xff\xcb\x86d:\n\x85\x807]\x96\xb4\x96\xbc\xa6\xe6\x86\x80Gy\xfe\x8c\x1aV\xce\xb2h\xfd\xee*\xf0\xb3\xc38o\xac\x96Y\xa6\x81~\x8e\x8b@k\x7f\x88\xdd<}\x91\x83\xb0[\xff\xe3\xb9\xc6P\xd7\xc9\x87 \xef\xc9M\xa7\xbc\x1c\xa4~\x9b\xee\x94\x02&\x980\x10\x96\x96\\\x00\x00\x00\x00\x00', 0x0) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80000) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000040)) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000200)=',', 0x1}], 0x1, 0x4081806) sendfile(r0, r1, 0x0, 0x20020102000007) ftruncate(r0, 0xe6) 03:36:23 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) request_key(0x0, 0x0, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000000)={0x80000000}, 0x0, &(0x7f0000000080)={0x77359400}, 0x8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r2, 0xc018aec0, &(0x7f0000000100)={0x0, 0x0}) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, 0x0) clock_gettime(0xb, &(0x7f0000000440)) [ 297.739622] device nr0 entered promiscuous mode 03:36:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) fsetxattr$security_ima(r0, &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@sha1={0x1, "cf2194507ff3a9f0c9c5d5d6c1ffacd93c72638f"}, 0x15, 0x3) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f00000000c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:36:23 executing program 5: r0 = fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$setregset(0x4205, r0, 0x3, &(0x7f0000000040)={&(0x7f0000000000)="1a582f508a740a1f56a2cd7f4ea036ef9eaa0c", 0x13}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000580)=""/4096, 0x1000}], 0x1}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 298.084988] kvm: emulating exchange as write 03:36:23 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x24) mlockall(0x3) mmap(&(0x7f0000428000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0xffffffffffffffff) r1 = fcntl$getown(r0, 0x9) r2 = syz_open_procfs(r1, &(0x7f0000000100)='numa_maps\x00') readv(r2, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x7ffff000}], 0x1) 03:36:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000140)=@xdp, 0x80, &(0x7f0000001340), 0x0, &(0x7f00000013c0)=""/141, 0x8d}}], 0x1, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000540)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) readlink(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f00000007c0)=""/199, 0xc7) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/loop-control\x00', 0x40, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = creat(0x0, 0x1a7) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000700)={0x16, 0x98, 0xfa00, {&(0x7f0000000340), 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}, 0x800}}}, 0xa0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000800)=ANY=[], &(0x7f00000002c0)) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="0101b918928c98007500"], &(0x7f00000005c0)=0xe) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000640)=ANY=[@ANYRES32=r6, @ANYBLOB="0800040006000600ffff20000200"], &(0x7f0000000680)=0x12) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000140)={r4}) ioctl$RNDCLEARPOOL(r4, 0x5206, &(0x7f0000000240)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000600)='/dev/qat_adf_ctl\x00', 0x0, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) getsockname(r4, &(0x7f00000001c0)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, &(0x7f0000000280)=0x80) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYRES64=0x0, @ANYRESDEC=0x0, @ANYRES16=r5], &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) creat(&(0x7f0000000480)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x5f}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) 03:36:24 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'ip6gretap0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="38000000100001000000000000000000000000008abf3a5ed04b103aee73e5139f71", @ANYRES32=r1, @ANYBLOB="0000000000000000180012001000020069703667726574617000000004000200"], 0x38}}, 0x0) accept(r0, 0x0, &(0x7f0000000040)) [ 298.693399] audit: type=1400 audit(1551756984.206:47): avc: denied { prog_run } for pid=8397 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:36:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dsp\x00', 0x800, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) r1 = socket(0x11, 0x802, 0x0) preadv(r0, 0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000140)={0x7, 0x80000000}) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, 0x0) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000180)={0x0, 0x1}) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f0000000100)=0xd4c) socket(0x0, 0x801, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x7, 0x0, 0x20, 0x0, 0x80000001, 0x0, 0x7fffffff}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) getpid() socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000280)) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x1000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f00000000c0)={0x0, 0x0, 0xfff, 0x0, 0x78b}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\xfe\x02\xff', 0x4bfd}) socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'bpq0\x00', @remote}) [ 298.779739] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 298.858275] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 03:36:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000140)=@xdp, 0x80, &(0x7f0000001340), 0x0, &(0x7f00000013c0)=""/141, 0x8d}}], 0x1, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000540)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) readlink(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f00000007c0)=""/199, 0xc7) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/loop-control\x00', 0x40, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = creat(0x0, 0x1a7) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000700)={0x16, 0x98, 0xfa00, {&(0x7f0000000340), 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}, 0x800}}}, 0xa0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000800)=ANY=[], &(0x7f00000002c0)) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="0101b918928c98007500"], &(0x7f00000005c0)=0xe) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000640)=ANY=[@ANYRES32=r6, @ANYBLOB="0800040006000600ffff20000200"], &(0x7f0000000680)=0x12) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000140)={r4}) ioctl$RNDCLEARPOOL(r4, 0x5206, &(0x7f0000000240)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000600)='/dev/qat_adf_ctl\x00', 0x0, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) getsockname(r4, &(0x7f00000001c0)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, &(0x7f0000000280)=0x80) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYRES64=0x0, @ANYRESDEC=0x0, @ANYRES16=r5], &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) creat(&(0x7f0000000480)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x5f}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) [ 299.000522] device team0 entered promiscuous mode [ 299.025894] device team_slave_0 entered promiscuous mode [ 299.070682] device team_slave_1 entered promiscuous mode [ 299.121837] 8021q: adding VLAN 0 to HW filter on device team0 [ 299.174403] 8021q: adding VLAN 0 to HW filter on device team0 03:36:24 executing program 3: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000100)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1000000000}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0xffffffffffffffff, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0xfffffffffffffffc, 0x5, 0x1000000000}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) fcntl$getown(r0, 0x9) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) 03:36:24 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x10001, 0x80000) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r1, &(0x7f0000000080)="5ad598cb521d1a90c1f8b2422e4e946b7e9260aba1df43b659f59ddf9748d32800f36936382a2621636ac68de67ff81c6f9b908bbaf8b7da31b946d1b54622acfeecee91903adcba394c09ca73cdf4f704a1e1d72090f7009ec54e914e85066ed4c848463311917010671b"}, 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="8adfd60e76472fe0365fa854453571a3f730000000657e7fdb577ff68e99f2ea2f41d8d654dd4b9e2c64b3fa7f82de1f949e699cd659e09ab3a520a64b00910b0561ba8a23ec97e8f003a4a7d5d2bd286e5e120a536af0d01bc638940a2734345d7b8e69365a875e10a6702d8568b294d32a9a53d20f30fb09bfc196a4a53d482246a853ecc302835240ae9b7a604cde62330ce4b607452d8a74f51d97a316b35673124f70cc4828371ed11723799fa8eeef18bddb2d10e4bf534715c92e12ff5385a58bf88804000000000000000000000000000000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r2}, 0x8) 03:36:24 executing program 2: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ftruncate(r0, 0x10001) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000800) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) creat(&(0x7f0000000040)='./bus\x00', 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) [ 299.345354] sctp: [Deprecated]: syz-executor.5 (pid 8433) Use of struct sctp_assoc_value in delayed_ack socket option. [ 299.345354] Use struct sctp_sack_info instead 03:36:25 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f0000001500)) r4 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0xa, &(0x7f00007b1000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x3, 0x45) syz_open_dev$usbmon(&(0x7f0000001300)='/dev/usbmon#\x00', 0x38ad, 0x2) io_cancel(0x0, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x8, 0x5, 0xffffffffffffffff, &(0x7f00000002c0)="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", 0xf8a, 0x0, 0x0, 0x0, r3}, 0x0) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000240)) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000001340)=ANY=[@ANYBLOB="07c91abbea46a8f39c2299cedd0114a2138625aafebf9c30e7466662625b17e80e513653ba76afbb7481a8e3fddb2b28f8976d3e54fd43f8210700000073a28d134ec1b028f642ffa2433722ae4b138c43105c07f1c6806ea7577d455ffbede09ed7613d9cebde31808284741a898ddc8c701dc1b597000000000000000000000000"], 0x1) setsockopt$inet_tcp_int(r3, 0x6, 0x13, &(0x7f0000001280)=0x7fff, 0x4) ioctl$EVIOCGBITKEY(r0, 0x80404521, 0x0) setsockopt$inet_tcp_TLS_TX(r3, 0x6, 0x1, 0x0, 0x0) times(&(0x7f0000001400)) r5 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) r6 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200), 0x0, 0xfffffffffffffffa) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, 0x0) keyctl$set_timeout(0xf, r6, 0x8) ftruncate(r2, 0x7fff) sendfile(r3, r5, &(0x7f0000d83ff8)=0x1100, 0x800000000002) [ 299.454341] audit: type=1804 audit(1551756984.966:48): pid=8440 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir434706946/syzkaller.Kr5TYY/8/bus" dev="sda1" ino=16569 res=1 [ 299.574792] audit: type=1804 audit(1551756985.066:49): pid=8446 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir434706946/syzkaller.Kr5TYY/8/bus" dev="sda1" ino=16569 res=1 [ 299.606377] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:36:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dsp\x00', 0x800, 0x0) r1 = socket(0x11, 0x802, 0xe4) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)=0x0) ptrace$getregs(0x18cf4bce62c0ef1c, r2, 0x80000000, &(0x7f0000000500)=""/4096) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e24, 0x8001, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xffffffffffffffff}}, 0x7fffffff, 0x1f, 0x8, 0x1000, 0x4}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000100)={r3, 0xf7, 0x2}, 0x8) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, 0x0) r4 = socket(0x0, 0x800000801, 0x0) accept$inet(r4, 0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) kexec_load(0x0, 0x0, 0x0, 0x0) 03:36:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c616669643d3078303030303030303030303030303030302c007b0fe628980bdb65b959e39b165b6b028de7efd7279fe79a2529947766ac5f9cc67ab7e5f392f1b042da39ff3eb3f0c4d131404549a05f7d7d780430bbcd9d5af5fe095705ef537f23c461e0e3dba03605a30e5d8e1ba9eb4ac3f3060db8a11d49b0d1e2a13085ba201eaf0d42"]) 03:36:25 executing program 1: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x0, 0x80006011, r0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x800005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_config_ext, 0x0, 0x74e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) openat$cgroup_int(r3, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) [ 299.771216] device team0 entered promiscuous mode [ 299.788680] device team_slave_0 entered promiscuous mode [ 299.816460] device team_slave_1 entered promiscuous mode 03:36:25 executing program 0: r0 = accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) truncate(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) mkdir(0x0, 0x4000000) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000040)={@empty}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) creat(0x0, 0x20000108) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x3) pkey_alloc(0x0, 0x2) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="6c6f636b70726f746f3d6c6f636e6f6c6f636b2c6c6f636b7461626c653d2f680020d145a85294ec3d46c8fd053154bc2aec6187cc3e96ee7d531dfee02706c81dc04a3131cc275df8457e9a0b343fe42f1c81942cdd1cec30698f87cd29dc1f00248c6b000000000000000000"]) 03:36:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dsp\x00', 0x800, 0x0) r1 = socket(0x11, 0x802, 0xe4) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)=0x0) ptrace$getregs(0x18cf4bce62c0ef1c, r2, 0x80000000, &(0x7f0000000500)=""/4096) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e24, 0x8001, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xffffffffffffffff}}, 0x7fffffff, 0x1f, 0x8, 0x1000, 0x4}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000100)={r3, 0xf7, 0x2}, 0x8) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, 0x0) r4 = socket(0x0, 0x800000801, 0x0) accept$inet(r4, 0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) kexec_load(0x0, 0x0, 0x0, 0x0) [ 300.121210] sctp: [Deprecated]: syz-executor.5 (pid 