[....] Starting OpenBSD Secure Shell server: sshd[ 34.988894] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 39.162149] random: sshd: uninitialized urandom read (32 bytes read) [ 39.413483] kauditd_printk_skb: 2 callbacks suppressed [ 39.413492] audit: type=1400 audit(1561127528.598:35): avc: denied { map } for pid=7152 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 39.499951] random: sshd: uninitialized urandom read (32 bytes read) [ 40.199310] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.59' (ECDSA) to the list of known hosts. [ 45.759572] random: sshd: uninitialized urandom read (32 bytes read) 2019/06/21 14:32:15 fuzzer started [ 45.958976] audit: type=1400 audit(1561127535.138:36): avc: denied { map } for pid=7161 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 47.831730] random: cc1: uninitialized urandom read (8 bytes read) 2019/06/21 14:32:18 dialing manager at 10.128.0.105:36079 2019/06/21 14:32:18 syscalls: 2444 2019/06/21 14:32:18 code coverage: enabled 2019/06/21 14:32:18 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/06/21 14:32:18 extra coverage: extra coverage is not supported by the kernel 2019/06/21 14:32:18 setuid sandbox: enabled 2019/06/21 14:32:18 namespace sandbox: enabled 2019/06/21 14:32:18 Android sandbox: /sys/fs/selinux/policy does not exist 2019/06/21 14:32:18 fault injection: enabled 2019/06/21 14:32:18 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/06/21 14:32:18 net packet injection: enabled 2019/06/21 14:32:18 net device setup: enabled [ 50.296080] random: crng init done 14:34:04 executing program 5: 14:34:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$SIOCX25GFACILITIES(0xffffffffffffffff, 0x89e2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:34:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2804}, [@nested={0x8, 0x11, [@generic="802f"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 14:34:04 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x2, 0x0, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0xdf27, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, &(0x7f0000000200)={{0x6e, @loopback, 0x4e24, 0x3, 'none\x00', 0x2, 0x94f, 0x13}, {@remote, 0x4e24, 0x10002, 0x8, 0x6, 0x1}}, 0x44) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:34:04 executing program 2: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) write(r1, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x3}, 0x0, 0x0, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 14:34:04 executing program 4: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 155.215078] audit: type=1400 audit(1561127644.398:37): avc: denied { map } for pid=7161 comm="syz-fuzzer" path="/root/syzkaller-shm108353538" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 155.260573] audit: type=1400 audit(1561127644.418:38): avc: denied { map } for pid=7179 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1181 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 155.490274] IPVS: ftp: loaded support on port[0] = 21 [ 155.799507] chnl_net:caif_netlink_parms(): no params data found [ 155.830792] IPVS: ftp: loaded support on port[0] = 21 [ 155.841617] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.849038] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.856663] device bridge_slave_0 entered promiscuous mode [ 155.866517] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.873019] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.879904] device bridge_slave_1 entered promiscuous mode [ 155.908623] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 155.920703] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 155.948602] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 155.955948] team0: Port device team_slave_0 added [ 155.964090] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 155.971466] team0: Port device team_slave_1 added [ 155.976793] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 155.984338] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 156.023017] IPVS: ftp: loaded support on port[0] = 21 [ 156.042586] device hsr_slave_0 entered promiscuous mode [ 156.080819] device hsr_slave_1 entered promiscuous mode [ 156.120838] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 156.127930] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 156.224431] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.230905] bridge0: port 2(bridge_slave_1) entered forwarding state [ 156.237827] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.244221] bridge0: port 1(bridge_slave_0) entered forwarding state [ 156.252449] chnl_net:caif_netlink_parms(): no params data found [ 156.283961] IPVS: ftp: loaded support on port[0] = 21 [ 156.357613] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.364202] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.371586] device bridge_slave_0 entered promiscuous mode [ 156.393348] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.401107] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.408055] device bridge_slave_1 entered promiscuous mode [ 156.437323] chnl_net:caif_netlink_parms(): no params data found [ 156.472674] IPVS: ftp: loaded support on port[0] = 21 [ 156.479780] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 156.519382] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 156.568281] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 156.575858] team0: Port device team_slave_0 added [ 156.583009] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 156.590946] team0: Port device team_slave_1 added [ 156.605574] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.612131] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.619028] device bridge_slave_0 entered promiscuous mode [ 156.628292] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.634738] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.642441] device bridge_slave_1 entered promiscuous mode [ 156.663916] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 156.674968] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 156.694346] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 156.703202] chnl_net:caif_netlink_parms(): no params data found [ 156.729379] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 156.782365] device hsr_slave_0 entered promiscuous mode [ 156.830983] device hsr_slave_1 entered promiscuous mode [ 156.890909] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 156.904113] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 156.912180] team0: Port device team_slave_0 added [ 156.926423] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.935975] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.945245] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 156.954991] 8021q: adding VLAN 0 to HW filter on device bond0 [ 156.961410] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 156.968665] team0: Port device team_slave_1 added [ 156.982049] IPVS: ftp: loaded support on port[0] = 21 [ 156.998028] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 157.008792] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 157.017242] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 157.050703] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 157.059469] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 157.066828] 8021q: adding VLAN 0 to HW filter on device team0 [ 157.094666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 157.102164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 157.109512] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.116424] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.123702] device bridge_slave_0 entered promiscuous mode [ 157.131998] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.138368] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.145643] device bridge_slave_1 entered promiscuous mode [ 157.224063] device hsr_slave_0 entered promiscuous mode [ 157.260493] device hsr_slave_1 entered promiscuous mode [ 157.305538] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 157.317335] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 157.326250] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 157.333747] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 157.341422] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 157.360801] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 157.369727] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 157.377891] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 157.385658] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.392068] bridge0: port 1(bridge_slave_0) entered forwarding state [ 157.401315] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 157.417764] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 157.434134] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 157.446649] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 157.454715] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 157.462639] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.468973] bridge0: port 2(bridge_slave_1) entered forwarding state [ 157.476204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 157.484055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 157.499966] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 157.558179] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 157.567248] team0: Port device team_slave_0 added [ 157.576740] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 157.584661] team0: Port device team_slave_1 added [ 157.596828] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 157.607168] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 157.617936] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 157.635961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 157.644391] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 157.652288] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 157.661504] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 157.670256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 157.678650] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 157.688338] chnl_net:caif_netlink_parms(): no params data found [ 157.710867] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 157.783959] device hsr_slave_0 entered promiscuous mode [ 157.830581] device hsr_slave_1 entered promiscuous mode [ 157.870443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 157.878125] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 157.888483] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 157.913370] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 157.920486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 157.928149] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 157.939229] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 157.950201] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 157.966202] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 157.977382] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.984566] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.992413] device bridge_slave_0 entered promiscuous mode [ 158.006526] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 158.034542] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.041860] bridge0: port 2(bridge_slave_1) entered disabled state [ 158.049265] device bridge_slave_1 entered promiscuous mode [ 158.062521] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 158.070398] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 158.083575] 8021q: adding VLAN 0 to HW filter on device bond0 [ 158.131984] 8021q: adding VLAN 0 to HW filter on device bond0 [ 158.141809] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 158.184712] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 158.192936] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 158.204816] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 158.215339] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 158.230999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 158.238512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 158.248143] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 158.254892] 8021q: adding VLAN 0 to HW filter on device team0 14:34:07 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000480)='/dev/media#\x00', 0xffffffff00000001, 0x48080) r1 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x3, 0x40000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc1205531, &(0x7f0000000040)=0xfffd) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x2, 0x181000) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000300)=0x3, 0x4) ioctl$KVM_IRQ_LINE_STATUS(r0, 0xc008ae67, &(0x7f00000004c0)={0x5, 0x7fff}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x400448c8, &(0x7f0000000380)={r1, r2, 0x1, 0x0, &(0x7f0000000340), 0x7ff, 0x7, 0xfff, 0x3, 0x0, 0x3, 0x8, 'syz0\x00'}) ioctl$DRM_IOCTL_SET_VERSION(r2, 0xc0106407, &(0x7f0000000440)={0x6, 0x7f, 0x38b2, 0x1}) futex(&(0x7f0000000200), 0x8c, 0x0, &(0x7f0000000280)={r3, r4+10000000}, &(0x7f00000002c0)=0x2, 0x2) ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f0000000340)=0x6) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000100)={0x2, &(0x7f0000000140)=[{}, {}]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000180)={0x6, 0x70, 0x4, 0x800, 0x40, 0x0, 0x0, 0x10000, 0x0, 0x9, 0x1ff, 0x100000001, 0xed6e, 0x1000, 0x7, 0x40, 0x6, 0x40, 0x0, 0x1, 0x4, 0xffff, 0x3, 0x101, 0x1, 0x80, 0xdd, 0xfff, 0x6, 0x7fff, 0xfffffffffffff800, 0xfffffffffffffff7, 0x800, 0x7, 0x0, 0x1f, 0x4, 0x0, 0x0, 0xffff, 0x1, @perf_bp={&(0x7f00000000c0)}, 0x4004, 