8500) Use of struct sctp_assoc_value in delayed_ack socket option. [ 300.121210] Use struct sctp_sack_info instead [ 300.250483] audit: type=1804 audit(1551756985.756:50): pid=8446 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir434706946/syzkaller.Kr5TYY/8/bus" dev="sda1" ino=16569 res=1 03:36:25 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="6d1940ab99bfb732002103f88b60e946458000000000e0ffffffffffff104abb5d51a3c8e443dfa59d10000100000008000300ff0006000000e43874a3ebe686331f19aa5015d100ca47407e94dabc814519015802898feb09a1ceb935fca8f4936e8a09d1fd05ea62292bdc350a8b8db07fc8cd544a719ede43f6f4d40aaaa320ec98c8fb8dd701a21a4031c6acfb364f6590e91a2e8856e756b3b10e6f8231159a8e811fb7be8fb3858d683f7895676a5b21657e4829e903c15d9f3914b0573eb1de0d7dc9616ab47d3e0febd55a48859f7de22cb33fba7a9181adee182e3177c41a029885b159"], 0x28}}, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x7, 0xcf) sendto$ax25(r1, &(0x7f00000000c0), 0x0, 0x20000000, 0x0, 0x0) syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x100, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x15) getsockname$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, &(0x7f0000000080)=0x1c) 03:36:25 executing program 5: socketpair$unix(0x1, 0x2000000000003, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x20000, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000080), 0x4) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4002, &(0x7f0000000040)=0x1ff, 0x8, 0x2) 03:36:25 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000080)={0x0, 0xea2}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={r2, 0x5, 0x37, 0x8, 0x0, 0x80}, 0x14) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000580)=0x400, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e20}, 0x1c) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x511300) [ 300.335251] audit: type=1804 audit(1551756985.846:51): pid=8440 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir434706946/syzkaller.Kr5TYY/8/bus" dev="sda1" ino=16569 res=1 [ 300.387407] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=49049 sclass=netlink_route_socket pig=8526 comm=syz-executor.4 03:36:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x401000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = dup2(r0, r1) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000080)=0x0) ptrace$setopts(0x4200, r3, 0x5, 0x2) [ 300.423980] audit: type=1804 audit(1551756985.846:52): pid=8446 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir434706946/syzkaller.Kr5TYY/8/bus" dev="sda1" ino=16569 res=1 03:36:26 executing program 5: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x101002, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 300.505634] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=49049 sclass=netlink_route_socket pig=8526 comm=syz-executor.4 [ 300.535300] gfs2: can't find protocol locnolock 03:36:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12a41d88b070") r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f00000003c0)) 03:36:26 executing program 4: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0xf7, 0x0, 0x1, 0x0, 0x6, @random="d80fe1534bba"}, 0x14) r0 = syz_open_dev$audion(&(0x7f0000000780)='/dev/audio#\x00', 0x7ff, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc10c5541, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) close(0xffffffffffffffff) write(r3, &(0x7f0000000400)="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", 0x200) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f00000001c0)='./bus/file0\x00', 0x3, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000240)="6f62bd1acd02d240e2c422960b07fb", 0xf, 0x7}], 0x20000, &(0x7f0000000640)={[{@data_ordered='data=ordered'}, {@tails_off='tails=off'}], [{@subj_role={'subj_role', 0x3d, '/dev/audio#\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/dev/audio#\x00'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@euid_eq={'euid', 0x3d, r5}}, {@pcr={'pcr', 0x3d, 0x6}}, {@permit_directio='permit_directio'}, {@smackfshat={'smackfshat'}}, {@hash='hash'}]}) sendfile(r3, r4, 0x0, 0x10000) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) [ 300.674449] audit: type=1804 audit(1551756986.186:53): pid=8548 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir120019946/syzkaller.pFTeCQ/10/bus" dev="sda1" ino=16559 res=1 03:36:26 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = semget(0xffffffffffffffff, 0x2, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x3, 0xffff, 0x9}) semctl$SETALL(r2, 0x0, 0x11, &(0x7f00000000c0)) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r3, 0x4040534e, &(0x7f0000000080)={0x0, @tick=0x5c45f3d5, 0x8, {0xfff, 0x40}, 0x79506967, 0x1, 0x94}) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcff00000000000000000000000000000000000000000000000000000000000000000000000800030000000000"], 0xc0}}, 0x0) [ 300.821317] gfs2: can't find protocol locnolock [ 300.833189] audit: type=1804 audit(1551756986.186:54): pid=8548 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir120019946/syzkaller.pFTeCQ/10/bus" dev="sda1" ino=16559 res=1 [ 300.905269] audit: type=1804 audit(1551756986.236:55): pid=8548 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir120019946/syzkaller.pFTeCQ/10/bus" dev="sda1" ino=16559 res=1 [ 300.933274] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 300.952765] audit: type=1804 audit(1551756986.246:56): pid=8556 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir120019946/syzkaller.pFTeCQ/10/bus" dev="sda1" ino=16559 res=1 03:36:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000080)={'bcsf0\x00', {0x2, 0x4e20, @rand_addr=0xd67}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@debug={'debug'}}]}}) 03:36:26 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)={0x350, r3, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0xc0, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @multicast2}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x3, @empty, 0x5}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x5, @mcast2, 0x1f}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x400, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x400}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8000}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x200}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_NODE={0x4}, @TIPC_NLA_LINK={0x120, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffff6f6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x592}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffc}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x40}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x200}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x88c}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7619}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MEDIA={0xdc, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x350}, 0x1, 0x0, 0x0, 0x4004800}, 0xc844) ioctl$KVM_SET_MSRS(r2, 0xc008aec1, &(0x7f0000000000)) 03:36:27 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x40, 0x200000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x404200) mremap(&(0x7f000000d000/0x2000)=nil, 0xfffffffffffffe74, 0x1000, 0x0, &(0x7f0000007000/0x1000)=nil) 03:36:27 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000bd000), 0x8b, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffee1, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000fc0)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000001080)=[{{&(0x7f0000000ac0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x35d, &(0x7f0000000a80)=[{&(0x7f00000006c0)=""/246}, {&(0x7f00000007c0)=""/240}, {&(0x7f00000008c0)=""/163}, {&(0x7f0000000980)=""/234}], 0x6b, &(0x7f0000000680)=""/31, 0x1f}}], 0x3f747b8cbf977b6, 0x0, &(0x7f0000000b40)={0x0, r2+10000000}) 03:36:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="020b000007000000000021002d54036205001a00005a0e299d625a0c9a934d4fe6004a8b7edde2ff779c8c3b11112122bb00100008c99f3d147e747c846ed8231f02ace47ce1f5889603775e0437c1bd9ffbd998b87271cf20a1c72be92bd34b4545dad073457e992a8b2afff4671beb048239c5070000001a866abad06bb9f3b0d06b714d010000000100000051713fd395e0c13365404ec19c67e05d2d2b9cde360f797c1b064eb0638e539028909e404c922eefeec56ddd73175cef551b995a422e3d28f04b13b21114b263b7de08f8489dd5aace88d06e5a6a9ab3d3487e"], 0x38}}, 0x0) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f00000000c0)=0x3ff, 0x4) sendmmsg(r0, &(0x7f0000000180), 0x20, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000040), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) r2 = dup(r1) r3 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000000900)=""/4096, 0x1000) ftruncate(r3, 0x80080) setsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000140)=0x1, 0x4) sendfile(r2, r3, 0x0, 0x2008000fffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) write$P9_RRENAME(r5, &(0x7f0000000100)={0x7, 0x15, 0x2}, 0x7) recvmmsg(r0, &(0x7f00000009c0), 0x400000000000347, 0x22, &(0x7f0000000a80)={0x0, r4+10000000}) 03:36:27 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) r1 = add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)="865a8aaf6115", 0x6, 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r1, 0x0, 0x2}, 0x0, &(0x7f00000001c0)="6cc29d00095617c0400332b6cc29f94e0f288ac219fcf0af742b258a99b857ceab45a8869402aec536c0919ae17bb0b95d96cfc803a2cdb4d2f7289c8b44b442d04f19d169e3583cbe4ae372a0f7a26302169735fa7df832c2b9ea4b6a3ff9cec6f1f51ce035e07bb362bc9e48822a1f9db80a99eb6ae016842d33132c122fa06256c54a54efc7d3c593bc457eef2473d7a75445689fab044075a013718a3fa8c78ba9c8f497cc2e885e43450273e04beb3bb353ee441e64a94f49f00bcdb8b163891de42dd908e5423968", &(0x7f00000002c0)="65c3d8ce07f79a003bd01f0f55da853b3a07c2cc8833f5c586ab6e6d4cc28dd29266bffc7bdd037454780f272844e55dbe050e02d372") r2 = dup(r0) perf_event_open(&(0x7f0000940000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0xf, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a73000)}, 0x2801}, 0x0, 0x0, r2, 0x0) 03:36:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xfffffffffffffd76}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="0204000a0e000000030000000000000005000600000000000a0000000000000400000000000000000000002100000000000100000000000002000100010000000000000200fd000005000500000000000a002a3dbbb6896209000000000000009aec3f3f7710aa000000ff1700400000"], 0x70}}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp\x00') ioctl$CAPI_GET_FLAGS(r2, 0x80044323, &(0x7f0000000100)) sendmmsg(r1, &(0x7f0000000180), 0x40002ee, 0x0) [ 301.633243] syz-executor.0 (8601): attempted to duplicate a private mapping with mremap. This is not supported. 03:36:27 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="8f"], 0x1) close(r1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000)=0x800000100000001, 0x4) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x1db) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0xfefa) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 03:36:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x5b7, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x6}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mISDNtimer\x00', 0x90080, 0x0) shutdown(r0, 0x1) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000180), 0x25) dup2(r0, r1) sendto$inet6(r0, &(0x7f0000000140)="85", 0x1, 0x4000, 0x0, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$selinux_create(r2, &(0x7f0000000200)=@objname={'system_u:object_r:smartcard_device_t:s0', 0x20, 'unconfined', 0x20, 0xfffffffffffffc01, 0x20, './file0\x00'}, 0x50) close(r0) 03:36:27 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x2000400204) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local, {[], @tcp={{0x0, 0xc204, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:36:27 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x1004e23, @local}, 0x10) shutdown(r0, 0x1) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x101}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000000c0)={r1, 0x7, 0x9, [0xb08, 0x7, 0x5, 0x4, 0xffffffffffffffa7, 0x0, 0x2, 0x8, 0x401]}, 0x1a) recvmmsg(r0, &(0x7f0000002b40), 0x47d, 0x0, 0x0) 03:36:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x204) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000280)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_nanosleep(0x4, 0x0, &(0x7f0000000080)={r3, r4+30000000}, &(0x7f00000000c0)) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x8400ae8e, 0x0) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r5, 0x28, 0x2, &(0x7f0000000100)=0x3, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 03:36:27 executing program 4: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x214100, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000200)={0x401, 0x3, 0x2000}, 0x4) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531de62e63ff8f9373f994154656ed74994749bf545e4698c60b05c9662d20c31701b01b85cfb7d7a2de4b4040f8e1b4ff015cb1970900a29b43013722b47bb5e884a1c4acf49cad61a85f5cdcace154092fcd609713984517cb3a15163d5946b1a8bdc8540448b"]) lstat(&(0x7f0000000080)='./file2\x00', &(0x7f0000000140)) removexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000040)=@known='system.posix_acl_default\x00') 03:36:27 executing program 0: syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x400800, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000300)={0x1, 0xfffffffffffffffe, 0x4, 0x5, 0x1, 0x7fffffff, 0x20, 0x5, 0x0}, &(0x7f0000000380)=0x20) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000003c0)={r2, 0xffff}, &(0x7f0000000400)=0x8) r3 = socket$inet6(0xa, 0x8080b, 0xf9) ioctl(r3, 0x6, &(0x7f0000000080)="0a5cc80700315f85715070") setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0xffffffff, 0x4) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x1, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x7fff, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000440), &(0x7f0000000480)=0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000880)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000180)={0x0, @remote}, &(0x7f0000000240)=0xc) bpf$MAP_CREATE(0x0, &(0x7f0000001700)={0x1, 0x8, 0x100000001, 0x8000000001, 0x1, 0xffffffffffffffff, 0x1b14}, 0x2c) r7 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000080)={0x3, 0x0, 0x73fffb, 0x0, 0x20820000, r7}, 0x15) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$SNDRV_TIMER_IOCTL_SELECT(r6, 0x40485404, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x3}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r5, 0x2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000280)=@assoc_value={r8, 0x9}, &(0x7f00000002c0)=0x8) fcntl$setpipe(r3, 0x407, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket(0x10, 0x20000000080003, 0xc) write(r9, &(0x7f0000000000)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 03:36:27 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x1004e23, @local}, 0x10) shutdown(r0, 0x1) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x101}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000000c0)={r1, 0x7, 0x9, [0xb08, 0x7, 0x5, 0x4, 0xffffffffffffffa7, 0x0, 0x2, 0x8, 0x401]}, 0x1a) recvmmsg(r0, &(0x7f0000002b40), 0x47d, 0x0, 0x0) [ 302.090264] overlayfs: failed to resolve './file1Þbæ?