0x4, 0x52c, 0x7, 0x7f, 0x1, 0x5}) [ 158.297708] chnl_net:caif_netlink_parms(): no params data found [ 158.328870] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready 14:34:07 executing program 5: ioctl$TCSETSF(0xffffffffffffffff, 0x5412, 0x0) personality(0x0) r0 = getpgrp(0x0) rt_sigaction(0x41, &(0x7f00000000c0)={&(0x7f0000000000)="3e0ffb88ffefffff67f243ad8fa818b6db0d8f491891a6915a000041d03bc42179c5d400c4e2d9b6ea0f830c2f000047f64e091a0f01ef", {0xfffffffffffff909}, 0x1, &(0x7f0000000080)="c401f8171ac401ff1294dc05000000f0202e8eab812400008f0978d6949a00000081c462f91caf5300000066440f29e3c4227d333f42f6ccd9c4838179f604"}, &(0x7f00000001c0)={&(0x7f0000000100)="460f18b64f000000c461e96a9900000080c4e2913c1ccc42d9ff0fea757102426ac4e27d5a763ac4c359696100edc4a1fc575101c401e9d52b", {}, 0x0, &(0x7f0000000140)="c403497ee3f2f345f674fc21660f5505f33cc1a7f2a4c4c149628302000000c4a17d5cc70fe83a653647819b0c000000f6141f22c481f8179c0900080000c44259b61d2a000000"}, 0x8, &(0x7f0000000200)) sched_setscheduler(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) socket$alg(0x26, 0x5, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000240), 0xffffffffffffff8e, 0x0, 0x0, 0x15f) openat$full(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCGDEV(0xffffffffffffffff, 0x80045432, &(0x7f0000000040)) [ 158.344261] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 158.356271] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 158.364660] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 158.372113] team0: Port device team_slave_0 added [ 158.382698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 158.389794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 158.397074] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 158.404987] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 158.412913] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.419281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 158.426532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 158.435180] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 158.440037] hrtimer: interrupt took 40422 ns [ 158.442947] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.453262] bridge0: port 2(bridge_slave_1) entered forwarding state [ 158.462689] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 158.482709] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 158.495530] team0: Port device team_slave_1 added [ 158.507575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 158.520966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 14:34:07 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x581, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) ioctl$DRM_IOCTL_CONTROL(r2, 0x40086414, &(0x7f0000000140)={0x0, 0x7fff}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000100)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x24, &(0x7f0000000180)=0x8, 0x3) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2002) sendmmsg(r0, &(0x7f00000000c0), 0x182, 0x0) [ 158.546067] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 158.564748] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 158.586911] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 158.601694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 158.620506] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 158.628388] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 158.634820] 8021q: adding VLAN 0 to HW filter on device team0 [ 158.643794] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 158.676134] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 158.687085] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 158.700669] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 158.708424] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 158.716440] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 158.724424] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.730822] bridge0: port 1(bridge_slave_0) entered forwarding state [ 158.737687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 158.745470] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 158.756176] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 158.763837] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.772176] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.779146] device bridge_slave_0 entered promiscuous mode [ 158.844341] device hsr_slave_0 entered promiscuous mode [ 158.910396] device hsr_slave_1 entered promiscuous mode 14:34:08 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3, 0x80011, r0, 0x0) lgetxattr(0x0, &(0x7f0000000440)=@known='trusted.overlay.origin\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x6) r1 = accept4(0xffffffffffffff9c, &(0x7f0000000000)=@can, &(0x7f0000000100)=0x80, 0x80000) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000140)=0x7, 0x4) [ 158.951066] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 158.961835] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 158.969141] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 158.977035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 158.985116] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 158.993482] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.999835] bridge0: port 2(bridge_slave_1) entered forwarding state [ 159.012341] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 159.020281] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 159.028192] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.036655] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.044135] device bridge_slave_1 entered promiscuous mode 14:34:08 executing program 5: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000140)={0xe, 0x102, 0x0, {0x1000, 0x8, 0x40, 0x9}}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x200, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0xffffffffffffffff}, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x410000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000200)={0x184, r3, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x60, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf120}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_BEARER={0x34, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'ip6_vti0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xed1}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x90e1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xb5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x54, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4a6f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffffffff4d0f}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x800}]}]}, 0x184}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0xffffffffffffffef, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000440)={0x5}, 0x4) [ 159.060516] 8021q: adding VLAN 0 to HW filter on device bond0 [ 159.067611] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 159.087020] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 159.096264] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 159.139811] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 159.154448] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 159.164470] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 159.171797] audit: type=1400 audit(1561127648.348:39): avc: denied { create } for pid=7238 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 159.197958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 159.203049] audit: type=1400 audit(1561127648.348:40): avc: denied { write } for pid=7238 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 159.209844] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 14:34:08 executing program 5: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ptrace$pokeuser(0x6, r1, 0x7, 0x21) [ 159.230099] audit: type=1400 audit(1561127648.358:41): avc: denied { read } for pid=7238 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 159.242126] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 159.278507] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 159.296692] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 159.317803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 159.332648] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 14:34:08 executing program 5: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x80000, 0x0) sendmmsg$alg(r0, &(0x7f0000002a80)=[{0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000002c0)=[@assoc={0x18, 0x117, 0x4, 0x20}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x9}, @assoc={0x18, 0x117, 0x4, 0xfffffffffffffffd}], 0x60}, {0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x20000000}, {0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000003c0)="045b8dc665da5be0206350a57fad03cbd29a978d64378807287171ff01f76dc82c0f3937d6cdcd2e3ad913174a111e79bc54db1724ef39e81e03e7a734e22866a5499a2555bd57d6", 0x48}, {&(0x7f0000000440)="646198ddea2da4be890e628e56acbcc225c7953e37b6201e129c442096a1105946d27ba81123b72693e398dd5e4fb9714f91a5590e9e3db5d671e35b701208c9c400fdf40bcad7cf0ed3c3cd89299769e730d9c94bf00d7abcd66f38d205710f8816dda7cc4c9e8e6d3e1136380f0fc6ef78501947cc82a9c866429340b235d8c8f9d75e8bbcb6c1376debe0d209bf2349bea9db70da92814f", 0x99}, {&(0x7f0000000500)="73c7c1d24385400923fcdd6898e4262a8aa642c6980c917ca9f1789f04b3b405843c948c366316cff1d5d815eba60b8390e9929ce39913cb33437a9f3b37b4fd9c4da10d85c71a73f6a5b85b9cda50f6bb5d2d02662a271105bb680f666311302e69bd05210f42bc27f36f46f35aa40cb63ae35acd9ecee4216a15f440ed22c70d04cdee941b9be750af01fae8b504202df2f742db66", 0x96}, {&(0x7f00000005c0)="811dc2f11b264f109f43cd3f94ae2ae1e5e4ba46411f2adaebe2add7104bea22a69c75c77c29b38ca8801acc4c65949b315ae550440b26a05d35ff27cdd18b58165626090d88ef2fdfe2837313399a5debaa146b2dd63991b247c7dd1ab1b729d54e8a038cd05ec9f5ae1bfa6fcef2ebf2debfc925d72ac9f9b6bb24d0ac", 0x7e}], 0x4, &(0x7f0000002dc0)=ANY=[@ANYBLOB="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"], 0x128, 0x8000}, {0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000940)="a081864e89474c997b0bc8da0ebd8200a45d5dc75a5a88605f964cd3381ae3f96d9b96385eaa303a083ed2027878e95ea8b1df412117bae68c77bfda0dff28371d29ed1f254da631ecd7098a040e0ce6282d92928b4124f6321c80a650f6ff8771b9603b68d6e02e58bef3388def57da7c7bab86402738933d83ae768c69eebd5534386c67e7fed910d3035e8bc15f9a976bdcb751476fbfb76d", 0x9a}], 0x1, &(0x7f0000000700)=[@assoc={0x18, 0x117, 0x4, 0x7}], 0x18, 0x4000000}, {0x0, 0x0, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0x130, 0x11}, {0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000c00)="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", 0x1000}], 0x1, 0x0, 0x0, 0x4000005}, {0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000001c00)="3849089be8ad29a673ad1765a179dc6d9d84fc81910b8697becbf1372c967b00230c3b9452e2e8b5dd67d84ededaee347686cb81a8246bbe0c258fae0303e16e38a8967c9c283bbe747425a9a2b6ee3f23ab426a2dc8c91282fa9c3e647c5733e9e6d7676a4d0c24fb05f35f6fd43e5e53aa64e7fec691d7b9036c5c4415ef8e6a2386f43e81503d281cf3467cf28d1541eb677573628c6a23b1a579677ca365e55f", 0xa2}, {&(0x7f0000001cc0)="a8dca6fef1ffe4eb41081bfe30fcc782460f7c370d5f085c482964149e86401ec451c48917943a6971f810c41e481a7b2360e203716b90e46c280eca2aa5729546820ae1acff7bfda88f7047d742f5dca1d6e4b2778a6e3873cdabd64d099220d2a9b1ae813111c0d39e15576cf0f36a14cebb371ebeebf4d7bfb7e2ec9294ea6678607e8993ea730de78601bc92885f390e843b71", 0x95}, {&(0x7f0000001d80)="aa1e39ba81cd4e87a4f0454d065592c61a6540900ffda1f57a037b69217be0aeeddc0b501182e73fa97dd4f51b815e8d32ab2a2d5ad1313b67fcaf2fd440d08cb59cb0ebf76e7a5b7c7bac28b26c0aace7481d332ddd459542fb4a8492d15b52bea333b2855e9bf9274bf80c0768a3649919c75baee0a254050f6a27daeaafeb88d78c80670ce99c3ae6f080c5c42092fe15ef17ebfccdbd755db544b9398dc97fd3f72a0564da7cd8b2843dfb78c67162ca4297567797fad1b4291e954616245d7829a3e490c71304a46c7b217e319545ab9e6f14e0051007bd35de", 0xdc}, {&(0x7f0000001e80)="d03a6fc5503e9e7f1671b26311dfe4a9ffb48de35aa4833e1565b3035f041a7ae035ff7f23aebd3ea8758d75ff7d64447aea954f88b2ad368c3909ea936e35a6c2d2bd9e8998aae64e1f21772880861d5a8b5b79904c9214f3c5403c9fe753aef50832ce3669ee2414231cd9160823", 0x6f}, {&(0x7f0000001f00)="ea1337b779179ec73a87d1b8606f0e8e5681c5caaa7a6dd00170bfa93b741141fdc6dff4ef8c63c23acdf2a945cc20bccd02ae32154bf0612a0b6f1b39598429e72a37e44f0baf2e129ff3ec220835828c7f139edf3a4e0eb285d238ffb57f579515e3917ad73d0843d635e275df4214c7afa288440c40d678b2", 0x7a}, {&(0x7f0000001f80)="31572c7877599fac130e2381dc7ada2adb79bea9bf3cf554ffc961cc474c72d3c7e0c84b34e4985919a27754b6d47d70c81527c2580eff161885986f94af5e7f18226fa6475665a39ae07e5a40ec8aec9db848966c9c9244ce0835eab86bc480f67a61e8150a7a8c15fb1cda5996e66c7af419423d6622e17d", 0x79}], 0x6, &(0x7f0000002080)=[@assoc={0x18, 0x117, 0x4, 0x5}, @iv={0xa8, 0x117, 0x2, 0x8e, "348bc9f14e5d22a8584b6299ffc8c9b4a594050501bb8f0c888e274a278a74cee690c36ba0f5714b6b913a89e961ed4d4ed862dc2e35e0972fe97408d3ffcbe6fa5d806350b3ec1059e0afecc60e21dad322a65fab872ada3b5260f7cfef7d9fc0adf1e3747d49583617a3935274228b479a412c73ff88014fdd9d86d9795cdc235e822a99125041a08d05ce64ba"}, @iv={0x110, 0x117, 0x2, 0xf9, "df6689484ef41301a13efabcd98eaec1ab38c211742717100086ff9c46b4c075394973d5f255fb92b14d43e22bdf695aae869711ea39c18e29f575a3769b98492ce72cb79e85ead5616bbb81e364e605807d9755d6c56bc851c9345031ea273854a9f9a387ae80ec397b8f6b2e82fd9ce1e961f7e22e6f85c3e0adb2fcbc5cb2e248089ac4eb97a7d6b0a714ea5e183c57423b923ac5799ff7c3ce0dfa4812587e3aa9babf16e974eb1758e375bc67dd9b6a76cff4761d36173c23fddb329a1d634ba47774cfc6276203ce9641f934128a9cbdfe72c2b2acf3b3d0055d45ff648a576b51457eb917e05218a49371e96a3b89cd90363956f4f9"}], 0x1d0, 0x20008000}, {0x0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000002280)="1bfa3c5bb1bbc65e528ea159f0dd2e713977609407edc346303e660dc1608a73102027acea48ff3c7ff3dccaa307b321b0de352b3175262c85f7f38f0be2f392d7e862ecdcaca327ccd0ee13f2e9d8fa3bdb1f6164af8c46353f8d2422fbd57c61b7a20cb83b249015197c1f0cd0adc29c1adb645469a944a592f1db0c9bf802e78f52c21ee443f8d021a203b21786e2e9181e2c8431c24d605c80cab5ce9c1044c8247de56478b9496fe25d1cd20b4fa5d79a6f805a58914cfdb7face007ce7f13c1a35e269e902e0da6a6625e6", 0xce}, {&(0x7f0000002380)="9a", 0x1}], 0x2, &(0x7f0000002cc0)=ANY=[@ANYBLOB="18000000000000001701000002000000030000009760f5001800000000000000170100000300000001000000000000001800000000000000170100000400000000000000000000006cc41fa8fa8e1bf248f37eb8b30f37b2806f9d7e47f68f987d9b8ac7be6b011960d2043699f4071fb5de15de323c5bb383437088d542168d318319df359eb0c835593342562dcba9c822b4a8e083643e33445f1c5b0e849f330813817ebaa1b929426442711604aa01e174869af261660e6a0b2f36d5ad8dc927bbb78a537076f698e58c531f0c8ad19426257132779300172f9647cc0f909106abce1b5dc5f113af52884482ae6a4f368e3381790e90cf"], 0x48, 0x8040}, {0x0, 0x0, &(0x7f0000002740)=[{&(0x7f0000002480)="f5f860c391e94a526a3c7992e0c0c1cd17b80371cd693f6801f669727c40bc0ab9c481080b963b61", 0x28}, {&(0x7f00000024c0)="7469747c973ddaf864519be667e49235aede26bbb344fff05a785ec48edb52b0a27f2364e434272138e08509cffc00a5e2d316ed8e0d8da527290379e27a08e1fb89e8f2587321492fef2102a2a9491fc3ed4ecf5bbde7f188cfb20d3e3bc1d7cad9f258554383b5f1166e15a1", 0x6d}, {&(0x7f0000002540)="85fc4b89923309ec2051e0ec1459e66e6cbaec2f9a443e816e03f38eefed4330c442864b3266f2e60a33edcfae99c8ea33961bb1c6ccaed6545786a9fbeac3c0cffb54dcb86273c91faba0f9c3179bff9c361c496eefef5eed31c3fec2310fedf67931f60b5322d73e071e4204a24b", 0x6f}, {&(0x7f00000025c0)="83aac9d2b0b777ac05d561aa4eb136fabd5b2c44e7ac798e04817b8cffd29b0d9aa408ae313950ce32f83e2f3ece67a87bfe18543b4cba16fe8e9a37eaef7bad43b0131f95456e13903f17a680e5228cea5feeb2c45d5a8fd47f2c3aa396eb415e6c615c2888e282dabe4041cd9682547ac621c9ac98aac3f60ec6e9da8886d1afae59cfce071935b9fb0c7a", 0x8c}, {&(0x7f0000002680)="947cf90b77f462eb1c48e43cce32836314082d7d250af14f0c2d8d8f3b26b75d7fadd508957f19a1cf67a21a352283bee9658120afc8a98917eb29f33eaee26752a2eb5f8968c9b2b8acf0523f9056b1aa07f0d4ba49031be2ca843cbbe7bda19fe934cf51d8087d19b5f5c00f926b6ec02e00931b97eafcbced82babdebbab800a955b519778752e72c602df3f74b6931c8bed8133524c6af716e6a7e6cd93d023380faa2b0cb5578e0bcf341c79ec3057192", 0xb3}], 0x5}, {0x0, 0x0, &(0x7f0000002980)=[{&(0x7f00000027c0)="7592641ba73c6ba60b7f59d6585de2a9542012c6e24db777a6b5352bc4ce3d8023a315122cfd692626de319378bd3c66cdaf4100f6d11103fbc110e945aa5ef3591f8866ac8c62f358bf287f78fa47d75f2a5d34d6f8602d32982c42712518e03c7314577a02963a0aca311b52861007981d21404572054829deae08c2d20a4c6355e6700cb8c13e07a150783c242964b41578bb59abf82fe23e59e020ce4d9cdfaf1553fd349a23dea66954fccedfde232a53788ecf83780ed2460b70a7a5e3044056aef40b61678502a11d", 0xcc}, {&(0x7f00000028c0)="1b83a81f50d4b26f2264efccdfd990284af1b4c747be0d80204cdd55d067a83485067d08105a4ba170ea019efd1977a2ee032fbd18f5fc7ce6b18d0bd1e9475b74184b36f09f52063e57c3f705dc2dbf8cf706570c843e79fb5f522fc4304549c97ff63f23acd10618575f2fffc670fc6ba59b16ea7bf5e9653e487c27e8d44496de499a35aa5d9f81889d2e3c0fb712ee57454ce91e36e713f190f3", 0x9c}], 0x2, &(0x7f00000029c0)=[@iv={0x98, 0x117, 0x2, 0x83, "d25f56b5e663f36392acb3f611c651d52e9f76bb0b94cff5c18871ffd198f326ebdbb71fbb11900d0eba86313731a41f69c90c3753b66f2344297629050a1ccf62122a5b2ab2bf2dd0f57682895e1a04da88d22563d718f72774167313c2da0687fe3f13752c112f2e8bb809137edaca650f72f3bf11f88a2ea2848bc9e367da486671"}], 0x98, 0x40}], 0xa, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/context\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000a80)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000840)='TIPCv2\x00') ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) get_mempolicy(&(0x7f0000000080), &(0x7f00000000c0), 0x8, &(0x7f0000ffc000/0x2000)=nil, 0x2) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8040}, 0x48000) io_setup(0x7, &(0x7f0000000180)=0x0) io_destroy(r3) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) sendfile(r2, r1, 0x0, 0x2000005) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000000)={0x1, 0x2, 0xcbd7, 0x101}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000740)={0x0, @in6={{0xa, 0x4e21, 0x101, @rand_addr="17d642b61dbde2892117b9c0c17ae394"}}, 0xae, 0x0, 0x0, 0x0, 0xd}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') getgid() r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2441, 0x120) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) [ 159.340554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 159.359940] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 159.377851] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 159.386282] audit: type=1400 audit(1561127648.568:42): avc: denied { create } for pid=7247 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 159.393375] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 159.417215] 8021q: adding VLAN 0 to HW filter on device team0 [ 159.426267] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 159.435709] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 159.450855] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 159.456916] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 159.467335] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 159.474375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 159.482244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 159.489143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 159.497893] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 159.508486] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 159.518616] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 159.533305] team0: Port device team_slave_0 added [ 159.539907] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 159.561834] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 159.571728] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.578103] bridge0: port 1(bridge_slave_0) entered forwarding state [ 159.586874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 159.628656] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 159.645611] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 159.654338] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 159.661794] team0: Port device team_slave_1 added [ 159.669704] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 159.677505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 159.685498] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 159.693319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 159.700934] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 159.708540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 159.716669] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 159.724376] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.731076] bridge0: port 2(bridge_slave_1) entered forwarding state [ 159.744567] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 159.752371] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 159.762399] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 159.768468] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 159.790001] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 159.798690] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 159.815794] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 159.823164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 159.846810] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 159.855748] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 159.903798] device hsr_slave_0 entered promiscuous mode [ 159.931380] device hsr_slave_1 entered promiscuous mode [ 159.970905] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 159.978751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 159.988691] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 159.999631] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 160.009408] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 160.021826] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 160.029829] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 160.037952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 160.046076] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 160.056324] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 160.068435] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 160.075730] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 160.083745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 160.094030] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 160.104038] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 160.129962] 8021q: adding VLAN 0 to HW filter on device bond0 [ 160.154084] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 160.164835] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 160.175367] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 160.181871] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 160.189151] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 160.196751] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 160.205778] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 160.225314] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 160.233658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 160.241159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 160.251986] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 160.262184] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 160.268259] 8021q: adding VLAN 0 to HW filter on device team0 [ 160.288047] 8021q: adding VLAN 0 to HW filter on device bond0 [ 160.301432] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 160.309078] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 160.318277] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 160.331528] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 160.339384] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 160.352024] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.358410] bridge0: port 1(bridge_slave_0) entered forwarding state [ 160.371556] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 160.378771] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 160.394105] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 160.413937] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 160.434742] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 160.446678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 160.462219] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 160.471548] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.477928] bridge0: port 2(bridge_slave_1) entered forwarding state [ 160.511512] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 160.530306] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 160.536415] 8021q: adding VLAN 0 to HW filter on device team0 [ 160.548203] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 160.558498] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 160.573320] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 160.584321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 160.592913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 160.601295] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 160.609037] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.615475] bridge0: port 1(bridge_slave_0) entered forwarding state [ 160.624904] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 160.632068] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 160.639342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 160.649936] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 160.659371] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 160.678267] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 160.686934] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 160.698345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 160.699401] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 160.706789] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 160.730724] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.737229] bridge0: port 2(bridge_slave_1) entered forwarding state [ 160.749370] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 160.758536] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 160.776068] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 160.783468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 160.805577] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 160.817548] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 160.835313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 160.856532] kvm: emulating exchange as write 14:34:10 executing program 5: openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x4000, 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000080)) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r1, 0x0) r3 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3a5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0xff, 0x6, 0x3, 0x7ff, 0x0, 0x5, 0x18000, 0x1, 0x3, 0x7fff, 0x3, 0x3, 0x2, 0xed44, 0x3, 0x90cc, 0x0, 0xff, 0xb3, 0x1, 0x2e, 0x80, 0x2, 0x8001, 0x3, 0x100, 0x9, 0x200, 0x9, 0x16, 0x3a0, 0x3, 0x0, 0xfff, 0x6, 0x9, 0x0, 0x5ceec989, 0x6, @perf_config_ext={0x20, 0x4}, 0x8000, 0x9, 0x100000000, 0x4, 0x1, 0x6, 0xffffffffffffff00}, 0xffffffffffffffff, 0x9, r2, 0x8) dup2(r3, r1) 14:34:10 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000080)={0x56a7, 0x1, 0x0, 0xffffffffffffffff}) ppoll(&(0x7f0000000000)=[{r1, 0x1}], 0x1, 0x0, 