øù7?™ATen×I”t›õEäiŒ`°–bÒ 1p¸û}z-ä´ŽOðËp [ 302.090264] )´0r+G»^ˆJJÏIÊÖ…õÍÊÎ@’üÖ q9„Q|³¡QcÕ”k‹Ü…@D‹': -2 [ 302.195487] overlayfs: failed to resolve './file1Þbæ?øù7?™ATen×I”t›õEäiŒ`°–bÒ 1p¸û}z-ä´ŽOðËp [ 302.195487] )´0r+G»^ˆJJÏIÊÖ…õÍÊÎ@’üÖ q9„Q|³¡QcÕ”k‹Ü…@D‹': -2 03:36:28 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xc72f, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64\x00', &(0x7f00000000c0)='posix_acl_access\x00', 0x11, 0x2) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000180)={0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) 03:36:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000000cc0)=[{{&(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000420005010008ba000000000000000000"], 0x14}}, 0x0) 03:36:28 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x100, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0xe0, r2, 0x2, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x60, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2e}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7fff}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x13}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}, @IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}]}, @IPVS_CMD_ATTR_DEST={0x6c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfc}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7ff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}]}]}, 0xe0}, 0x1, 0x0, 0x0, 0x4008010}, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x00\x03\xff\x02\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x06\x00', 0xc7, 0x80003}) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000080003, 0x0) close(r0) close(r3) 03:36:28 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) openat$cgroup_int(r0, &(0x7f0000000240)='io.max\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000001c0)=0xc) tkill(r2, 0x1b) readv(r1, &(0x7f00000015c0)=[{&(0x7f00000000c0)=""/180, 0xb4}], 0x1) r3 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x23b0, 0x101000) timerfd_gettime(r3, &(0x7f0000000180)) 03:36:28 executing program 0: syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x400800, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000300)={0x1, 0xfffffffffffffffe, 0x4, 0x5, 0x1, 0x7fffffff, 0x20, 0x5, 0x0}, &(0x7f0000000380)=0x20) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000003c0)={r2, 0xffff}, &(0x7f0000000400)=0x8) r3 = socket$inet6(0xa, 0x8080b, 0xf9) ioctl(r3, 0x6, &(0x7f0000000080)="0a5cc80700315f85715070") setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0xffffffff, 0x4) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x1, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x7fff, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000440), &(0x7f0000000480)=0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000880)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000180)={0x0, @remote}, &(0x7f0000000240)=0xc) bpf$MAP_CREATE(0x0, &(0x7f0000001700)={0x1, 0x8, 0x100000001, 0x8000000001, 0x1, 0xffffffffffffffff, 0x1b14}, 0x2c) r7 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000080)={0x3, 0x0, 0x73fffb, 0x0, 0x20820000, r7}, 0x15) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$SNDRV_TIMER_IOCTL_SELECT(r6, 0x40485404, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x3}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r5, 0x2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000280)=@assoc_value={r8, 0x9}, &(0x7f00000002c0)=0x8) fcntl$setpipe(r3, 0x407, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket(0x10, 0x20000000080003, 0xc) write(r9, &(0x7f0000000000)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 03:36:28 executing program 3: syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x400800, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000300)={0x1, 0xfffffffffffffffe, 0x4, 0x5, 0x1, 0x7fffffff, 0x20, 0x5, 0x0}, &(0x7f0000000380)=0x20) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000003c0)={r2, 0xffff}, &(0x7f0000000400)=0x8) r3 = socket$inet6(0xa, 0x8080b, 0xf9) ioctl(r3, 0x6, &(0x7f0000000080)="0a5cc80700315f85715070") setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0xffffffff, 0x4) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x1, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x7fff, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000440), &(0x7f0000000480)=0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000880)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000180)={0x0, @remote}, &(0x7f0000000240)=0xc) bpf$MAP_CREATE(0x0, &(0x7f0000001700)={0x1, 0x8, 0x100000001, 0x8000000001, 0x1, 0xffffffffffffffff, 0x1b14}, 0x2c) r7 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000080)={0x3, 0x0, 0x73fffb, 0x0, 0x20820000, r7}, 0x15) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$SNDRV_TIMER_IOCTL_SELECT(r6, 0x40485404, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x3}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r5, 0x2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000a80)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000280)=@assoc_value={r8, 0x9}, &(0x7f00000002c0)=0x8) fcntl$setpipe(r3, 0x407, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket(0x10, 0x20000000080003, 0xc) write(r9, &(0x7f0000000000)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 03:36:28 executing program 1: r0 = memfd_create(&(0x7f00000001c0)='\xe80t\xd8\x0e\xfa%\xa5m\x9d\xf1yiN\x96E\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd\x8a\xe1($\xeeG\xaf', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000040)={0x3f, 0x0, 0x1, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x26, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) [ 303.133120] INFO: trying to register non-static key. [ 303.138291] the code is fine but needs lockdep annotation. [ 303.143922] turning off the locking correctness validator. [ 303.149554] CPU: 1 PID: 8679 Comm: syz-executor.5 Not tainted 5.0.0+ #5 [ 303.156309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.160375] kobject: 'ip6_vti1' (000000005b569d07): kobject_uevent_env [ 303.165664] Call Trace: [ 303.165685] dump_stack+0x172/0x1f0 [ 303.165701] register_lock_class+0x1bdc/0x1bf0 [ 303.165712] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 303.165724] ? bpf_prog_kallsyms_find+0x50/0x2c0 [ 303.165735] ? check_noncircular+0x20/0x20 [ 303.165746] ? is_bpf_text_address+0xd3/0x170 [ 303.165760] ? kernel_text_address+0x73/0xf0 [ 303.173023] kobject: 'ip6_vti1' (000000005b569d07): fill_kobj_path: path = '/devices/virtual/net/ip6_vti1' [ 303.175009] __lock_acquire+0x11f/0x4700 [ 303.175022] ? check_noncircular+0x20/0x20 [ 303.175034] ? mark_held_locks+0x100/0x100 [ 303.175057] ? __lock_acquire+0x53b/0x4700 03:36:28 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=ANY=[@ANYRESOCT=r0, @ANYRES64=r0], 0x2}}, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x7c, r1, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x104}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x204def56}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x6}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x7}]}, 0x7c}, 0x1, 0x0, 0x0, 0x20000040}, 0x4) syz_genetlink_get_family_id$nbd(&(0x7f0000000480)='nbd\x00') r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x549002, 0x0) setsockopt$inet6_int(r2, 0x29, 0x17, &(0x7f0000000300)=0x1, 0x4) getsockopt$bt_sco_SCO_CONNINFO(r2, 0x11, 0x2, &(0x7f0000000340)=""/241, &(0x7f0000000440)=0xf1) [ 303.175066] ? __lock_acquire+0x53b/0x4700 [ 303.175077] ? __lock_acquire+0x53b/0x4700 [ 303.175088] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 303.175104] ? check_preemption_disabled+0x48/0x290 [ 303.179782] kobject: 'queues' (00000000aee56687): kobject_add_internal: parent: 'ip6_vti1', set: '' [ 303.183281] ? check_preemption_disabled+0x48/0x290 [ 303.183296] lock_acquire+0x16f/0x3f0 [ 303.183320] ? __flush_work+0x61a/0x840 [ 303.183346] __flush_work+0x640/0x840 [ 303.183356] ? __flush_work+0x61a/0x840 [ 303.183369] ? try_wait_for_completion+0x9a/0xd0 [ 303.183380] ? insert_work+0x3a0/0x3a0 [ 303.183390] ? mark_held_locks+0xb1/0x100 [ 303.183417] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 303.189914] kobject: 'queues' (00000000aee56687): kobject_uevent_env [ 303.193192] ? refcount_sub_and_test_checked+0x161/0x1f0 [ 303.193205] ? refcount_inc_checked+0x70/0x70 [ 303.193219] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 303.193235] ? __drm_atomic_helper_crtc_destroy_state+0xf3/0x340 [ 303.193249] flush_work+0x18/0x20 [ 303.193264] vkms_atomic_crtc_destroy_state+0x2d/0x40 [ 303.193285] drm_atomic_state_default_clear+0x37c/0xd60 [ 303.198156] kobject: 'queues' (00000000aee56687): kobject_uevent_env: filter function caused the event to drop! [ 303.202004] drm_atomic_state_clear+0x9d/0xc0 [ 303.202017] __drm_atomic_state_free+0x3c/0xf0 [ 303.202030] drm_atomic_helper_set_config+0xe5/0x160 [ 303.202053] drm_mode_setcrtc+0x613/0x1490 [ 303.202070] ? drm_mode_getcrtc+0x870/0x870 03:36:28 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80001, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0)={r1, 0x6}, 0x8) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000019c0)="0adc1f123c123f3188b070") r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c000000000000090000070000002005000000010000008d8a8d240000000000000000000035861c007bfe68a6"], 0x4e) 03:36:28 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x100, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0xe0, r2, 0x2, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x60, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2e}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7fff}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x13}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}, @IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}]}, @IPVS_CMD_ATTR_DEST={0x6c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfc}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7ff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}]}]}, 0xe0}, 0x1, 0x0, 0x0, 0x4008010}, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x00\x03\xff\x02\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x06\x00', 0xc7, 0x80003}) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000080003, 0x0) close(r0) close(r3) 03:36:28 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xc72f, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64\x00', &(0x7f00000000c0)='posix_acl_access\x00', 0x11, 0x2) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000180)={0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) [ 303.202084] ? drm_unbind_agp+0x20/0x20 [ 303.202095] ? find_held_lock+0x35/0x130 [ 303.202106] ? drm_unbind_agp+0x20/0x20 [ 303.202120] ? drm_lease_owner+0x45/0x60 [ 303.207267] kobject: 'rx-0' (00000000ecc6c59a): kobject_add_internal: parent: 'queues', set: 'queues' [ 303.216309] ? drm_is_current_master+0x5c/0x140 [ 303.216324] drm_ioctl_kernel+0x23b/0x2e0 [ 303.216335] ? drm_mode_getcrtc+0x870/0x870 [ 303.216347] ? drm_setversion+0x8c0/0x8c0 [ 303.216361] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 303.216373] ? _copy_from_user+0xdd/0x150 [ 303.216385] drm_ioctl+0x545/0xa50 [ 303.216395] ? drm_mode_getcrtc+0x870/0x870 [ 303.216420] ? drm_version+0x3d0/0x3d0 [ 303.216459] ? __might_sleep+0x95/0x190 [ 303.221531] kobject: 'rx-0' (00000000ecc6c59a): kobject_uevent_env [ 303.224713] ? drm_version+0x3d0/0x3d0 [ 303.224726] do_vfs_ioctl+0xd6e/0x1390 [ 303.224741] ? selinux_file_ioctl+0x46f/0x5e0 [ 303.224752] ? selinux_file_ioctl+0x125/0x5e0 [ 303.224763] ? ioctl_preallocate+0x210/0x210 [ 303.224774] ? selinux_file_mprotect+0x620/0x620 03:36:29 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xc72f, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64\x00', &(0x7f00000000c0)='posix_acl_access\x00', 0x11, 0x2) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000180)={0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) [ 303.224787] ? iterate_fd+0x360/0x360 [ 303.224809] ? nsecs_to_jiffies+0x30/0x30 [ 303.224834] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 303.230137] kobject: 'rx-0' (00000000ecc6c59a): fill_kobj_path: path = '/devices/virtual/net/ip6_vti1/queues/rx-0' [ 303.233282] ? security_file_ioctl+0x93/0xc0 [ 303.233295] ksys_ioctl+0xab/0xd0 [ 303.233308] __x64_sys_ioctl+0x73/0xb0 [ 303.233324] do_syscall_64+0x103/0x610 [ 303.233338] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.233347] RIP: 0033:0x457e29 03:36:29 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xc72f, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64\x00', &(0x7f00000000c0)='posix_acl_access\x00', 0x11, 