0x0, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x400, 0x10000) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000100)={'filter\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000180)=0xfffffffffffff001) fanotify_mark(r2, 0x45, 0x11, r0, &(0x7f00000000c0)='./file0\x00') setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x80, 0x0, 0x80000001, 0x2, 0x3}, 0xc) [ 160.856642] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 160.885029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 160.944635] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 160.985433] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 161.016637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 161.029015] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 161.036871] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 161.047216] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 161.055661] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 161.065610] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 161.073338] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 161.096007] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 161.108261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 161.116578] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 161.134304] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 161.142783] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 161.153568] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 161.163768] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 161.173474] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 161.183401] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 161.194300] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 161.201476] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 161.209413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 161.218189] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 161.234565] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 161.249105] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 161.266174] 8021q: adding VLAN 0 to HW filter on device batadv0 14:34:11 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = inotify_init1(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000000100)='/dev/fuse\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f00000001c0)='/dev/fuse\x00'}, 0x30) r2 = syz_open_procfs(r1, &(0x7f0000000280)='netUsnmp\x00') getrusage(0x0, &(0x7f0000000440)) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1089f15d41b90cf892ac00", @ANYRESHEX=r3, @ANYBLOB="2c726f6f746d6f64653d44303030309b1868a9e7523da94de78be99d9830303030303030303030303000", @ANYRESDEC=0x0, @ANYBLOB=',=', @ANYRESDEC=0x0, @ANYBLOB="2c008f5f7de9750818c47490b2cbae0adf70c4338c184c80dba947cfd0b90909ba04d0da01b3281b725fdc2c"]) inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x80000080) readv(r2, &(0x7f0000001a80)=[{&(0x7f0000000600)=""/115, 0x73}], 0x1) 14:34:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000002c0)="c0dca5055e0bcfec7be008000000ab37e5b2ee24da4b91a28739331d7e86077b961d73b0f28a64b2cedb1300742aa63c7496cb0b55656a99a51d1eb849e2da0e831ab71fb1644d8983623fdf8768d3818aba2bd3c43724cb4f64c7768d46f22f280c14fd318f2f2a98402d81adf067bcfcf7211113db8199bc476e7279fd8bfc97cc41d3c73f571df4c4c65aa5469a7693d87de3ea998a0266d517dbb342") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001300)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x403, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x1f, 0x2400) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000380)={{0x0, 0x2, 0x9, 0x3, 0xff}, 0x8, 0x0, 'id0\x00', 'timer0\x00', 0x0, 0x0, 0x5, 0x0, 0x9}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) ioctl$BLKROSET(r2, 0x125d, &(0x7f0000000100)=0xff) fstatfs(r1, &(0x7f0000001340)=""/4096) r3 = fcntl$dupfd(r1, 0x80000406, r1) ioctl$KDGKBTYPE(r3, 0x4b33, &(0x7f0000000000)) 14:34:12 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x420000) ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f0000000080)={0x6, 0xfffffffffffffffb}) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) 14:34:12 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, r1, 0x0, 0x70bd25, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x3, 0x7fff, 0xecc}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) unlink(&(0x7f0000001e00)='./bus\x00') write$nbd(0xffffffffffffffff, &(0x7f0000000080)={0x67446698, 0xd9, 0x1, 0x2, 0x2, "f88637343493ff271f522d218046150f7ef3cd8b262719e4d7621b838dda02407ef44ef199ef48cde78cdcf54b16813dbc7e5174fed3107321bacca326acf27052d238c00531a8e92048d8c622fc7c5beab2a40cb810e04b"}, 0x68) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, 0x0, 0x0) creat(&(0x7f00000003c0)='./file1\x00', 0x0) 14:34:12 executing program 3: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000040)=ANY=[@ANYBLOB="6a6f757277614c696f7072696f3d3078666666666666666666666666666630662c004b17cf4a8bedd2e578e08b80ac5941ea7aac546d1a03bc25"]) 14:34:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/unix\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f00000000c0)={&(0x7f0000ffc000/0x1000)=nil, 0x100000001, 0x2, 0x9, &(0x7f0000ffc000/0x3000)=nil, 0x6}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x100000000, 0x4ac04e11}) syz_genetlink_get_family_id$tipc2(0x0) 14:34:12 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000080)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000000c0)=0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000100)={r1, 0x800000}, 0x8) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f000000d000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x4a, &(0x7f0000000140)=0x3ff, 0x4) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f000000cfe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg(r3, &(0x7f0000000040)={0x0, 0x2be, 0x0}, 0x0) recvmsg(r2, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 14:34:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100100000890e, &(0x7f0000000040)="c1eea5055e0bcfec7bf870") r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCDISCONN(r1, 0x7439) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='mime_type%^selfem0bdevvmnet0\x00', r1}, 0x10) shmget(0x0, 0x2000, 0x1, &(0x7f0000ffc000/0x2000)=nil) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000, 0x0, &(0x7f0000ffa000/0x1000)=nil) 14:34:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$int_in(r0, 0x0, &(0x7f0000000000)=0x5) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = syz_open_dev$dspn(&(0x7f0000000280)='/dev/dsp#\x00', 0x1, 0x2) write$P9_RVERSION(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="15"], 0x1) ioctl$int_in(r1, 0x80000080045017, 0x0) 14:34:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100000000005c, &(0x7f0000000000)="11dca5055e0bcfec7be070") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000029c0)={0x0, 0x0, 0x0}, &(0x7f0000002a00)=0xc) syz_mount_image$jfs(&(0x7f0000000300)='jfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x800, &(0x7f0000002a40)={[{@gid={'gid', 0x3d, r1}}], [{@audit='audit'}]}) 14:34:12 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x6, &(0x7f0000000000)=0x0) io_submit(r0, 0x0, 0x0) [ 163.028414] EXT4-fs (sda1): Unrecognized mount option "jourwaLioprio=0xffffffffffffff0f" or missing value 14:34:12 executing program 5: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000140)={@dev, 0x0}, &(0x7f0000000180)=0x14) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x2000000001, 0xf, 0x6d, 0x2, 0x0, 0x0, 0x8, [], r0, 0xffffffffffffffff, 0xffffffffffffffff}, 0xffffffffffffffe9) r2 = epoll_create1(0x0) r3 = dup2(r1, r2) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r3, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, r4}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r4, 0xc00c642e, &(0x7f0000000040)={r5, 0x80000, r3}) readv(r4, &(0x7f0000f46000)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) 14:34:12 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x4, 0x2) r1 = accept4(r0, &(0x7f0000002000)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000180)=0xffffffffffffffad, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000002200)={&(0x7f00000020c0), 0xc, &(0x7f00000021c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="02c81fe19500cddad7b483514040a51c13ad6167c545c7a855b4e136d8e8a1cb653ada727607f23b6d"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x1) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x100000001) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000340)={'bridge_slave_1\x00', r2}) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000600)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x58, r5, 0x800, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfffffffffffffffb}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x300}, @IPVS_DEST_ATTR_L_THRESH={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x4080}, 0x4000) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000000), 0x4) r6 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f0000000380)={@local}) syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f0000000440), &(0x7f0000000500)=0xc) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000640)={0xffffffffffffffff, 0x2, 0x3, 0x2, 0x1ff}) listen(0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @empty}, 0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r4, 0x8917, &(0x7f0000000300)={'irlan0\x00', {0x2, 0x4e22, @broadcast}}) fdatasync(r3) ioctl$sock_inet6_SIOCADDRT(r6, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) ioctl(0xffffffffffffffff, 0x1000008914, &(0x7f00000003c0)="0adc1f") syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f0000000400)=""/44, &(0x7f0000000100)=0x4) dup2(0xffffffffffffffff, 0xffffffffffffffff) 14:34:12 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x4003) accept$inet(r0, &(0x7f0000000240)={0x2, 0x0, @local}, &(0x7f0000000280)=0x10) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0x8b, 0x1, 0x3, "3b528e3a489ca280ec75a055b9ef195b", "76728d476107c140b78196af272118d0a75b26cab35da4dbf3445db380fc7c00355c679f36a6bc2d77159c574d29e809ebe2055b4be4d164aad4a63aafb2f128f2d4f9f2c1a40b138a7d9ad78b860f7f66dea523c53d501a7901bd31bf119ba8f668ecda27de6adcb52c5e3c8e293c41f4f863f621ae"}, 0x8b, 0x2) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[@ANYRESOCT=0x0], 0x17) close(r0) execve(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f00000003c0)=""/177) linkat(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x400) 14:34:12 executing program 0: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(&(0x7f00000002c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f00000003c0)={0x0, 0x0, 0x69c4}) r2 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000000080)=0x10, 0x800) r3 = dup2(r0, r1) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000000c0)={r2, r3}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl(r4, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") dup2(r1, r0) [ 163.205135] EXT4-fs (sda1): Unrecognized mount option "jourwaLioprio=0xffffffffffffff0f" or missing value 14:34:12 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-serpent-avx2\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) 14:34:12 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r0 = socket$inet(0x2, 0x3, 0x7) getsockopt$inet_mreqsrc(r0, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f0000000040)=0x28) getitimer(0x2, &(0x7f0000000080)) 14:34:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x40, 0x0) ioctl$VIDIOC_DBG_G_CHIP_INFO(r1, 0xc0c85666, &(0x7f0000000600)={{0x4, @name="83bed44923a88da92b0544719c834c0e8c800bfc9b3fd5fa2e590c59a27578b5"}, "7a8f097ea035c302c47b9d2ce612d59a8ae4aec332b648ab2cb89efd9a48c3ce"}) r2 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r0) keyctl$dh_compute(0x17, &(0x7f00000004c0)={r2, r2, r2}, &(0x7f00000009c0)=""/4096, 0x1000, &(0x7f0000000540)={&(0x7f0000000500)={'cryptd(sha3-256-generic)\x00'}, &(0x7f0000000700)="0945f8791d90bc50f3a781ef8cf99b94e19f484b29cb02153f2462c14d51fd33aec1d61c19360b68cb0fcbba8710f6cafe6230e1fd99abc23c34b4416acfe806e66ce0384c4439edd1057ff16f85dbecb2427b7fd1f22bd388e9cd9023ed64da960f24bb0e966faf2b2612d732bb643a49e7d12eca51640ff202317fd08e0744c8b6824811b152453235afc5507014aec0e70dd194d328980131c5e20a2231cf36aca51fbc67da5007ea1160cf90882e87fde2e0747651cb4576ebac479ecd40f2dbbcdf9a7cd0b2997adea18e642a04af2da044", 0xd4}) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x40, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x14, r4, 0x100, 0x70bd28, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x40010}, 0x80) keyctl$dh_compute(0x17, &(0x7f0000000140)={r3, r2, r3}, &(0x7f0000000240)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000580)={'wp256\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}) 14:34:12 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000440)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-avx\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX, @ANYRESOCT=r1], 0xfffffef5) splice(r0, 0x0, r2, 0x0, 0x20000000003, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000040)={0x3, 0x3, 0x3000, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) 14:34:12 executing program 5: r0 = socket(0x11, 0x803, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000005080)={@ipv4={[], [], @local}, @loopback, @loopback}) accept$inet6(r0, 0x0, &(0x7f0000000000)) 14:34:13 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000340)={0x800, 0x4d1e, 0x3, 0x7fff, 0x6, [{0x4, 0x0, 0x3, 0x0, 0x0, 0x4}, {0x100000000, 0x1000, 0x0, 0x0, 0x0, 0x100}, {0x2, 0xda4, 0x7ff, 0x0, 0x0, 0x1}, {0x240, 0x13, 0x6, 0x0, 0x0, 0x400}, {0x200, 0x9, 0x400, 0x0, 0x0, 0x80}, {0x3e, 0x2, 0x0, 0x0, 0x0, 0x280}]}) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, 0x0, r1) chroot(&(0x7f00000002c0)='./file0\x00') 14:34:13 executing program 2: clone(0x21000fdf, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000140), &(0x7f0000000180)=0x4) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20\x00', 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x2000, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000300)=0x4) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f00000001c0)={0x2c8, 0x400, 0x6e}) mount$9p_tcp(&(0x7f0000000040)='\n27.0.0.1\x00', &(0x7f0000000080)='.\x00', &(0x7f00000002c0)='9p\x00', 0x0, 0x0) 14:34:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100001890e, &(0x7f0000000040)="c0dca5055e0bcfec7be0700f6b35b6155feedfe3ca977800d64ee005101e349140ee8fb4973726138b952ac1ac3da8688536e005dd11bfab") unshare(0x8000000) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x1, 0x0) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f00000000c0)=""/253) r2 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x5}) mq_timedreceive(r2, &(0x7f0000000000)=""/24, 0x282, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x1, 0x0) 14:34:13 executing program 1: socket(0x10, 0x80002, 0x0) r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000004c0)) openat$null(0xffffffffffffff9c, 0x0, 0x300, 0x0) unshare(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) r2 = semget$private(0x0, 0x0, 0x0) semtimedop(r2, &(0x7f0000000400)=[{0x3, 0x6, 0x800}, {0x4, 0x80000001, 0x1000}, {0x0, 0x5, 0x800}], 0x3, &(0x7f0000000900)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = shmget(0x2, 0x8000, 0x2, &(0x7f0000ff8000/0x8000)=nil) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000c80)=""/4096) shmget$private(0x0, 0x1000, 0x78000000, &(0x7f0000ffc000/0x1000)=nil) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f00000002c0)={{0x2, 0x4e22, @remote}, {0x6, @dev={[], 0x28}}, 0x0, {0x2, 0xffff, @remote}, 'bon\x00'}) 14:34:13 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) close(r0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7, 0x200000) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000040)={0xe, 0x3, 0xffffffffffff6e35, 0x9, 0x2f, "050b5edfae67a76dc7f7e1631bc2bde44b34ae45fea530e857867cff1f7c19a384ce6646fcfe00ceb9660fa567dc46"}, 0x3b) [ 164.282819] INFO: trying to register non-static key. [ 164.288079] the code is fine but needs lockdep annotation. [ 164.293606] kobject: '0:45' (ffff888092b10010): kobject_add_internal: parent: 'bdi', set: 'devices' [ 164.293732] turning off the locking correctness validator. [ 164.303554] kobject: '0:45' (ffff888092b10010): kobject_uevent_env [ 164.308671] CPU: 1 PID: 7424 Comm: syz-executor.5 Not tainted 4.14.128 #22 [ 164.308676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 164.308694] Call Trace: [ 164.308783] dump_stack+0x138/0x19c [ 164.308842] ? vprintk_func+0x65/0x159 [ 164.315366] kobject: '0:45' (ffff888092b10010): fill_kobj_path: path = '/devices/virtual/bdi/0:45' [ 164.322153] register_lock_class+0x2fd/0x1730 [ 164.322163] ? cpuacct_charge+0x1db/0x360 [ 164.322171] ? find_held_lock+0x35/0x130 [ 164.322179] ? check_noncircular+0x20/0x20 [ 164.322195] __lock_acquire+0x147/0x45e0 [ 164.322204] ? save_trace+0x290/0x290 [ 164.322216] ? __lock_acquire+0x5f9/0x45e0 [ 164.333219] 9pnet_virtio: no channels available for device [ 164.333219] 27.0.0.1 [ 164.334198] ? __lock_is_held+0xb6/0x140 [ 164.334214] ? trace_hardirqs_on+0x10/0x10 [ 164.334234] ? trace_hardirqs_on+0x10/0x10 [ 164.343923] kobject: '0:46' (ffff8880a83188d0): kobject_add_internal: parent: 'bdi', set: 'devices' [ 164.350856] ? save_trace+0x290/0x290 [ 164.350915] ? check_preemption_disabled+0x3c/0x250 [ 164.350926] ? finish_task_switch+0x178/0x650 [ 164.350939] ? find_held_lock+0x35/0x130 14:34:13 executing program 3: r0 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x0, 0x80000) getsockname$packet(r0, 0x0, &(0x7f00000004c0)) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, 0x0, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) bind$x25(r2, &(0x7f0000000100)={0x9, @remote={[], 0x1}}, 0x12) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x4e21, 0x6, @rand_addr="e3c5916c997aa7931a849abf3759b715", 0x88a}}, 0x7}, &(0x7f0000000180)=0x90) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000500)={r3, @in={{0x2, 0x4e22, @local}}}, 0x84) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000240)={{{@in6, @in=@initdev}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0xe8) fstat(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000200)='./file0\x00', r4, 0x0) clone(0x900, 0x0, 0xfffffffffffffffe, &(0x7f0000000c40), 0xffffffffffffffff) execve(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) [ 164.355888] kobject: '0:46' (ffff8880a83188d0): kobject_uevent_env [ 164.359674] lock_acquire+0x16f/0x430 [ 164.359684] ? flush_work+0x84/0x730 [ 164.359694] flush_work+0xae/0x730 [ 164.359701] ? flush_work+0x84/0x730 [ 164.359710] ? insert_work+0x320/0x320 [ 164.359723] ? finish_task_switch+0x178/0x650 [ 164.364032] kobject: '0:46' (ffff8880a83188d0): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 164.368011] ? finish_task_switch+0x14d/0x650 [ 164.368031] ? __schedule+0x7c0/0x1cd0 [ 164.368044] ? mark_held_locks+0xb1/0x100 [ 164.368056] ? __cancel_work_timer+0x166/0x480 [ 164.392228] kobject: 'loop3' (ffff8880a4a7f260): kobject_uevent_env [ 164.397042] __cancel_work_timer+0x2f0/0x480 [ 164.397054] ? cancel_delayed_work+0x20/0x20 [ 164.397065] ? preempt_schedule+0x4b/0x60 [ 164.397092] ? smc_accept_dequeue+0x3b6/0x5e0 [ 164.408124] kobject: 'loop3' (ffff8880a4a7f260): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 164.414874] ? __local_bh_enable_ip+0x15e/0x1a0 [ 164.414888] cancel_work_sync+0x18/0x20 [ 164.414899] smc_close_active+0x68e/0xba0 [ 164.414907] smc_release+0x45a/0x630 [ 164.414937] __sock_release+0xce/0x2b0 [ 164.414949] ? __sock_release+0x2b0/0x2b0 [ 164.548749] sock_close+0x1b/0x30 [ 164.548786] __fput+0x275/0x7a0 [ 164.555232] 9pnet_virtio: no channels available for device [ 164.555232] 27.0.0.1 [ 164.555507] ____fput+0x16/0x20 [ 164.566659] task_work_run+0x114/0x190 [ 164.566695] exit_to_usermode_loop+0x1da/0x220 [ 164.575217] do_syscall_64+0x4bc/0x640 [ 164.579089] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 164.583940] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 164.589128] RIP: 0033:0x4592c9 [ 164.592318] RSP: 002b:00007f4cbca6fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 164.600013] RAX: 0000000000000000 RBX: 0000000000000001 RCX: 00000000004592c9 [ 164.607294] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 164.614551] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 164.621810] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4cbca706d4 14:34:13 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='rdma.current\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000240)={0x20}) write$cgroup_int(r0, &(0x7f0000000040)=0x1, 0xfef7) pwrite64(r0, &(0x7f00000003c0)=' ', 0x1, 0x0) 14:34:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x64e2, &(0x7f00000000c0)="1170000000000000000000dbc998290df1a41f38eea4fbc2e3a4be716e5a3993ceb3dd3e0050aee5fcf02acbe989f653a0f3d212717193ceeee19c3d541b925890fceb4890b63754c31531afaad9c62f7357713308d55cdecc1234e4b68e939de24e1d744998435ff4771f693bf2178f9072ab7f05c6b882f841a825ec6266b0afb2e8ad68af796d08bdf90cfef28a13b4db077a8603647f185b4bcbf117259b59f4f3c8c196945d8007065bc23397b838bdbf4c3f7656b717ca") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000040)=@ipx, 0xfffffffffffffce7, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='personality\x00') preadv(r1, &(0x7f00000017c0), 0x1a4, 0x0) 14:34:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100001890e, &(0x7f0000000040)="c0dca5055e0bcfec7be0700f6b35b6155feedfe3ca977800d64ee005101e349140ee8fb4973726138b952ac1ac3da8688536e005dd11bfab") unshare(0x8000000) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x1, 0x0) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f00000000c0)=""/253) r2 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x5}) mq_timedreceive(r2, &(0x7f0000000000)=""/24, 0x282, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x1, 0x0) 14:34:13 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x100, 0x200) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000040)={0x0, @local, 0x4e24, 0x0, 'wrr\x00', 0x2, 0xd0, 0x2}, 0x2c) clock_settime(0x0, &(0x7f00000001c0)={0x77359400}) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000080)=0x401, 0x4) 14:34:13 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000380)=0x70, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0xa, &(0x7f0000000000)=[{0x4, 0x3ff, 0x100, 0x800000000000000}, {0x2, 0xfffffffffffffff7, 0x0, 0x8000}, {0x80, 0xfff, 0x6d9, 0x6}, {0x20f6, 0x571, 0xfffffffffffffff7, 0x7}, {0x800, 0x7ff, 0x20}, {0x5, 0xfff, 0x20, 0x6}, {0x9, 0x321f40000000000, 0x5b, 0x7}, {0x6, 0x6, 0xfff, 0x1b}, {0x8, 0x5, 0xff, 0xfffffffffffeffff}, {0xe000000000000, 0x400, 0x9, 0x5242}]}, 0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0xffffffff}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000140)={r1, 0xca60, 0x7, [0xda, 0xfffffffffffffffb, 0x100, 0x6, 0x9, 0x80000001, 0x4]}, 0x16) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='nv\x00', 0x3) write$binfmt_elf64(r0, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[]]}, 0x178) [ 164.629069] R13: 00000000004f8052 R14: 00000000004d0e30 R15: 00000000ffffffff [ 164.642090] kobject: 'loop2' (ffff8880a4a391e0): kobject_uevent_env [ 164.648537] kobject: 'loop2' (ffff8880a4a391e0): fill_kobj_path: path = '/devices/virtual/block/loop2' 14:34:13 executing program 1: r0 = socket(0xa, 0x1, 0x0) r1 = request_key(&(0x7f00000001c0)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000340)='(wlan1\'#keyring:\x00', 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000380)={r1, 0x1}, 0x0, &(0x7f00000004c0)='x', 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x1ffa, 0x0) ioctl$BLKRRPART(r2, 0x125f, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chmod(&(0x7f0000000140)='./file0\x00', 0x4) r4 = fcntl$dupfd(r3, 0x406, r0) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000200)=0x1) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x1) io_setup(0xe7e, &(0x7f0000000100)=0x0) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) io_submit(r6, 0x200001d2, &(0x7f0000000880)=[&(0x7f0000000500)={0x0, 0x0, 0x0, 0x5, 0x100000000, r7, &(0x7f00000003c0)="8f64a070ec7e9aa8e9fb1d7b1878c1d325eeea28123b29fbb0d027a650c6dc7f0a9cbbf6f8f5b6b277ab1f859c12560c3746f9c76206c73f016e791aa311de47ed759ad8cc93c0c59d3e7bd08129fbe7a13f7dd1a1b06470c2aa9cc8b730362cbe3ceca71bda871dd0de9917eacc041a0ac32bde1b1a78c5fa51e8af86c5a5b47ea672e3d37fc748d30c0b36bd4a684138c7dcda42055c7cd229b9e684e2e3b1eb9d94058c64549484efd96d05052a4fd9cdc1602460d6ba303fcf0a2b38b984002b1b5eae", 0x0, 0x9, 0x0, 0x1, r0}, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x800000000, r0, &(0x7f0000000540)="e50f0293dd82ac6bf5253549ea4fa6986370bdfd158b12b29cdfb1ae495a4d23ffc1d820535e13ee0d15668679695c55b1c3348d018f8f0bbb0813ff520a1c082d9a22b48ddb9dcd437bb1fbde85b36b11e32b7b9b05ad3f6187ace65d487a3411a41df93ee652c0e84f4336fd03a7ff573de095a029879e0d6b975da3eeb60c5abcb6a1bb5009d25f7fbce8650061126eed269dfef9962621b0e9e0336c3eee8533a63e998c1bbe8d6b3cabedcf5da2b4f49ab7e6034fb704880dec1b6598313d85390d0ad1e86bf2a05a778826b66d3cd8eaa83f4c71bd5665e4", 0x0, 0x9, 0x0, 0x1, r3}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x8, 0x5, r0, &(0x7f0000000680)="b4b7eb612fe862da2aaefc68cef8c4cabe64af787d3c627cf52524d1f04091026b6bd225d3a5484c111252e6c88b34e3fb99cf6a5bd11a5e7dc9be56a80227012f2df38f9501032161efdcce5c81c1c554cb905da30f0dc90499db33ed31655194c1be6f7a0638091c47bc6f8e48e42498c7596050f6d8d94a30174f4cf0b3237c9d4fe8535a5cae19ea5bc4fb55bf6fdf18b2bd2be35cf2822c89dcfc3bb3e05bb7138a1a0cac391050a25d67a9b04239337deff3adc0e2aa6b62ac030615778190223ff26f6a390fff37594406df8dcbca08f4e72201c43b0715292e8c019263add33d1b7101920c508cc71a91c238f45b5b5164ccce158d2f64", 0x0, 0x1, 0x0, 0x0, r5}, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x2, 0xda, r4, &(0x7f0000000800)="13f8336756a968821f75fe9eb2a0b66341260264a3b07485cb975212e3e9e32335b68c8b2a57638fe2a244501eb3", 0x0, 0x100000001, 0x0, 0x1}]) [ 164.698579] kobject: 'loop0' (ffff8880a498cee0): kobject_uevent_env [ 164.705325] kobject: '0:46' (ffff8880a83188d0): kobject_uevent_env [ 164.725379] kobject: '0:46' (ffff8880a83188d0): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 164.727812] kobject: 'loop0' (ffff8880a498cee0): fill_kobj_path: path = '/devices/virtual/block/loop0' 14:34:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003a0081aee4050cecdb4cb9040a485e510befccdf7f3e9cf0758ef900e1cf3aebb1cb4c100c0003720000", 0x2e}], 0x1}, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) uselib(&(0x7f0000000140)='./file0\x00') openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cachefiles\x00', 0x490602, 0x0) openat$cgroup_procs(r1, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) 14:34:13 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000000)=0x8, 0x4) setreuid(0x0, 0xee00) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{}]}) 14:34:13 executing program 3: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x100000, &(0x7f0000000080)={[{@mode={'mode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x9c}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode'}}], [{@audit='audit'}, {@permit_directio='permit_directio'}, {@obj_role={'obj_role', 