0x2) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000180)={0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) [ 303.233359] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 303.233366] RSP: 002b:00007f5b0d003c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 303.233389] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e29 [ 303.233396] RDX: 0000000020000180 RSI: 00000000c06864a2 RDI: 0000000000000003 [ 303.233403] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 303.233417] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b0d0046d4 [ 303.241124] kobject: 'tx-0' (00000000158b5691): kobject_add_internal: parent: 'queues', set: 'queues' [ 303.241888] R13: 00000000004bfb39 R14: 00000000004d15f8 R15: 00000000ffffffff [ 303.261598] kobject: 'loop0' (0000000011706d8f): kobject_uevent_env [ 303.277343] kobject: 'tx-0' (00000000158b5691): kobject_uevent_env [ 303.300889] kobject: 'loop0' (0000000011706d8f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 303.395438] kobject: 'tx-0' (00000000158b5691): fill_kobj_path: path = '/devices/virtual/net/ip6_vti1/queues/tx-0' [ 303.424767] kobject: 'loop5' (0000000088c2b315): kobject_uevent_env [ 303.587795] SELinux: unknown common ¦ [ 303.605659] kobject: 'loop5' (0000000088c2b315): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 303.636970] SELinux: failed to load policy [ 303.642078] kobject: 'loop4' (00000000d25cc50a): kobject_uevent_env [ 303.668881] kobject: 'loop4' (00000000d25cc50a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 303.671476] SELinux: unknown common ¦ [ 303.684099] kobject: 'loop1' (000000008885d61f): kobject_uevent_env [ 303.690448] SELinux: failed to load policy [ 303.690591] kobject: 'loop1' (000000008885d61f): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 303.734928] kobject: 'loop0' (0000000011706d8f): kobject_uevent_env [ 303.741444] kobject: 'loop0' (0000000011706d8f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 303.770219] kobject: 'loop3' (0000000068abbd28): kobject_uevent_env [ 303.777869] kobject: 'loop3' (0000000068abbd28): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:36:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/25, 0x19, 0x10020, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) pipe2(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8932, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) memfd_create(&(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x1) pipe2(&(0x7f00000000c0), 0x84800) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) 03:36:29 executing program 1: r0 = memfd_create(&(0x7f00000001c0)='\xe80t\xd8\x0e\xfa%\xa5m\x9d\xf1yiN\x96E\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd\x8a\xe1($\xeeG\xaf', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000040)={0x3f, 0x0, 0x1, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x26, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 03:36:29 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xc72f, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000180)={0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) 03:36:29 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0xd8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r1, 0x8000000000) 03:36:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000000), &(0x7f00000000c0)=0x8) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs_stats\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x100a}], 0x1) 03:36:29 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xc72f, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000180)={0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) [ 303.887448] kobject: 'loop2' (00000000dc531b81): kobject_uevent_env [ 303.907497] kobject: 'loop2' (00000000dc531b81): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:36:29 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000005efff)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) mq_timedreceive(r2, &(0x7f0000000100)=""/30, 0x1e, 0x2, &(0x7f0000000180)={r3, r4+10000000}) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0xa0000, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f00000002c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a8, 0x418, 0x248, 0x248, 0x0, 0x350, 0x510, 0x510, 0x510, 0x510, 0x510, 0x6, &(0x7f0000000040), {[{{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x9}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@broadcast, @empty, 0xffffff00, 0xff000000, 'rose0\x00', 'bridge_slave_1\x00', {0xff}, {}, 0x8f, 0x2, 0xa}, 0x0, 0x100, 0x160, 0x0, {}, [@common=@unspec=@rateest={0x68, 'rateest\x00', 0x0, {'veth1_to_team\x00', 'yam0\x00', 0x2, 0x0, 0x7fff, 0x0, 0x1, 0xbd3, 0x4bc, 0x91f1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @broadcast, 0x5, 0x3, [0x1d, 0x25, 0x13, 0x1c, 0x30, 0x32, 0x13, 0x7, 0x1c, 0x19, 0x27, 0x3e, 0x16, 0x3b, 0x1e, 0x6], 0x1, 0x8, 0x910d}}}, {{@ip={@empty, @rand_addr=0x2, 0xff0000ff, 0xff0000ff, 'veth0_to_bond\x00', 'veth0_to_hsr\x00', {}, {0xff}, 0x1, 0x0, 0x2}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x13, 0x6, 0xb3a9}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x80000001, 'syz1\x00', 0x10001}}}, {{@uncond, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x5, 0x8, @broadcast, 0x4e23}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1, [0x7b4, 0x8, 0x7fffffff, 0x1, 0x7, 0x87], 0xc0000000000000, 0x9}, {0x100000001, [0x2, 0x5, 0xff, 0x401, 0x6, 0xfffffffffffffff8], 0xffff, 0x1}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x608) getsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 03:36:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0xc) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x454, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYRES16=r1], 0x3c}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 303.948736] kobject: 'loop5' (0000000088c2b315): kobject_uevent_env [ 303.975277] kobject: 'loop5' (0000000088c2b315): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 303.990953] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8727 comm=syz-executor.1 [ 304.000626] kobject: 'loop0' (0000000011706d8f): kobject_uevent_env [ 304.015133] kobject: 'loop0' (0000000011706d8f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 304.043320] kobject: 'loop1' (000000008885d61f): kobject_uevent_env [ 304.049915] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8732 comm=syz-executor.1 [ 304.065838] kobject: 'loop1' (000000008885d61f): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 304.075622] kobject: 'loop3' (0000000068abbd28): kobject_uevent_env [ 304.082101] kobject: 'loop3' (0000000068abbd28): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 304.092649] kobject: 'loop2' (00000000dc531b81): kobject_uevent_env [ 304.099111] kobject: 'loop2' (00000000dc531b81): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 304.109067] kobject: 'loop1' (000000008885d61f): kobject_uevent_env [ 304.115636] kobject: 'loop1' (000000008885d61f): fill_kobj_path: path = '/devices/virtual/block/loop1' 03:36:29 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x100, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0xe0, r2, 0x2, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x60, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2e}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7fff}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x13}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}, @IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}]}, @IPVS_CMD_ATTR_DEST={0x6c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfc}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7ff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}]}]}, 0xe0}, 0x1, 0x0, 0x0, 0x4008010}, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x00\x03\xff\x02\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x06\x00', 0xc7, 0x80003}) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000080003, 0x0) close(r0) close(r3) 03:36:29 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_SET_DIRECT_IO(r0, 0x127c, 0x72f081) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$CAPI_INSTALLED(r2, 0x80024322) 03:36:29 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xc72f, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000180)={0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) 03:36:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/25, 0x19, 0x10020, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) pipe2(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8932, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) memfd_create(&(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x1) pipe2(&(0x7f00000000c0), 0x84800) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) 03:36:29 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000005efff)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) mq_timedreceive(r2, &(0x7f0000000100)=""/30, 0x1e, 0x2, &(0x7f0000000180)={r3, r4+10000000}) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0xa0000, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f00000002c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a8, 0x418, 0x248, 0x248, 0x0, 0x350, 0x510, 0x510, 0x510, 0x510, 0x510, 0x6, &(0x7f0000000040), {[{{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x9}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@broadcast, @empty, 0xffffff00, 0xff000000, 'rose0\x00', 'bridge_slave_1\x00', {0xff}, {}, 0x8f, 0x2, 0xa}, 0x0, 0x100, 0x160, 0x0, {}, [@common=@unspec=@rateest={0x68, 'rateest\x00', 0x0, {'veth1_to_team\x00', 'yam0\x00', 0x2, 0x0, 0x7fff, 0x0, 0x1, 0xbd3, 0x4bc, 0x91f1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @broadcast, 0x5, 0x3, [0x1d, 0x25, 0x13, 0x1c, 0x30, 0x32, 0x13, 0x7, 0x1c, 0x19, 0x27, 0x3e, 0x16, 0x3b, 0x1e, 0x6], 0x1, 0x8, 0x910d}}}, {{@ip={@empty, @rand_addr=0x2, 0xff0000ff, 0xff0000ff, 'veth0_to_bond\x00', 'veth0_to_hsr\x00', {}, {0xff}, 0x1, 0x0, 0x2}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x13, 0x6, 0xb3a9}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x80000001, 'syz1\x00', 0x10001}}}, {{@uncond, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x5, 0x8, @broadcast, 0x4e23}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1, [0x7b4, 0x8, 0x7fffffff, 0x1, 0x7, 0x87], 0xc0000000000000, 0x9}, {0x100000001, [0x2, 0x5, 0xff, 0x401, 0x6, 0xfffffffffffffff8], 0xffff, 0x1}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x608) getsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 03:36:29 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000005efff)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) mq_timedreceive(r2, &(0x7f0000000100)=""/30, 0x1e, 0x2, &(0x7f0000000180)={r3, r4+10000000}) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0xa0000, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f00000002c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a8, 0x418, 0x248, 0x248, 0x0, 0x350, 0x510, 0x510, 0x510, 0x510, 0x510, 0x6, &(0x7f0000000040), {[{{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x9}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@broadcast, @empty, 0xffffff00, 0xff000000, 'rose0\x00', 'bridge_slave_1\x00', {0xff}, {}, 0x8f, 0x2, 0xa}, 0x0, 0x100, 0x160, 0x0, {}, [@common=@unspec=@rateest={0x68, 'rateest\x00', 0x0, {'veth1_to_team\x00', 'yam0\x00', 0x2, 0x0, 0x7fff, 0x0, 0x1, 0xbd3, 0x4bc, 0x91f1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @broadcast, 0x5, 0x3, [0x1d, 0x25, 0x13, 0x1c, 0x30, 0x32, 0x13, 0x7, 0x1c, 0x19, 0x27, 0x3e, 0x16, 0x3b, 0x1e, 0x6], 0x1, 0x8, 0x910d}}}, {{@ip={@empty, @rand_addr=0x2, 0xff0000ff, 0xff0000ff, 'veth0_to_bond\x00', 'veth0_to_hsr\x00', {}, {0xff}, 0x1, 0x0, 0x2}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x13, 0x6, 0xb3a9}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x80000001, 'syz1\x00', 0x10001}}}, {{@uncond, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x5, 0x8, @broadcast, 0x4e23}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1, [0x7b4, 0x8, 0x7fffffff, 0x1, 0x7, 0x87], 0xc0000000000000, 0x9}, {0x100000001, [0x2, 0x5, 0xff, 0x401, 0x6, 0xfffffffffffffff8], 0xffff, 0x1}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x608) getsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 03:36:29 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xc72f, 0x0) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64\x00', &(0x7f00000000c0)='posix_acl_access\x00', 0x11, 0x2) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000180)={0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) [ 304.418556] kobject: 'loop4' (00000000d25cc50a): kobject_uevent_env [ 304.440380] kobject: 'loop4' (00000000d25cc50a): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:36:30 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/25, 0x19, 0x10020, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) pipe2(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8932, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) memfd_create(&(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x1) pipe2(&(0x7f00000000c0), 0x84800) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) [ 304.479372] kobject: 'loop5' (0000000088c2b315): kobject_uevent_env [ 304.504151] kobject: 'loop5' (0000000088c2b315): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:36:30 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/25, 0x19, 0x10020, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) pipe2(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8932, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) memfd_create(&(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x1) pipe2(&(0x7f00000000c0), 0x84800) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) 03:36:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/25, 0x19, 0x10020, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) pipe2(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8932, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) memfd_create(&(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x1) pipe2(&(0x7f00000000c0), 