0x3d, '+nodevvboxnet0'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@audit='audit'}]}) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) shmctl$SHM_LOCK(r0, 0xb) shmctl$SHM_UNLOCK(r0, 0xc) [ 164.739279] kobject: '0:46' (ffff8880a83188d0): kobject_cleanup, parent (null) [ 164.751136] kobject: 'loop3' (ffff8880a4a7f260): kobject_uevent_env [ 164.759008] kobject: 'loop3' (ffff8880a4a7f260): fill_kobj_path: path = '/devices/virtual/block/loop3' 14:34:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 14:34:14 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r1) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000140)) 14:34:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100001890e, &(0x7f0000000040)="c0dca5055e0bcfec7be0700f6b35b6155feedfe3ca977800d64ee005101e349140ee8fb4973726138b952ac1ac3da8688536e005dd11bfab") unshare(0x8000000) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x1, 0x0) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f00000000c0)=""/253) r2 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x5}) mq_timedreceive(r2, &(0x7f0000000000)=""/24, 0x282, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x1, 0x0) [ 164.796707] kobject: 'loop5' (ffff8880a4b2e220): kobject_uevent_env [ 164.817739] kobject: 'loop5' (ffff8880a4b2e220): fill_kobj_path: path = '/devices/virtual/block/loop5' 14:34:14 executing program 3: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x100000, &(0x7f0000000080)={[{@mode={'mode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x9c}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode'}}], [{@audit='audit'}, {@permit_directio='permit_directio'}, {@obj_role={'obj_role', 0x3d, '+nodevvboxnet0'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@audit='audit'}]}) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) shmctl$SHM_LOCK(r0, 0xb) shmctl$SHM_UNLOCK(r0, 0xc) [ 164.846139] kobject: '0:46' (ffff8880a83188d0): calling ktype release [ 164.849626] kobject: 'loop1' (ffff8880a49c4f60): kobject_uevent_env [ 164.864062] kobject: 'loop1' (ffff8880a49c4f60): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 164.883032] kobject: '0:46': free name [ 164.910757] kobject: 'loop5' (ffff8880a4b2e220): kobject_uevent_env [ 164.917228] kobject: 'loop5' (ffff8880a4b2e220): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 164.929421] kobject: 'loop2' (ffff8880a4a391e0): kobject_uevent_env [ 164.940976] kobject: '0:45' (ffff888092b10010): kobject_uevent_env [ 164.944242] kobject: 'loop2' (ffff8880a4a391e0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 164.947335] kobject: '0:45' (ffff888092b10010): fill_kobj_path: path = '/devices/virtual/bdi/0:45' [ 164.959487] kobject: 'loop3' (ffff8880a4a7f260): kobject_uevent_env [ 164.975244] kobject: '0:45' (ffff888092b10010): kobject_cleanup, parent (null) [ 164.978125] kobject: 'loop3' (ffff8880a4a7f260): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 164.983879] kobject: '0:45' (ffff888092b10010): calling ktype release [ 164.993817] kobject: 'loop2' (ffff8880a4a391e0): kobject_uevent_env [ 165.000810] kobject: '0:45': free name [ 165.011613] kobject: 'loop2' (ffff8880a4a391e0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 165.023950] kobject: 'loop5' (ffff8880a4b2e220): kobject_uevent_env [ 165.031924] kobject: 'loop5' (ffff8880a4b2e220): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 165.043044] kobject: 'loop0' (ffff8880a498cee0): kobject_uevent_env [ 165.049483] kobject: 'loop0' (ffff8880a498cee0): fill_kobj_path: path = '/devices/virtual/block/loop0' 14:34:14 executing program 4: r0 = add_key(&(0x7f0000000480)='rxrpc\x00', &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key(0x0, 0x0, 0x0, 0xffffffffffffff9d, r0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000002c0)=""/246) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000021c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) bind$unix(r2, &(0x7f0000002200)=@abs={0x1}, 0x6e) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000080)={0x0, 0x0, 0x3}) socketpair$unix(0x1, 0x0, 0x0, 0x0) r3 = socket$unix(0x1, 0x800000001, 0x0) ioctl$TIOCNXCL(r2, 0x540d) ioctl$FICLONERANGE(r3, 0x4020940d, &(0x7f0000000040)={r3, 0x0, 0x100}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000000)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000014fc8)={&(0x7f0000006ff0)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffff01000000}}, 0x80, 0x0}, 0x0) write$9p(r4, &(0x7f0000000800)="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", 0x400) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0)=0x8, 0x4) sendfile(r4, r5, 0x0, 0x10000) keyctl$unlink(0x9, r1, r1) lsetxattr(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)=@known='trusted.overlay.nlink\x00', &(0x7f00000003c0)=']trusted/mime_type\xac\x00', 0x14, 0x2) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000200)=""/169, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) ioctl$TIOCGPGRP(r4, 0x540f, 0x0) accept$unix(r6, &(0x7f0000000500)=@abs, &(0x7f0000000440)=0x6e) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000000)) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000002c0)=@v3={0x3000000, [{0x8000}, {0x0, 0x2}]}, 0x18, 0x1) ioctl$TIOCSIG(r4, 0x40045436, 0x0) 14:34:14 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r1) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000140)) 14:34:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x101000, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000340)='/dev/audio#\x00', 0x0, 0x4200) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000000)={0x0, 0xe, 0x0, 0x1f, 0x0, 0x3}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000040)="670f08f2a7b9800000c00f3235001000000f30b93c0800000f326564420f212266bad004ec2640f40fc75c0700c46249059b08000000470f2201", 0x3a}], 0x1, 0x4, &(0x7f0000000100), 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000200)="f30f2b0066b91f02000066b86917000066ba000000000f30baf80c66b8fc71ed8766efbafc0cb006ee2e2e2e66f3f2d8c266b99509000066b81600000066ba000000000f3039aa0080440f20c0663504000000440f22c00f3066b94a06000066b808b4f1f366ba0a02ad7b0f300f30", 0x6f}], 0x1, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x40, 0x1) r5 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f00000002c0)={'veth1_to_bridge\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vcan0\x00', 0x0}) sendmsg$FOU_CMD_ADD(r4, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10004200}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="000228bd7000fddbdf250100000008001cb389e1e4aa28365814682492dfead70a004e24000008000208000b000000000000c61d32c895fc227d94c417291d64d943f97097feffffff7b084e61bb84a0c14ffe3fedacd89b7416434206bb8e4e0bad25c4d2f0ca533c409c5099f1920e06b59e7fc62c0b3b40fcd2", @ANYRES32=r6, @ANYBLOB="080004000000000008000b00", @ANYRES32=r7], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20004001) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000002000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 14:34:14 executing program 3: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x100000, &(0x7f0000000080)={[{@mode={'mode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x9c}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode'}}], [{@audit='audit'}, {@permit_directio='permit_directio'}, {@obj_role={'obj_role', 0x3d, '+nodevvboxnet0'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@audit='audit'}]}) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) shmctl$SHM_LOCK(r0, 0xb) shmctl$SHM_UNLOCK(r0, 0xc) [ 165.059566] kobject: 'loop3' (ffff8880a4a7f260): kobject_uevent_env [ 165.066792] kobject: 'loop3' (ffff8880a4a7f260): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 165.079802] kobject: 'loop5' (ffff8880a4b2e220): kobject_uevent_env [ 165.088791] kobject: 'loop5' (ffff8880a4b2e220): fill_kobj_path: path = '/devices/virtual/block/loop5' 14:34:14 executing program 1: r0 = socket(0xa, 0x1, 0x0) r1 = request_key(&(0x7f00000001c0)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000340)='(wlan1\'#keyring:\x00', 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000380)={r1, 0x1}, 0x0, &(0x7f00000004c0)='x', 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x1ffa, 0x0) ioctl$BLKRRPART(r2, 0x125f, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chmod(&(0x7f0000000140)='./file0\x00', 0x4) r4 = fcntl$dupfd(r3, 0x406, r0) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000200)=0x1) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x1) io_setup(0xe7e, &(0x7f0000000100)=0x0) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) io_submit(r6, 0x200001d2, &(0x7f0000000880)=[&(0x7f0000000500)={0x0, 0x0, 0x0, 0x5, 0x100000000, r7, &(0x7f00000003c0)="8f64a070ec7e9aa8e9fb1d7b1878c1d325eeea28123b29fbb0d027a650c6dc7f0a9cbbf6f8f5b6b277ab1f859c12560c3746f9c76206c73f016e791aa311de47ed759ad8cc93c0c59d3e7bd08129fbe7a13f7dd1a1b06470c2aa9cc8b730362cbe3ceca71bda871dd0de9917eacc041a0ac32bde1b1a78c5fa51e8af86c5a5b47ea672e3d37fc748d30c0b36bd4a684138c7dcda42055c7cd229b9e684e2e3b1eb9d94058c64549484efd96d05052a4fd9cdc1602460d6ba303fcf0a2b38b984002b1b5eae", 0x0, 0x9, 0x0, 0x1, r0}, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x800000000, r0, &(0x7f0000000540)="e50f0293dd82ac6bf5253549ea4fa6986370bdfd158b12b29cdfb1ae495a4d23ffc1d820535e13ee0d15668679695c55b1c3348d018f8f0bbb0813ff520a1c082d9a22b48ddb9dcd437bb1fbde85b36b11e32b7b9b05ad3f6187ace65d487a3411a41df93ee652c0e84f4336fd03a7ff573de095a029879e0d6b975da3eeb60c5abcb6a1bb5009d25f7fbce8650061126eed269dfef9962621b0e9e0336c3eee8533a63e998c1bbe8d6b3cabedcf5da2b4f49ab7e6034fb704880dec1b6598313d85390d0ad1e86bf2a05a778826b66d3cd8eaa83f4c71bd5665e4", 0x0, 0x9, 0x0, 0x1, r3}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x8, 0x5, r0, &(0x7f0000000680)="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", 0x0, 0x1, 0x0, 0x0, r5}, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x2, 0xda, r4, &(0x7f0000000800)="13f8336756a968821f75fe9eb2a0b66341260264a3b07485cb975212e3e9e32335b68c8b2a57638fe2a244501eb3", 0x0, 0x100000001, 0x0, 0x1}]) 14:34:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100001890e, &(0x7f0000000040)="c0dca5055e0bcfec7be0700f6b35b6155feedfe3ca977800d64ee005101e349140ee8fb4973726138b952ac1ac3da8688536e005dd11bfab") unshare(0x8000000) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x1, 0x0) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f00000000c0)=""/253) r2 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x5}) mq_timedreceive(r2, &(0x7f0000000000)=""/24, 0x282, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x1, 0x0) 14:34:14 executing program 3: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x100000, &(0x7f0000000080)={[{@mode={'mode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x9c}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode'}}], [{@audit='audit'}, {@permit_directio='permit_directio'}, {@obj_role={'obj_role', 0x3d, '+nodevvboxnet0'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@audit='audit'}]}) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) shmctl$SHM_LOCK(r0, 0xb) shmctl$SHM_UNLOCK(r0, 0xc) 14:34:14 executing program 5: r0 = socket(0xa, 0x1, 0x0) r1 = request_key(&(0x7f00000001c0)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000340)='(wlan1\'#keyring:\x00', 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000380)={r1, 0x1}, 0x0, &(0x7f00000004c0)='x', 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x1ffa, 0x0) ioctl$BLKRRPART(r2, 0x125f, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chmod(&(0x7f0000000140)='./file0\x00', 0x4) r4 = fcntl$dupfd(r3, 0x406, r0) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000200)=0x1) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x1) io_setup(0xe7e, &(0x7f0000000100)=0x0) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) io_submit(r6, 0x200001d2, &(0x7f0000000880)=[&(0x7f0000000500)={0x0, 0x0, 0x0, 0x5, 0x100000000, r7, &(0x7f00000003c0)="8f64a070ec7e9aa8e9fb1d7b1878c1d325eeea28123b29fbb0d027a650c6dc7f0a9cbbf6f8f5b6b277ab1f859c12560c3746f9c76206c73f016e791aa311de47ed759ad8cc93c0c59d3e7bd08129fbe7a13f7dd1a1b06470c2aa9cc8b730362cbe3ceca71bda871dd0de9917eacc041a0ac32bde1b1a78c5fa51e8af86c5a5b47ea672e3d37fc748d30c0b36bd4a684138c7dcda42055c7cd229b9e684e2e3b1eb9d94058c64549484efd96d05052a4fd9cdc1602460d6ba303fcf0a2b38b984002b1b5eae", 0x0, 0x9, 0x0, 0x1, r0}, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x800000000, r0, &(0x7f0000000540)="e50f0293dd82ac6bf5253549ea4fa6986370bdfd158b12b29cdfb1ae495a4d23ffc1d820535e13ee0d15668679695c55b1c3348d018f8f0bbb0813ff520a1c082d9a22b48ddb9dcd437bb1fbde85b36b11e32b7b9b05ad3f6187ace65d487a3411a41df93ee652c0e84f4336fd03a7ff573de095a029879e0d6b975da3eeb60c5abcb6a1bb5009d25f7fbce8650061126eed269dfef9962621b0e9e0336c3eee8533a63e998c1bbe8d6b3cabedcf5da2b4f49ab7e6034fb704880dec1b6598313d85390d0ad1e86bf2a05a778826b66d3cd8eaa83f4c71bd5665e4", 0x0, 0x9, 0x0, 0x1, r3}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x8, 0x5, r0, &(0x7f0000000680)="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", 0x0, 0x1, 0x0, 0x0, r5}, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x2, 0xda, r4, &(0x7f0000000800)="13f8336756a968821f75fe9eb2a0b66341260264a3b07485cb975212e3e9e32335b68c8b2a57638fe2a244501eb3", 0x0, 0x100000001, 0x0, 0x1}]) [ 165.115220] kobject: 'loop2' (ffff8880a4a391e0): kobject_uevent_env [ 165.132249] kobject: 'loop2' (ffff8880a4a391e0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 165.155140] audit: type=1800 audit(1561127654.328:43): pid=7491 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=16576 res=0 [ 165.228452] kobject: 'kvm' (ffff888219f935d0): kobject_uevent_env [ 165.249715] kobject: 'kvm' (ffff888219f935d0): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 165.277016] kobject: 'loop3' (ffff8880a4a7f260): kobject_uevent_env [ 165.283698] kobject: 'kvm' (ffff888219f935d0): kobject_uevent_env [ 165.283723] kobject: 'kvm' (ffff888219f935d0): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 165.313631] kobject: 'kvm' (ffff888219f935d0): kobject_uevent_env 14:34:14 executing program 3: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x100000, &(0x7f0000000080)={[{@mode={'mode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x9c}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode'}}], [{@audit='audit'}, {@permit_directio='permit_directio'}, {@obj_role={'obj_role', 0x3d, '+nodevvboxnet0'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@audit='audit'}]}) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) shmctl$SHM_UNLOCK(r0, 0xc) 14:34:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100001890e, &(0x7f0000000040)="c0dca5055e0bcfec7be0700f6b35b6155feedfe3ca977800d64ee005101e349140ee8fb4973726138b952ac1ac3da8688536e005dd11bfab") unshare(0x8000000) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x1, 0x0) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f00000000c0)=""/253) r2 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x5}) mq_timedsend(r2, 0x0, 0x0, 0x1, 0x0) [ 165.316522] audit: type=1804 audit(1561127654.358:44): pid=7495 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir226234889/syzkaller.OUCTtk/5/file0" dev="sda1" ino=16576 res=1 [ 165.337013] kobject: 'kvm' (ffff888219f935d0): fill_kobj_path: path = '/devices/virtual/misc/kvm' 14:34:14 executing program 3: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x100000, &(0x7f0000000080)={[{@mode={'mode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x9c}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode'}}], [{@audit='audit'}, {@permit_directio='permit_directio'}, {@obj_role={'obj_role', 0x3d, '+nodevvboxnet0'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@audit='audit'}]}) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) shmctl$SHM_UNLOCK(r0, 0xc) [ 165.463699] kobject: 'kvm' (ffff888219f935d0): kobject_uevent_env [ 165.464630] kobject: 'loop3' (ffff8880a4a7f260): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 165.491829] kobject: 'loop4' (ffff8880a4ad92e0): kobject_uevent_env [ 165.498415] kobject: 'loop4' (ffff8880a4ad92e0): fill_kobj_path: path = '/devices/virtual/block/loop4' 14:34:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100001890e, &(0x7f0000000040)="c0dca5055e0bcfec7be0700f6b35b6155feedfe3ca977800d64ee005101e349140ee8fb4973726138b952ac1ac3da8688536e005dd11bfab") unshare(0x8000000) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x1, 0x0) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f00000000c0)=""/253) r2 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x5}) mq_timedsend(r2, 0x0, 0x0, 0x1, 0x0) [ 165.502188] kobject: 'kvm' (ffff888219f935d0): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 165.562089] kobject: 'loop1' (ffff8880a49c4f60): kobject_uevent_env [ 165.582099] kobject: 'loop1' (ffff8880a49c4f60): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 165.601314] kobject: 'loop5' (ffff8880a4b2e220): kobject_uevent_env [ 165.608286] kobject: 'loop5' (ffff8880a4b2e220): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 165.620543] kobject: 'loop0' (ffff8880a498cee0): kobject_uevent_env [ 165.627108] kobject: 'loop0' (ffff8880a498cee0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 165.639313] kobject: 'loop0' (ffff8880a498cee0): kobject_uevent_env [ 165.645848] kobject: 'loop0' (ffff8880a498cee0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 165.658558] kobject: 'loop2' (ffff8880a4a391e0): kobject_uevent_env [ 165.665123] kobject: 'loop2' (ffff8880a4a391e0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 165.679106] kobject: 'loop1' (ffff8880a49c4f60): kobject_uevent_env [ 165.691628] kobject: 'loop1' (ffff8880a49c4f60): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 165.701728] kobject: 'loop0' (ffff8880a498cee0): kobject_uevent_env [ 165.708206] kobject: 'loop0' (ffff8880a498cee0): fill_kobj_path: path = '/devices/virtual/block/loop0' 14:34:15 executing program 4: r0 = add_key(&(0x7f0000000480)='rxrpc\x00', &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key(0x0, 0x0, 0x0, 0xffffffffffffff9d, r0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000002c0)=""/246) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000021c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) bind$unix(r2, &(0x7f0000002200)=@abs={0x1}, 0x6e) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000080)={0x0, 0x0, 0x3}) socketpair$unix(0x1, 0x0, 0x0, 0x0) r3 = socket$unix(0x1, 0x800000001, 0x0) ioctl$TIOCNXCL(r2, 0x540d) ioctl$FICLONERANGE(r3, 0x4020940d, &(0x7f0000000040)={r3, 0x0, 0x100}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000000)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000014fc8)={&(0x7f0000006ff0)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffff01000000}}, 0x80, 0x0}, 0x0) write$9p(r4, &(0x7f0000000800)="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", 0x400) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0)=0x8, 0x4) sendfile(r4, r5, 0x0, 0x10000) keyctl$unlink(0x9, r1, r1) lsetxattr(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)=@known='trusted.overlay.nlink\x00', &(0x7f00000003c0)=']trusted/mime_type\xac\x00', 0x14, 0x2) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000200)=""/169, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) ioctl$TIOCGPGRP(r4, 0x540f, 0x0) accept$unix(r6, &(0x7f0000000500)=@abs, &(0x7f0000000440)=0x6e) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000000)) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000002c0)=@v3={0x3000000, [{0x8000}, {0x0, 0x2}]}, 0x18, 0x1) ioctl$TIOCSIG(r4, 0x40045436, 0x0) 14:34:15 executing program 3: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x100000, &(0x7f0000000080)={[{@mode={'mode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x9c}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode'}}], [{@audit='audit'}, {@permit_directio='permit_directio'}, {@obj_role={'obj_role', 0x3d, '+nodevvboxnet0'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@audit='audit'}]}) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) shmctl$SHM_UNLOCK(r0, 0xc) 14:34:15 executing program 1: r0 = socket$inet(0x2, 0x100000000805, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x6d, 0x0, &(0x7f0000b96000)) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)={[{0x2b, 'cpu'}]}, 0x5) 14:34:15 executing program 2: r0 = socket(0xa, 0x1, 0x0) r1 = request_key(&(0x7f00000001c0)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000340)='(wlan1\'#keyring:\x00', 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000380)={r1, 0x1}, 0x0, &(0x7f00000004c0)='x', 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x1ffa, 0x0) ioctl$BLKRRPART(r2, 0x125f, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chmod(&(0x7f0000000140)='./file0\x00', 0x4) r4 = fcntl$dupfd(r3, 0x406, r0) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000200)=0x1) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x1) io_setup(0xe7e, &(0x7f0000000100)=0x0) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) io_submit(r6, 0x200001d2, &(0x7f0000000880)=[&(0x7f0000000500)={0x0, 0x0, 0x0, 0x5, 0x100000000, r7, &(0x7f00000003c0)="8f64a070ec7e9aa8e9fb1d7b1878c1d325eeea28123b29fbb0d027a650c6dc7f0a9cbbf6f8f5b6b277ab1f859c12560c3746f9c76206c73f016e791aa311de47ed759ad8cc93c0c59d3e7bd08129fbe7a13f7dd1a1b06470c2aa9cc8b730362cbe3ceca71bda871dd0de9917eacc041a0ac32bde1b1a78c5fa51e8af86c5a5b47ea672e3d37fc748d30c0b36bd4a684138c7dcda42055c7cd229b9e684e2e3b1eb9d94058c64549484efd96d05052a4fd9cdc1602460d6ba303fcf0a2b38b984002b1b5eae", 0x0, 0x9, 0x0, 0x1, r0}, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x800000000, r0, &(0x7f0000000540)="e50f0293dd82ac6bf5253549ea4fa6986370bdfd158b12b29cdfb1ae495a4d23ffc1d820535e13ee0d15668679695c55b1c3348d018f8f0bbb0813ff520a1c082d9a22b48ddb9dcd437bb1fbde85b36b11e32b7b9b05ad3f6187ace65d487a3411a41df93ee652c0e84f4336fd03a7ff573de095a029879e0d6b975da3eeb60c5abcb6a1bb5009d25f7fbce8650061126eed269dfef9962621b0e9e0336c3eee8533a63e998c1bbe8d6b3cabedcf5da2b4f49ab7e6034fb704880dec1b6598313d85390d0ad1e86bf2a05a778826b66d3cd8eaa83f4c71bd5665e4", 0x0, 0x9, 0x0, 0x1, r3}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x8, 0x5, r0, &(0x7f0000000680)="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", 0x0, 0x1, 0x0, 0x0, r5}, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x2, 0xda, r4, &(0x7f0000000800)="13f8336756a968821f75fe9eb2a0b66341260264a3b07485cb975212e3e9e32335b68c8b2a57638fe2a244501eb3", 0x0, 0x100000001, 0x0, 0x1}]) 14:34:15 executing program 5: r0 = socket(0xa, 0x1, 0x0) r1 = request_key(&(0x7f00000001c0)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000340)='(wlan1\'#keyring:\x00', 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000380)={r1, 0x1}, 0x0, &(0x7f00000004c0)='x', 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x1ffa, 0x0) ioctl$BLKRRPART(r2, 0x125f, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chmod(&(0x7f0000000140)='./file0\x00', 0x4) r4 = fcntl$dupfd(r3, 0x406, r0) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000200)=0x1) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x1) io_setup(0xe7e, &(0x7f0000000100)=0x0) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) io_submit(r6, 0x200001d2, &(0x7f0000000880)=[&(0x7f0000000500)={0x0, 0x0, 0x0, 0x5, 0x100000000, r7, &(0x7f00000003c0)="8f64a070ec7e9aa8e9fb1d7b1878c1d325eeea28123b29fbb0d027a650c6dc7f0a9cbbf6f8f5b6b277ab1f859c12560c3746f9c76206c73f016e791aa311de47ed759ad8cc93c0c59d3e7bd08129fbe7a13f7dd1a1b06470c2aa9cc8b730362cbe3ceca71bda871dd0de9917eacc041a0ac32bde1b1a78c5fa51e8af86c5a5b47ea672e3d37fc748d30c0b36bd4a684138c7dcda42055c7cd229b9e684e2e3b1eb9d94058c64549484efd96d05052a4fd9cdc1602460d6ba303fcf0a2b38b984002b1b5eae", 0x0, 0x9, 0x0, 0x1, r0}, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x800000000, r0, &(0x7f0000000540)="e50f0293dd82ac6bf5253549ea4fa6986370bdfd158b12b29cdfb1ae495a4d23ffc1d820535e13ee0d15668679695c55b1c3348d018f8f0bbb0813ff520a1c082d9a22b48ddb9dcd437bb1fbde85b36b11e32b7b9b05ad3f6187ace65d487a3411a41df93ee652c0e84f4336fd03a7ff573de095a029879e0d6b975da3eeb60c5abcb6a1bb5009d25f7fbce8650061126eed269dfef9962621b0e9e0336c3eee8533a63e998c1bbe8d6b3cabedcf5da2b4f49ab7e6034fb704880dec1b6598313d85390d0ad1e86bf2a05a778826b66d3cd8eaa83f4c71bd5665e4", 0x0, 0x9, 0x0, 0x1, r3}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x8, 0x5, r0, &(0x7f0000000680)="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", 0x0, 0x1, 0x0, 0x0, r5}, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x2, 0xda, r4, &(0x7f0000000800)="13f8336756a968821f75fe9eb2a0b66341260264a3b07485cb975212e3e9e32335b68c8b2a57638fe2a244501eb3", 0x0, 0x100000001, 0x0, 0x1}]) 14:34:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100001890e, &(0x7f0000000040)="c0dca5055e0bcfec7be0700f6b35b6155feedfe3ca977800d64ee005101e349140ee8fb4973726138b952ac1ac3da8688536e005dd11bfab") unshare(0x8000000) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x1, 0x0) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f00000000c0)=""/253) r2 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x5}) mq_timedsend(r2, 0x0, 0x0, 0x1, 0x0) [ 165.904373] audit: type=1804 audit(1561127655.088:45): pid=7495 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir226234889/syzkaller.OUCTtk/5/file0" dev="sda1" ino=16576 res=1 [ 165.939569] kobject: 'loop4' (ffff8880a4ad92e0): kobject_uevent_env 14:34:15 executing program 3: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x100000, &(0x7f0000000080)={[{@mode={'mode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x9c}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode'}}], [{@audit='audit'}, {@permit_directio='permit_directio'}, {@obj_role={'obj_role', 0x3d, '+nodevvboxnet0'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@audit='audit'}]}) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) shmctl$SHM_LOCK(r0, 0xb) shmctl$SHM_UNLOCK(r0, 0xc) [ 165.955709] kobject: 'loop4' (ffff8880a4ad92e0): fill_kobj_path: path = '/devices/virtual/block/loop4' 14:34:15 executing program 1: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="047766646e6f3da2f0df04e207117322f089a75ee9c8e0332b47bba42148000000000000", @ANYRESHEX=r1, @ANYBLOB="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"]) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1, 0x300) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000400)={0x8, &(0x7f00000003c0)=[{0x3f, 0x3, 0x1, 0x7ff}, {0x8, 0x101, 0x1ff, 0x9}, {0xf7e, 0x8, 0x80000000, 0x1}, {0x7, 0x3, 0x0, 0xfffffffffffffffc}, {0x1f, 0xfffffffffffffe01, 0x81}, {0x10001, 0x5, 0x400, 0x1c00}, {0xd1, 0x5, 0x2, 0x7}, {0x25, 0x3, 0x0, 0x21a}]}, 0x10) syncfs(r2) getsockopt$inet6_dccp_buf(r2, 0x21, 0xe, &(0x7f0000000180)=""/142, &(0x7f0000000040)=0x8e) 14:34:15 executing program 3: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x100000, &(0x7f0000000080)={[{@mode={'mode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x9c}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode'}}], [{@audit='audit'}, {@permit_directio='permit_directio'}, {@obj_role={'obj_role', 