0x84800) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) 03:36:30 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xc72f, 0x0) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64\x00', &(0x7f00000000c0)='posix_acl_access\x00', 0x11, 0x2) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000180)={0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) 03:36:30 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x100, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0xe0, r2, 0x2, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x60, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2e}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7fff}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x13}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}, @IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}]}, @IPVS_CMD_ATTR_DEST={0x6c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfc}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7ff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}]}]}, 0xe0}, 0x1, 0x0, 0x0, 0x4008010}, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x00\x03\xff\x02\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x06\x00', 0xc7, 0x80003}) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000080003, 0x0) close(r0) close(r3) 03:36:30 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000005efff)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) mq_timedreceive(r2, &(0x7f0000000100)=""/30, 0x1e, 0x2, &(0x7f0000000180)={r3, r4+10000000}) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0xa0000, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f00000002c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a8, 0x418, 0x248, 0x248, 0x0, 0x350, 0x510, 0x510, 0x510, 0x510, 0x510, 0x6, &(0x7f0000000040), {[{{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x9}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@broadcast, @empty, 0xffffff00, 0xff000000, 'rose0\x00', 'bridge_slave_1\x00', {0xff}, {}, 0x8f, 0x2, 0xa}, 0x0, 0x100, 0x160, 0x0, {}, [@common=@unspec=@rateest={0x68, 'rateest\x00', 0x0, {'veth1_to_team\x00', 'yam0\x00', 0x2, 0x0, 0x7fff, 0x0, 0x1, 0xbd3, 0x4bc, 0x91f1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @broadcast, 0x5, 0x3, [0x1d, 0x25, 0x13, 0x1c, 0x30, 0x32, 0x13, 0x7, 0x1c, 0x19, 0x27, 0x3e, 0x16, 0x3b, 0x1e, 0x6], 0x1, 0x8, 0x910d}}}, {{@ip={@empty, @rand_addr=0x2, 0xff0000ff, 0xff0000ff, 'veth0_to_bond\x00', 'veth0_to_hsr\x00', {}, {0xff}, 0x1, 0x0, 0x2}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x13, 0x6, 0xb3a9}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x80000001, 'syz1\x00', 0x10001}}}, {{@uncond, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x5, 0x8, @broadcast, 0x4e23}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1, [0x7b4, 0x8, 0x7fffffff, 0x1, 0x7, 0x87], 0xc0000000000000, 0x9}, {0x100000001, [0x2, 0x5, 0xff, 0x401, 0x6, 0xfffffffffffffff8], 0xffff, 0x1}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x608) getsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f00000001c0), &(0x7f0000000200)=0x4) [ 304.538874] kobject: 'loop3' (0000000068abbd28): kobject_uevent_env [ 304.568792] kobject: 'loop3' (0000000068abbd28): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:36:30 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/25, 0x19, 0x10020, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) pipe2(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8932, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) memfd_create(&(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x1) pipe2(&(0x7f00000000c0), 0x84800) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) 03:36:30 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xc72f, 0x0) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64\x00', &(0x7f00000000c0)='posix_acl_access\x00', 0x11, 0x2) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000180)={0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) [ 304.620250] kobject: 'loop2' (00000000dc531b81): kobject_uevent_env [ 304.653745] kobject: 'loop2' (00000000dc531b81): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:36:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/25, 0x19, 0x10020, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) pipe2(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8932, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) memfd_create(&(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x1) pipe2(&(0x7f00000000c0), 0x84800) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) 03:36:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = gettid() process_vm_readv(r1, &(0x7f0000000200)=[{0x0}, {&(0x7f0000001140)=""/4096, 0x1000}], 0x2, &(0x7f0000000800)=[{&(0x7f0000000380)=""/180, 0xb4}], 0x1, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x7, 0x280000) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'veth1_to_bridge\x00', 0x1000}) [ 304.686406] kobject: 'loop1' (000000008885d61f): kobject_uevent_env [ 304.713050] kobject: 'loop1' (000000008885d61f): fill_kobj_path: path = '/devices/virtual/block/loop1' 03:36:30 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) prctl$PR_SET_MM(0x23, 0xf, &(0x7f0000ffd000/0x3000)=nil) setsockopt$llc_int(r0, 0x10c, 0x3, &(0x7f0000000000)=0x101, 0x4) socket$l2tp(0x18, 0x1, 0x1) 03:36:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) r1 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000240)={0xa, 0x4e23}, 0x1c) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e21, @multicast2}}, 0x10001, 0x3, 0x1, 0x2, 0x3}, &(0x7f0000000180)=0x98) write$P9_RVERSION(r1, &(0x7f0000000200)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.u'}, 0x15) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={r2, 0x4, 0xff, 0x10001, 0x6, 0x1f}, 0x14) listen(r0, 0x18) r3 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) 03:36:30 executing program 5: ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64\x00', &(0x7f00000000c0)='posix_acl_access\x00', 0x11, 0x2) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000180)={0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) 03:36:30 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000005efff)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) mq_timedreceive(r2, &(0x7f0000000100)=""/30, 0x1e, 0x2, &(0x7f0000000180)={r3, r4+10000000}) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0xa0000, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f00000002c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a8, 0x418, 0x248, 0x248, 0x0, 0x350, 0x510, 0x510, 0x510, 0x510, 0x510, 0x6, &(0x7f0000000040), {[{{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x9}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@broadcast, @empty, 0xffffff00, 0xff000000, 'rose0\x00', 'bridge_slave_1\x00', {0xff}, {}, 0x8f, 0x2, 0xa}, 0x0, 0x100, 0x160, 0x0, {}, [@common=@unspec=@rateest={0x68, 'rateest\x00', 0x0, {'veth1_to_team\x00', 'yam0\x00', 0x2, 0x0, 0x7fff, 0x0, 0x1, 0xbd3, 0x4bc, 0x91f1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @broadcast, 0x5, 0x3, [0x1d, 0x25, 0x13, 0x1c, 0x30, 0x32, 0x13, 0x7, 0x1c, 0x19, 0x27, 0x3e, 0x16, 0x3b, 0x1e, 0x6], 0x1, 0x8, 0x910d}}}, {{@ip={@empty, @rand_addr=0x2, 0xff0000ff, 0xff0000ff, 'veth0_to_bond\x00', 'veth0_to_hsr\x00', {}, {0xff}, 0x1, 0x0, 0x2}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x13, 0x6, 0xb3a9}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x80000001, 'syz1\x00', 0x10001}}}, {{@uncond, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x5, 0x8, @broadcast, 0x4e23}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1, [0x7b4, 0x8, 0x7fffffff, 0x1, 0x7, 0x87], 0xc0000000000000, 0x9}, {0x100000001, [0x2, 0x5, 0xff, 0x401, 0x6, 0xfffffffffffffff8], 0xffff, 0x1}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x608) getsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f00000001c0), &(0x7f0000000200)=0x4) [ 304.745305] kobject: 'loop4' (00000000d25cc50a): kobject_uevent_env [ 304.761285] kobject: 'loop4' (00000000d25cc50a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 304.772715] kobject: 'loop0' (0000000011706d8f): kobject_uevent_env [ 304.780907] kobject: 'loop0' (0000000011706d8f): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:36:30 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x100, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0xe0, r2, 0x2, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x60, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2e}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7fff}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x13}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}, @IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}]}, @IPVS_CMD_ATTR_DEST={0x6c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfc}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7ff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}]}]}, 0xe0}, 0x1, 0x0, 0x0, 0x4008010}, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x00\x03\xff\x02\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x06\x00', 0xc7, 0x80003}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000080003, 0x0) close(r0) 03:36:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/25, 0x19, 0x10020, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) pipe2(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8932, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) memfd_create(&(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x1) pipe2(&(0x7f00000000c0), 0x84800) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 304.845609] kobject: 'loop5' (0000000088c2b315): kobject_uevent_env [ 304.859631] kobject: 'loop5' (0000000088c2b315): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 304.883677] kobject: 'loop1' (000000008885d61f): kobject_uevent_env 03:36:30 executing program 5: ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64\x00', &(0x7f00000000c0)='posix_acl_access\x00', 0x11, 0x2) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000180)={0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) [ 304.899457] kobject: 'loop1' (000000008885d61f): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 304.922523] kobject: 'loop3' (0000000068abbd28): kobject_uevent_env [ 304.935111] kobject: 'loop3' (0000000068abbd28): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:36:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/25, 0x19, 0x10020, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) pipe2(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8932, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) memfd_create(&(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x1) pipe2(&(0x7f00000000c0), 0x84800) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 03:36:30 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) prctl$PR_SET_MM(0x23, 0xf, &(0x7f0000ffd000/0x3000)=nil) setsockopt$llc_int(r0, 0x10c, 0x3, &(0x7f0000000000)=0x101, 0x4) socket$l2tp(0x18, 0x1, 0x1) [ 304.949267] kobject: 'loop1' (000000008885d61f): kobject_uevent_env [ 304.961543] kobject: 'loop1' (000000008885d61f): fill_kobj_path: path = '/devices/virtual/block/loop1' 03:36:30 executing program 5: ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64\x00', &(0x7f00000000c0)='posix_acl_access\x00', 0x11, 0x2) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000180)={0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) 03:36:30 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) prctl$PR_SET_MM(0x23, 0xf, &(0x7f0000ffd000/0x3000)=nil) setsockopt$llc_int(r0, 0x10c, 0x3, &(0x7f0000000000)=0x101, 0x4) socket$l2tp(0x18, 0x1, 0x1) [ 305.002738] kobject: 'loop5' (0000000088c2b315): kobject_uevent_env [ 305.024382] kobject: 'loop5' (0000000088c2b315): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:36:30 executing program 5: r0 = syz_open_dev$dri(0x0, 0xc72f, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64\x00', &(0x7f00000000c0)='posix_acl_access\x00', 0x11, 0x2) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000180)={0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) 03:36:30 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000005efff)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) mq_timedreceive(r2, &(0x7f0000000100)=""/30, 0x1e, 0x2, &(0x7f0000000180)={r3, r4+10000000}) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0xa0000, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f00000002c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a8, 0x418, 0x248, 0x248, 0x0, 0x350, 0x510, 0x510, 0x510, 0x510, 0x510, 0x6, &(0x7f0000000040), {[{{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x9}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@broadcast, @empty, 0xffffff00, 0xff000000, 'rose0\x00', 'bridge_slave_1\x00', {0xff}, {}, 0x8f, 0x2, 0xa}, 0x0, 0x100, 0x160, 0x0, {}, [@common=@unspec=@rateest={0x68, 'rateest\x00', 0x0, {'veth1_to_team\x00', 'yam0\x00', 0x2, 0x0, 0x7fff, 0x0, 0x1, 0xbd3, 0x4bc, 0x91f1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @broadcast, 0x5, 0x3, [0x1d, 0x25, 0x13, 0x1c, 0x30, 0x32, 0x13, 0x7, 0x1c, 0x19, 0x27, 0x3e, 0x16, 0x3b, 0x1e, 0x6], 0x1, 0x8, 0x910d}}}, {{@ip={@empty, @rand_addr=0x2, 0xff0000ff, 0xff0000ff, 'veth0_to_bond\x00', 'veth0_to_hsr\x00', {}, {0xff}, 0x1, 0x0, 0x2}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x13, 0x6, 0xb3a9}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x80000001, 'syz1\x00', 0x10001}}}, {{@uncond, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x5, 0x8, @broadcast, 0x4e23}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1, [0x7b4, 0x8, 0x7fffffff, 0x1, 0x7, 0x87], 0xc0000000000000, 0x9}, {0x100000001, [0x2, 0x5, 0xff, 0x401, 0x6, 0xfffffffffffffff8], 0xffff, 0x1}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x608) [ 305.047003] kobject: 'loop0' (0000000011706d8f): kobject_uevent_env [ 305.061735] kobject: 'loop0' (0000000011706d8f): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:36:30 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) prctl$PR_SET_MM(0x23, 0xf, &(0x7f0000ffd000/0x3000)=nil) setsockopt$llc_int(r0, 0x10c, 0x3, &(0x7f0000000000)=0x101, 0x4) socket$l2tp(0x18, 0x1, 0x1) 03:36:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) r1 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000240)={0xa, 0x4e23}, 0x1c) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e21, @multicast2}}, 0x10001, 0x3, 0x1, 0x2, 0x3}, &(0x7f0000000180)=0x98) write$P9_RVERSION(r1, &(0x7f0000000200)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.u'}, 0x15) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={r2, 0x4, 0xff, 0x10001, 0x6, 0x1f}, 0x14) listen(r0, 0x18) r3 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) 03:36:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/25, 0x19, 0x10020, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) pipe2(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8932, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) memfd_create(&(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x1) pipe2(&(0x7f00000000c0), 0x84800) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) [ 305.096971] kobject: 'loop4' (00000000d25cc50a): kobject_uevent_env [ 305.124863] kobject: 'loop4' (00000000d25cc50a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 305.165640] kobject: 'loop5' (0000000088c2b315): kobject_uevent_env [ 305.190452] kobject: 'loop5' (0000000088c2b315): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 305.212795] kobject: 'loop2' (00000000dc531b81): kobject_uevent_env [ 305.224232] kobject: 'loop2' (00000000dc531b81): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 305.239740] kobject: 'loop3' (0000000068abbd28): kobject_uevent_env [ 305.246266] kobject: 'loop3' (0000000068abbd28): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 305.258216] kobject: 'loop5' (0000000088c2b315): kobject_uevent_env [ 305.264714] kobject: 'loop5' (0000000088c2b315): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 305.286624] kobject: 'loop3' (0000000068abbd28): kobject_uevent_env [ 305.293078] kobject: 'loop3' (0000000068abbd28): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 305.307349] kobject: 'loop5' (0000000088c2b315): kobject_uevent_env [ 305.313923] kobject: 'loop5' (0000000088c2b315): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 305.325841] kobject: 'loop0' (0000000011706d8f): kobject_uevent_env [ 305.332329] kobject: 'loop0' (0000000011706d8f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 305.342353] kobject: 'loop3' (0000000068abbd28): kobject_uevent_env [ 305.348890] kobject: 'loop3' (0000000068abbd28): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 305.360735] kobject: 'loop2' (00000000dc531b81): kobject_uevent_env [ 305.367374] kobject: 'loop2' (00000000dc531b81): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 305.379839] kobject: 'loop5' (0000000088c2b315): kobject_uevent_env [ 305.386392] kobject: 'loop5' (0000000088c2b315): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 305.399624] kobject: 'loop3' (0000000068abbd28): kobject_uevent_env [ 305.406209] kobject: 'loop3' (0000000068abbd28): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 305.417630] kobject: 'loop2' (00000000dc531b81): kobject_uevent_env [ 305.424294] kobject: 'loop2' (00000000dc531b81): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 305.434322] kobject: 'loop0' (0000000011706d8f): kobject_uevent_env [ 305.440740] kobject: 'loop0' (0000000011706d8f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 305.450441] kobject: 'loop1' (000000008885d61f): kobject_uevent_env [ 305.456890] kobject: 'loop1' (000000008885d61f): fill_kobj_path: path = '/devices/virtual/block/loop1' 03:36:31 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x100, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0xe0, r2, 0x2, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x60, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2e}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7fff}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x13}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}, @IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}]}, @IPVS_CMD_ATTR_DEST={0x6c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfc}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7ff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}]}]}, 0xe0}, 0x1, 0x0, 0x0, 0x4008010}, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x00\x03\xff\x02\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x06\x00', 0xc7, 0x80003}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000080003, 0x0) close(r0) 03:36:31 executing program 5: r0 = syz_open_dev$dri(0x0, 0xc72f, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64\x00', &(0x7f00000000c0)='posix_acl_access\x00', 0x11, 0x2) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000180)={0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) 03:36:31 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) prctl$PR_SET_MM(0x23, 0xf, &(0x7f0000ffd000/0x3000)=nil) setsockopt$llc_int(r0, 0x10c, 0x3, &(0x7f0000000000)=0x101, 0x4) socket$l2tp(0x18, 0x1, 0x1) 03:36:31 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/25, 0x19, 0x10020, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) pipe2(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8932, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) memfd_create(&(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x1) pipe2(&(0x7f00000000c0), 0x84800) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) 03:36:31 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000005efff)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) mq_timedreceive(r2, &(0x7f0000000100)=""/30, 0x1e, 0x2, &(0x7f0000000180)={r3, r4+10000000}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0xa0000, 0x0) 03:36:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) r1 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000240)={0xa, 0x4e23}, 0x1c) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e21, @multicast2}}, 0x10001, 0x3, 0x1, 0x2, 0x3}, &(0x7f0000000180)=0x98) write$P9_RVERSION(r1, &(0x7f0000000200)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.u'}, 0x15) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={r2, 0x4, 0xff, 0x10001, 0x6, 0x1f}, 0x14) listen(r0, 0x18) r3 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) 03:36:31 executing program 5: r0 = syz_open_dev$dri(0x0, 0xc72f, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64\x00', &(0x7f00000000c0)='posix_acl_access\x00', 0x11, 0x2) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000180)={0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) [ 305.681520] kobject: 'loop4' (00000000d25cc50a): kobject_uevent_env [ 305.711223] kobject: 'loop4' (00000000d25cc50a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 305.744529] kobject: 'loop5' (0000000088c2b315): kobject_uevent_env 03:36:31 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) prctl$PR_SET_MM(0x23, 0xf, &(0x7f0000ffd000/0x3000)=nil) setsockopt$llc_int(r0, 0x10c, 0x3, &(0x7f0000000000)=0x101, 0x4) 03:36:31 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/25, 0x19, 0x10020, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) pipe2(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8932, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) memfd_create(&(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x1) pipe2(&(0x7f00000000c0), 0x84800) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) 03:36:31 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64\x00', &(0x7f00000000c0)='posix_acl_access\x00', 0x11, 0x2) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000180)={0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) 03:36:31 executing program 3: syz_init_net_socket$llc(0x1a, 0x1, 0x0) prctl$PR_SET_MM(0x23, 0xf, &(0x7f0000ffd000/0x3000)=nil) 03:36:31 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000005efff)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) mq_timedreceive(r2, &(0x7f0000000100)=""/30, 0x1e, 0x2, &(0x7f0000000180)={r3, r4+10000000}) [ 305.819355] kobject: 'loop5' (0000000088c2b315): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 305.859319] kobject: 'loop3' (0000000068abbd28): kobject_uevent_env [ 305.915373] kobject: 'loop3' (0000000068abbd28): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 305.957497] kobject: 'loop2' (00000000dc531b81): kobject_uevent_env [ 305.963967] kobject: 'loop2' (00000000dc531b81): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 305.975711] kobject: 'loop0' (0000000011706d8f): kobject_uevent_env [ 305.982227] kobject: 'loop0' (0000000011706d8f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 305.993973] kobject: 'loop3' (0000000068abbd28): kobject_uevent_env [ 306.000388] kobject: 'loop3' (0000000068abbd28): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 306.015580] kobject: 'loop2' (00000000dc531b81): kobject_uevent_env [ 306.022742] kobject: 'loop2' (00000000dc531b81): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 306.034832] kobject: 'loop5' (0000000088c2b315): kobject_uevent_env [ 306.041258] kobject: 'loop5' (0000000088c2b315): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 306.051259] kobject: 'loop0' (0000000011706d8f): kobject_uevent_env [ 306.058448] kobject: 'loop0' (0000000011706d8f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 306.068998] kobject: 'loop1' (000000008885d61f): kobject_uevent_env [ 306.075801] kobject: 'loop1' (000000008885d61f): fill_kobj_path: path = '/devices/virtual/block/loop1' 03:36:32 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x100, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0xe0, r2, 0x2, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x60, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2e}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7fff}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x13}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}, @IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}]}, @IPVS_CMD_ATTR_DEST={0x6c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfc}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7ff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}]}]}, 0xe0}, 0x1, 0x0, 0x0, 0x4008010}, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x00\x03\xff\x02\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x06\x00', 0xc7, 0x80003}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000080003, 0x0) close(r0) 03:36:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/25, 0x19, 0x10020, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) pipe2(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8932, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) memfd_create(&(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x1) pipe2(&(0x7f00000000c0), 0x84800) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 03:36:32 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64\x00', &(0x7f00000000c0)='posix_acl_access\x00', 0x11, 0x2) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000180)={0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) 03:36:32 executing program 3: syz_init_net_socket$llc(0x1a, 0x1, 0x0) 03:36:32 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000005efff)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) 03:36:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) r1 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000240)={0xa, 0x4e23}, 0x1c) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e21, @multicast2}}, 0x10001, 0x3, 0x1, 0x2, 0x3}, &(0x7f0000000180)=0x98) write$P9_RVERSION(r1, &(0x7f0000000200)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.u'}, 0x15) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={r2, 0x4, 0xff, 0x10001, 0x6, 0x1f}, 0x14) listen(r0, 0x18) r3 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) [ 306.530415] kobject: 'loop4' (00000000d25cc50a): kobject_uevent_env [ 306.562252] kobject: 'loop4' (00000000d25cc50a): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:36:32 executing program 3: syz_init_net_socket$llc(0x1a, 0x0, 0x0) 03:36:32 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64\x00', &(0x7f00000000c0)='posix_acl_access\x00', 0x11, 0x2) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000180)={0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) 03:36:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/25, 0x19, 0x10020, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) pipe2(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8932, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) memfd_create(&(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x1) pipe2(&(0x7f00000000c0), 0x84800) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 03:36:32 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x100, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0xe0, r2, 0x2, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x60, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2e}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7fff}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x13}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}, @IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}]}, @IPVS_CMD_ATTR_DEST={0x6c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfc}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7ff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}]}]}, 0xe0}, 0x1, 0x0, 0x0, 0x4008010}, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x00\x03\xff\x02\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x06\x00', 0xc7, 0x80003}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000080003, 0x0) [ 306.642042] kobject: 'loop3' (0000000068abbd28): kobject_uevent_env [ 306.658457] kobject: 'loop3' (0000000068abbd28): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 306.676785] kobject: 'loop5' (0000000088c2b315): kobject_uevent_env 03:36:32 executing program 3: syz_init_net_socket$llc(0x1a, 0x0, 0x0) 03:36:32 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000005efff)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) [ 306.690018] kobject: 'loop5' (0000000088c2b315): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 306.716448] kobject: 'loop2' (00000000dc531b81): kobject_uevent_env [ 306.723637] kobject: 'loop2' (00000000dc531b81): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 306.757500] kobject: 'loop0' (0000000011706d8f): kobject_uevent_env [ 306.768771] kobject: 'loop0' (0000000011706d8f): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:36:32 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xc72f, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64\x00', &(0x7f00000000c0)='posix_acl_access\x00', 0x11, 0x2) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000180)={0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) 03:36:32 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000005efff)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) syz_open_pts(r0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) 03:36:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/25, 0x19, 0x10020, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) pipe2(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8932, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) memfd_create(&(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 306.845824] kobject: 'loop5' (0000000088c2b315): kobject_uevent_env [ 306.857352] kobject: 'loop5' (0000000088c2b315): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:36:32 executing program 3: syz_init_net_socket$llc(0x1a, 0x0, 0x0) [ 306.901482] kobject: 'loop2' (00000000dc531b81): kobject_uevent_env [ 306.925307] kobject: 'loop2' (00000000dc531b81): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:36:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/25, 0x19, 0x10020, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) pipe2(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8932, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) memfd_create(&(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x1) pipe2(&(0x7f00000000c0), 0x84800) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) [ 306.992902] kobject: 'loop3' (0000000068abbd28): kobject_uevent_env [ 307.010417] kobject: 'loop3' (0000000068abbd28): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:36:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) r1 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000240)={0xa, 0x4e23}, 0x1c) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e21, @multicast2}}, 0x10001, 0x3, 0x1, 0x2, 0x3}, &(0x7f0000000180)=0x98) write$P9_RVERSION(r1, &(0x7f0000000200)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.u'}, 0x15) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={r2, 0x4, 0xff, 0x10001, 0x6, 0x1f}, 0x14) listen(r0, 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) 03:36:32 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xc72f, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64\x00', &(0x7f00000000c0)='posix_acl_access\x00', 0x11, 0x2) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000180)={0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) 03:36:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/25, 0x19, 0x10020, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) pipe2(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8932, &(0x7f0000000000)={'team_slave_0\x00'}) memfd_create(&(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 03:36:32 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000005efff)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) [ 307.038073] kobject: 'loop3' (0000000068abbd28): kobject_uevent_env [ 307.044948] kobject: 'loop3' (0000000068abbd28): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 307.068403] kobject: 'loop5' (0000000088c2b315): kobject_uevent_env [ 307.079160] kobject: 'loop5' (0000000088c2b315): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 307.103123] kobject: 'loop2' (00000000dc531b81): kobject_uevent_env [ 307.121137] kobject: 'loop2' (00000000dc531b81): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 307.155297] kobject: 'loop0' (0000000011706d8f): kobject_uevent_env [ 307.161843] kobject: 'loop0' (0000000011706d8f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 307.183379] kobject: 'loop1' (000000008885d61f): kobject_uevent_env [ 307.195687] kobject: 'loop1' (000000008885d61f): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 307.207287] kobject: 'loop5' (0000000088c2b315): kobject_uevent_env [ 307.214284] kobject: 'loop5' (0000000088c2b315): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 307.224589] kobject: 'loop2' (00000000dc531b81): kobject_uevent_env [ 307.231018] kobject: 'loop2' (00000000dc531b81): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 307.241111] kobject: 'loop1' (000000008885d61f): kobject_uevent_env [ 307.248447] kobject: 'loop1' (000000008885d61f): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 307.258255] kobject: 'loop0' (0000000011706d8f): kobject_uevent_env [ 307.264732] kobject: 'loop0' (0000000011706d8f): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:36:33 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x100, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0xe0, r2, 0x2, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x60, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2e}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7fff}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x13}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}, @IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}]}, @IPVS_CMD_ATTR_DEST={0x6c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfc}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7ff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}]}]}, 0xe0}, 0x1, 0x0, 0x0, 0x4008010}, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x00\x03\xff\x02\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x06\x00', 0xc7, 0x80003}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000080003, 0x0) 03:36:33 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/25, 0x19, 0x10020, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) pipe2(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8932, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) memfd_create(&(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x1) pipe2(&(0x7f00000000c0), 0x84800) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) 03:36:33 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xc72f, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64\x00', &(0x7f00000000c0)='posix_acl_access\x00', 0x11, 0x2) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000180)={0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) 03:36:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/25, 0x19, 0x10020, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) pipe2(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8932, &(0x7f0000000000)={'team_slave_0\x00'}) memfd_create(&(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 03:36:33 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000005efff)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) 03:36:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) r1 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000240)={0xa, 0x4e23}, 0x1c) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e21, @multicast2}}, 0x10001, 0x3, 0x1, 0x2, 0x3}, &(0x7f0000000180)=0x98) write$P9_RVERSION(r1, &(0x7f0000000200)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.u'}, 0x15) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={r2, 0x4, 0xff, 0x10001, 0x6, 0x1f}, 0x14) listen(r0, 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) 03:36:33 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xc72f, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) setxattr$security_smack_entry(0x0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f00000000c0)='posix_acl_access\x00', 0x11, 0x2) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000180)={0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) [ 307.548735] kobject: 'loop4' (00000000d25cc50a): kobject_uevent_env [ 307.580827] kobject: 'loop4' (00000000d25cc50a): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:36:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) r1 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000240)={0xa, 0x4e23}, 0x1c) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e21, @multicast2}}, 0x10001, 0x3, 0x1, 0x2, 0x3}, &(0x7f0000000180)=0x98) write$P9_RVERSION(r1, &(0x7f0000000200)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.u'}, 0x15) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={r2, 0x4, 0xff, 0x10001, 0x6, 0x1f}, 0x14) listen(r0, 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) 03:36:33 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f000005efff)='/dev/ptmx\x00', 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) 03:36:33 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/25, 0x19, 0x10020, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) pipe2(0x0, 0x0) memfd_create(&(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 03:36:33 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/25, 0x19, 0x10020, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) pipe2(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8932, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) memfd_create(&(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x1) pipe2(&(0x7f00000000c0), 0x84800) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) [ 307.632669] kobject: 'loop5' (0000000088c2b315): kobject_uevent_env [ 307.646522] kobject: 'loop5' (0000000088c2b315): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 307.689167] kobject: 'loop1' (000000008885d61f): kobject_uevent_env [ 307.698022] kobject: 'loop1' (000000008885d61f): fill_kobj_path: path = '/devices/virtual/block/loop1' 03:36:33 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xc72f, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) setxattr$security_smack_entry(0x0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f00000000c0)='posix_acl_access\x00', 0x11, 0x2) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000180)={0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) [ 307.735381] kobject: 'loop0' (0000000011706d8f): kobject_uevent_env [ 307.753892] kobject: 'loop0' (0000000011706d8f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 307.785294] kobject: 'loop2' (00000000dc531b81): kobject_uevent_env [ 307.796541] kobject: 'loop2' (00000000dc531b81): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 307.807339] kobject: 'loop3' (0000000068abbd28): kobject_uevent_env [ 307.813943] kobject: 'loop3' (0000000068abbd28): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 307.824642] kobject: 'loop5' (0000000088c2b315): kobject_uevent_env [ 307.831080] kobject: 'loop5' (0000000088c2b315): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 307.841040] kobject: 'loop2' (00000000dc531b81): kobject_uevent_env [ 307.847520] kobject: 'loop2' (00000000dc531b81): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 307.857381] kobject: 'loop3' (0000000068abbd28): kobject_uevent_env [ 307.863829] kobject: 'loop3' (0000000068abbd28): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 307.873676] kobject: 'loop0' (0000000011706d8f): kobject_uevent_env [ 307.880143] kobject: 'loop0' (0000000011706d8f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 307.889879] kobject: 'loop5' (0000000088c2b315): kobject_uevent_env [ 307.896299] kobject: 'loop5' (0000000088c2b315): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:36:33 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x100, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0xe0, r2, 0x2, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x60, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2e}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7fff}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x13}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}, @IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}]}, @IPVS_CMD_ATTR_DEST={0x6c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfc}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7ff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}]}]}, 0xe0}, 0x1, 0x0, 0x0, 0x4008010}, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x00\x03\xff\x02\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x06\x00', 0xc7, 0x80003}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000080003, 0x0) 03:36:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) r1 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000240)={0xa, 0x4e23}, 0x1c) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e21, @multicast2}}, 0x10001, 0x3, 0x1, 0x2, 0x3}, &(0x7f0000000180)=0x98) write$P9_RVERSION(r1, &(0x7f0000000200)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.u'}, 0x15) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={r2, 0x4, 0xff, 0x10001, 0x6, 0x1f}, 0x14) r3 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) 03:36:33 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/25, 0x19, 0x10020, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) memfd_create(&(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 03:36:33 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/25, 0x19, 0x10020, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) pipe2(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8932, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) memfd_create(&(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x1) pipe2(&(0x7f00000000c0), 0x84800) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 03:36:33 executing program 0: openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) 03:36:33 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xc72f, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) setxattr$security_smack_entry(0x0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f00000000c0)='posix_acl_access\x00', 0x11, 0x2) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000180)={0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) 03:36:33 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xc72f, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000000c0)='posix_acl_access\x00', 0x11, 0x2) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000180)={0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) [ 308.406259] kobject: 'loop4' (00000000d25cc50a): kobject_uevent_env [ 308.442518] kobject: 'loop4' (00000000d25cc50a): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:36:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/25, 0x19, 0x10020, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) pipe2(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8932, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) memfd_create(&(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x1) pipe2(&(0x7f00000000c0), 0x84800) 03:36:34 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/25, 0x19, 0x10020, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) memfd_create(&(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 03:36:34 executing program 0: openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) 03:36:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) r1 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000240)={0xa, 0x4e23}, 0x1c) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e21, @multicast2}}, 0x10001, 0x3, 0x1, 0x2, 0x3}, &(0x7f0000000180)=0x98) write$P9_RVERSION(r1, &(0x7f0000000200)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.u'}, 0x15) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={r2, 0x4, 0xff, 0x10001, 0x6, 0x1f}, 0x14) r3 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) 03:36:34 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xc72f, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000000c0)='posix_acl_access\x00', 0x11, 0x2) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000180)={0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) [ 308.481491] kobject: 'loop5' (0000000088c2b315): kobject_uevent_env [ 308.504258] kobject: 'loop5' (0000000088c2b315): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 308.566055] kobject: 'loop3' (0000000068abbd28): kobject_uevent_env [ 308.585705] kobject: 'loop3' (0000000068abbd28): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 308.599393] kobject: 'loop2' (00000000dc531b81): kobject_uevent_env [ 308.606467] kobject: 'loop2' (00000000dc531b81): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 308.617295] kobject: 'loop0' (0000000011706d8f): kobject_uevent_env [ 308.624328] kobject: 'loop0' (0000000011706d8f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 308.634740] kobject: 'loop1' (000000008885d61f): kobject_uevent_env [ 308.641322] kobject: 'loop1' (000000008885d61f): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 308.657824] kobject: 'loop0' (0000000011706d8f): kobject_uevent_env [ 308.664661] kobject: 'loop0' (0000000011706d8f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 308.674850] kobject: 'loop2' (00000000dc531b81): kobject_uevent_env [ 308.681354] kobject: 'loop2' (00000000dc531b81): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 308.691457] kobject: 'loop5' (0000000088c2b315): kobject_uevent_env [ 308.698014] kobject: 'loop5' (0000000088c2b315): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 308.708672] kobject: 'loop1' (000000008885d61f): kobject_uevent_env [ 308.717789] kobject: 'loop1' (000000008885d61f): fill_kobj_path: path = '/devices/virtual/block/loop1' 03:36:34 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x100, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0xe0, r2, 0x2, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x60, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2e}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7fff}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x13}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}, @IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}]}, @IPVS_CMD_ATTR_DEST={0x6c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfc}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7ff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}]}]}, 0xe0}, 0x1, 0x0, 0x0, 0x4008010}, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x00\x03\xff\x02\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x06\x00', 0xc7, 0x80003}) close(r0) 03:36:34 executing program 0: openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) 03:36:34 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/25, 0x19, 0x10020, 0x0, 0x0) memfd_create(&(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 03:36:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/25, 0x19, 0x10020, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) pipe2(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8932, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) memfd_create(&(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x1) 03:36:34 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xc72f, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000000c0)='posix_acl_access\x00', 0x11, 0x2) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000180)={0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) 03:36:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) r1 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000240)={0xa, 0x4e23}, 0x1c) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e21, @multicast2}}, 0x10001, 0x3, 0x1, 0x2, 0x3}, &(0x7f0000000180)=0x98) write$P9_RVERSION(r1, &(0x7f0000000200)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.u'}, 0x15) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={r2, 0x4, 0xff, 0x10001, 0x6, 0x1f}, 0x14) r3 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) 03:36:34 executing program 0: openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 309.266708] kobject: 'loop4' (00000000d25cc50a): kobject_uevent_env [ 309.295667] kobject: 'loop4' (00000000d25cc50a): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:36:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/25, 0x19, 0x10020, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) pipe2(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8932, &(0x7f0000000000)={'team_slave_0\x00'}) memfd_create(&(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x1) 03:36:34 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) memfd_create(&(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 03:36:34 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xc72f, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64\x00', 0x0, 0x0, 0x2) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000180)={0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) [ 309.329151] kobject: 'loop0' (0000000011706d8f): kobject_uevent_env 03:36:34 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/25, 0x19, 0x10020, 0x0, 0x0) memfd_create(&(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 03:36:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) r1 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000240)={0xa, 0x4e23}, 0x1c) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e21, @multicast2}}, 0x10001, 0x3, 0x1, 0x2, 0x3}, &(0x7f0000000180)=0x98) write$P9_RVERSION(r1, &(0x7f0000000200)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.u'}, 0x15) listen(r0, 0x18) r2 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) [ 309.377427] kobject: 'loop0' (0000000011706d8f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 309.405049] kobject: 'loop3' (0000000068abbd28): kobject_uevent_env [ 309.429896] kobject: 'loop3' (0000000068abbd28): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 309.448631] kobject: 'loop2' (00000000dc531b81): kobject_uevent_env [ 309.455263] kobject: 'loop2' (00000000dc531b81): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 309.467151] kobject: 'loop5' (0000000088c2b315): kobject_uevent_env [ 309.473902] kobject: 'loop5' (0000000088c2b315): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 309.486205] kobject: 'loop1' (000000008885d61f): kobject_uevent_env [ 309.492886] kobject: 'loop1' (000000008885d61f): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 309.508712] kobject: 'loop2' (00000000dc531b81): kobject_uevent_env [ 309.515923] kobject: 'loop2' (00000000dc531b81): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 309.528116] kobject: 'loop5' (0000000088c2b315): kobject_uevent_env [ 309.534913] kobject: 'loop5' (0000000088c2b315): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 309.547389] kobject: 'loop0' (0000000011706d8f): kobject_uevent_env [ 309.554058] kobject: 'loop0' (0000000011706d8f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 309.660428] kobject: 'loop1' (000000008885d61f): kobject_uevent_env [ 309.666939] kobject: 'loop1' (000000008885d61f): fill_kobj_path: path = '/devices/virtual/block/loop1' 03:36:35 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x100, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0xe0, r2, 0x2, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x60, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2e}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7fff}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x13}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}, @IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}]}, @IPVS_CMD_ATTR_DEST={0x6c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfc}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7ff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}]}]}, 0xe0}, 0x1, 0x0, 0x0, 0x4008010}, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x00\x03\xff\x02\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x06\x00', 0xc7, 0x80003}) close(r0) 03:36:35 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x1, 0x0) memfd_create(&(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 03:36:35 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xc72f, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64\x00', 0x0, 0x0, 0x2) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000180)={0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) 03:36:35 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/25, 0x19, 0x10020, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) pipe2(0x0, 0x0) memfd_create(&(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x1) 03:36:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) r1 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000240)={0xa, 0x4e23}, 0x1c) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e21, @multicast2}}, 0x10001, 0x3, 0x1, 0x2, 0x3}, &(0x7f0000000180)=0x98) write$P9_RVERSION(r1, &(0x7f0000000200)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.u'}, 0x15) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={r2, 0x4, 0xff, 0x10001, 0x6, 0x1f}, 0x14) r3 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) 03:36:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) r1 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000240)={0xa, 0x4e23}, 0x1c) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e21, @multicast2}}, 0x10001, 0x3, 0x1, 0x2, 0x3}, &(0x7f0000000180)=0x98) listen(r0, 0x18) r2 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) 03:36:35 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xc72f, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64\x00', 0x0, 0x0, 0x2) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000180)={0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) [ 310.146085] kobject: 'loop4' (00000000d25cc50a): kobject_uevent_env [ 310.162420] kobject: 'loop4' (00000000d25cc50a): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:36:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) r1 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000240)={0xa, 0x4e23}, 0x1c) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e21, @multicast2}}, 0x10001, 0x3, 0x1, 0x2, 0x3}, &(0x7f0000000180)=0x98) write$P9_RVERSION(r1, &(0x7f0000000200)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.u'}, 0x15) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={r2, 0x4, 0xff, 0x10001, 0x6, 0x1f}, 0x14) r3 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) 03:36:35 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/25, 0x19, 0x10020, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) memfd_create(&(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x1) [ 310.219133] kobject: 'loop5' (0000000088c2b315): kobject_uevent_env [ 310.232972] kobject: 'loop5' (0000000088c2b315): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 310.252753] kobject: 'loop0' (0000000011706d8f): kobject_uevent_env 03:36:35 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x1, 0x0) memfd_create(&(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 310.277336] kobject: 'loop0' (0000000011706d8f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 310.296702] kobject: 'loop3' (0000000068abbd28): kobject_uevent_env [ 310.307744] kobject: 'loop3' (0000000068abbd28): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 310.358389] kobject: 'loop2' (00000000dc531b81): kobject_uevent_env [ 310.390997] kobject: 'loop2' (00000000dc531b81): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:36:36 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xc72f, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) setxattr$security_smack_en