0x3d, '+nodevvboxnet0'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@audit='audit'}]}) shmctl$SHM_LOCK(r0, 0xb) shmctl$SHM_UNLOCK(r0, 0xc) [ 166.031829] audit: type=1800 audit(1561127655.198:46): pid=7553 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=16601 res=0 14:34:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100001890e, &(0x7f0000000040)="c0dca5055e0bcfec7be0700f6b35b6155feedfe3ca977800d64ee005101e349140ee8fb4973726138b952ac1ac3da8688536e005dd11bfab") unshare(0x8000000) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x1, 0x0) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f00000000c0)=""/253) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x282, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0) [ 166.088282] kobject: 'loop3' (ffff8880a4a7f260): kobject_uevent_env [ 166.092127] 9pnet: Insufficient options for proto=fd [ 166.122850] 9pnet: Insufficient options for proto=fd 14:34:15 executing program 3: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) shmctl$SHM_UNLOCK(r0, 0xc) 14:34:15 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0xb5, 0x80) mmap(&(0x7f0000233000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x400000000) [ 166.137785] kobject: 'loop3' (ffff8880a4a7f260): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 166.184648] audit: type=1804 audit(1561127655.248:47): pid=7564 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir226234889/syzkaller.OUCTtk/6/file0" dev="sda1" ino=16601 res=1 [ 166.200952] kobject: 'loop1' (ffff8880a49c4f60): kobject_uevent_env 14:34:15 executing program 4: prctl$PR_SVE_GET_VL(0x33, 0x17c01) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0xf1, "517410177138a23884382f00ec830c379be1baaa3a0f3ed3fc0df14f52c660ac96215302fbe9da27b840b76876aa9c10bfca5921b676a8cb41b1221dba45b80bf408019040befc3ff853f92d2d674b198dd3e1af618360cd072a12a10b994dc9cf4e943559ef0290264c53e7c71cc901799c80eb0a0b6d46f1c32829e4c5c1b434870c872144d0c0a8d541acc236042150f1a61e8dfec4ade8bc708494197cacc8afa3b9718e52555174ae42ed0dc768a5a70dd7f3c8dc1fe7fa7cbebf1a3ce6bf4ad968ea8da26dd1e289f70431918d7fb9d20f7c2599853a4ecbc89b87e28c1fe0a609ce12783aa8341e226af6dcb17c"}, &(0x7f0000000180)=0xf9) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000001c0)={r2, 0x3f, 0x0, 0x5}, &(0x7f0000000200)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x10, &(0x7f0000000000)={0x0, 'se1\x11\x00\x00\x00\x02\x00'}, 0x18) 14:34:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100001890e, &(0x7f0000000040)="c0dca5055e0bcfec7be0700f6b35b6155feedfe3ca977800d64ee005101e349140ee8fb4973726138b952ac1ac3da8688536e005dd11bfab") unshare(0x8000000) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x1, 0x0) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f00000000c0)=""/253) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x282, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0) 14:34:15 executing program 3: shmctl$SHM_LOCK(0x0, 0xb) shmctl$SHM_UNLOCK(0x0, 0xc) [ 166.221780] audit: type=1400 audit(1561127655.348:48): avc: denied { map } for pid=7578 comm="syz-executor.1" path="/dev/video35" dev="devtmpfs" ino=14882 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:v4l_device_t:s0 tclass=chr_file permissive=1 [ 166.267497] kobject: 'loop1' (ffff8880a49c4f60): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 166.279802] kobject: 'loop3' (ffff8880a4a7f260): kobject_uevent_env [ 166.295310] kobject: 'loop3' (ffff8880a4a7f260): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 166.318219] kobject: 'loop0' (ffff8880a498cee0): kobject_uevent_env [ 166.325427] kobject: 'loop0' (ffff8880a498cee0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 166.335618] kobject: 'loop1' (ffff8880a49c4f60): kobject_uevent_env [ 166.342124] kobject: 'loop1' (ffff8880a49c4f60): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 166.352672] kobject: 'loop0' (ffff8880a498cee0): kobject_uevent_env [ 166.359151] kobject: 'loop0' (ffff8880a498cee0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 166.369178] kobject: 'loop1' (ffff8880a49c4f60): kobject_uevent_env [ 166.375635] kobject: 'loop1' (ffff8880a49c4f60): fill_kobj_path: path = '/devices/virtual/block/loop1' 14:34:15 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000040)='\x95Z\t\x00\x00\x00', 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$SIOCX25GCALLUSERDATA(r2, 0x89e4, &(0x7f0000000280)={0xf, "c515f4fcd2b8250b92f8ecb2de3e815317c6567dcb93aced0c573738d07378c7fc4efda84e5a8c5bf41ced578542eeef99460b6c5ce4197834d4d33fb94431ea643f46b527e9596a90d7b51285f13bfcba18a64ab1bfed1332152509c58c4090e387852913fd92437f579e0ed2d6b03aee62b3ae63adcbb280e57b6903486037"}) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x2, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r3, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x4e22, 0x1000, @empty, 0x3}, {0xa, 0x4e20, 0x9, @rand_addr="104f0bfd3c3348505a677ded1d2fd2c9", 0x80}, 0xb68, [0x5, 0xfffffffffffeffff, 0x5, 0x17, 0x9, 0x4, 0x6]}, 0x5c) bind$rxrpc(r2, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x24) ftruncate(r1, 0x40001) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000100)=0x5, 0xfdcd) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r0, r1, 0x0, 0xffe4) 14:34:15 executing program 1: timer_create(0x9, 0x0, &(0x7f0000000000)=0x0) timer_delete(r0) 14:34:15 executing program 5: r0 = socket(0xa, 0x1, 0x0) r1 = request_key(&(0x7f00000001c0)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000340)='(wlan1\'#keyring:\x00', 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000380)={r1, 0x1}, 0x0, &(0x7f00000004c0)='x', 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x1ffa, 0x0) ioctl$BLKRRPART(r2, 0x125f, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chmod(&(0x7f0000000140)='./file0\x00', 0x4) r4 = fcntl$dupfd(r3, 0x406, r0) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000200)=0x1) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x1) io_setup(0xe7e, &(0x7f0000000100)=0x0) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) io_submit(r6, 0x200001d2, &(0x7f0000000880)=[&(0x7f0000000500)={0x0, 0x0, 0x0, 0x5, 0x100000000, r7, &(0x7f00000003c0)="8f64a070ec7e9aa8e9fb1d7b1878c1d325eeea28123b29fbb0d027a650c6dc7f0a9cbbf6f8f5b6b277ab1f859c12560c3746f9c76206c73f016e791aa311de47ed759ad8cc93c0c59d3e7bd08129fbe7a13f7dd1a1b06470c2aa9cc8b730362cbe3ceca71bda871dd0de9917eacc041a0ac32bde1b1a78c5fa51e8af86c5a5b47ea672e3d37fc748d30c0b36bd4a684138c7dcda42055c7cd229b9e684e2e3b1eb9d94058c64549484efd96d05052a4fd9cdc1602460d6ba303fcf0a2b38b984002b1b5eae", 0x0, 0x9, 0x0, 0x1, r0}, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x800000000, r0, &(0x7f0000000540)="e50f0293dd82ac6bf5253549ea4fa6986370bdfd158b12b29cdfb1ae495a4d23ffc1d820535e13ee0d15668679695c55b1c3348d018f8f0bbb0813ff520a1c082d9a22b48ddb9dcd437bb1fbde85b36b11e32b7b9b05ad3f6187ace65d487a3411a41df93ee652c0e84f4336fd03a7ff573de095a029879e0d6b975da3eeb60c5abcb6a1bb5009d25f7fbce8650061126eed269dfef9962621b0e9e0336c3eee8533a63e998c1bbe8d6b3cabedcf5da2b4f49ab7e6034fb704880dec1b6598313d85390d0ad1e86bf2a05a778826b66d3cd8eaa83f4c71bd5665e4", 0x0, 0x9, 0x0, 0x1, r3}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x8, 0x5, r0, &(0x7f0000000680)="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", 0x0, 0x1, 0x0, 0x0, r5}, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x2, 0xda, r4, &(0x7f0000000800)="13f8336756a968821f75fe9eb2a0b66341260264a3b07485cb975212e3e9e32335b68c8b2a57638fe2a244501eb3", 0x0, 0x100000001, 0x0, 0x1}]) 14:34:15 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) madvise(&(0x7f0000a96000/0x4000)=nil, 0x4000, 0x10) capset(&(0x7f0000000200)={0x19980330}, &(0x7f0000000080)) sigaltstack(&(0x7f0000a94000/0x4000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000040)='pagemap\x00'}, 0x30) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, &(0x7f0000000000)=0x100000, 0x100000008001) 14:34:15 executing program 3 (fault-call:1 fault-nth:0): shmctl$SHM_LOCK(0x0, 0xb) shmctl$SHM_UNLOCK(0x0, 0xc) 14:34:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100001890e, &(0x7f0000000040)="c0dca5055e0bcfec7be0700f6b35b6155feedfe3ca977800d64ee005101e349140ee8fb4973726138b952ac1ac3da8688536e005dd11bfab") unshare(0x8000000) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x1, 0x0) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f00000000c0)=""/253) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x282, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0) [ 166.385651] kobject: 'loop5' (ffff8880a4b2e220): kobject_uevent_env [ 166.392130] kobject: 'loop5' (ffff8880a4b2e220): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 166.402219] kobject: 'loop4' (ffff8880a4ad92e0): kobject_uevent_env [ 166.408660] kobject: 'loop4' (ffff8880a4ad92e0): fill_kobj_path: path = '/devices/virtual/block/loop4' 14:34:15 executing program 3: r0 = shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffc000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) shmctl$SHM_UNLOCK(0x0, 0xc) [ 166.430965] kobject: 'loop0' (ffff8880a498cee0): kobject_uevent_env [ 166.433692] capability: warning: `syz-executor.4' uses 32-bit capabilities (legacy support in use) [ 166.462059] kobject: 'loop0' (ffff8880a498cee0): fill_kobj_path: path = '/devices/virtual/block/loop0' 14:34:15 executing program 3: shmget$private(0x0, 0x3000, 0x805, &(0x7f0000ffb000/0x3000)=nil) shmget(0x2, 0x2000, 0x24, &(0x7f0000ffc000/0x2000)=nil) shmget$private(0x0, 0x1000, 0x78000002, &(0x7f0000ffa000/0x1000)=nil) r0 = shmget(0x3, 0x4000, 0x1400, &(0x7f0000ff9000/0x4000)=nil) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm-control\x00', 0x10000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x1, @rand_addr="d265f7bbd2b317736ffc02f412a29eb4", 0x10000}}, [0x4f5, 0xd33, 0x0, 0x0, 0x7fe56b47, 0x7fff, 0xba, 0x6, 0x6e3, 0x8000000, 0x9, 0x9, 0x73b, 0x1, 0x5]}, &(0x7f0000000480)=0x100) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000004c0)={r2, @in6={{0xa, 0x4e21, 0x8000, @mcast1, 0x5}}, 0x7ff, 0x51a8, 0x1cb8, 0x87, 0x5}, 0x98) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000180)={@in={{0x2, 0x4e21, @multicast1}}, 0x0, 0x800, 0x0, "9547c6a1a3d5a3ce626a50727a9058148add1fe48e8dba28a8f61a39306cf7c2d3c099aa3f44b919f76bafc3dc26ed798917dc66a876292746ca379b6e275b576c89c4b86ef59cd91f4834ddd58ed671"}, 0xd8) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000040)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x14) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f00000000c0)={0x2c84, 0x7, 0x204, 0xc7f, 0x4, 0x1000, 0x100000001, 0x8001, r4}, 0x20) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000100)={0x2, [0x41, 0x5a]}, &(0x7f0000000140)=0x8) shmctl$SHM_LOCK(r0, 0xb) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0xf18) shmctl$SHM_UNLOCK(0x0, 0xc) 14:34:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100001890e, &(0x7f0000000040)="c0dca5055e0bcfec7be0700f6b35b6155feedfe3ca977800d64ee005101e349140ee8fb4973726138b952ac1ac3da8688536e005dd11bfab") unshare(0x8000000) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x1, 0x0) r1 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x5}) mq_timedreceive(r1, &(0x7f0000000000)=""/24, 0x282, 0x0, 0x0) mq_timedsend(r1, 0x0, 0x0, 0x1, 0x0) 14:34:15 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x40000000000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="0f20e06635000002000f22e00f9350f20f232e0f47f5baf80c66b8c8a2558a66efbafc0c66ed0f35b85c000f00d0baf80c66b8fe65f68066efbafc0ced66b9870a000066b8d95f902966baf1a568110f300f231b"}], 0xaaaaaaaaaaaad03, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x8200, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r3, 0x80045300, &(0x7f0000000080)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000004cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 166.472193] audit: type=1400 audit(1561127655.658:49): avc: denied { wake_alarm } for pid=7596 comm="syz-executor.1" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 166.508152] kobject: 'loop2' (ffff8880a4a391e0): kobject_uevent_env [ 166.517284] kobject: 'loop2' (ffff8880a4a391e0): fill_kobj_path: path = '/devices/virtual/block/loop2' 14:34:15 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x8000, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={r0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x2}, 0x10) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0xffffffa2) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = getuid() getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000280)={{{@in, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) setreuid(r4, r5) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) ppoll(&(0x7f0000000000)=[{r2}], 0x1, 0x0, 0x0, 0x7c) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r6 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_emit_ethernet(0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0) sendmsg$key(r3, 0x0, 0x42) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='westwood\x00', 0x9) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) getpriority(0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)}], 0x0, 0x0) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/ppp\x00', 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$EVIOCGPROP(r8, 0xc004743e, &(0x7f0000000300)=""/246) ioctl$EVIOCGREP(r7, 0x40047459, &(0x7f0000000240)=""/174) pread64(r7, 0x0, 0xd2, 0x0) write$binfmt_elf64(r7, 0x0, 0x0) 14:34:15 executing program 3: shmget(0x2, 0x2000, 0x78000a00, &(0x7f0000ffc000/0x2000)=nil) shmget$private(0x0, 0x1000, 0x54000c40, &(0x7f0000ffd000/0x1000)=nil) shmget(0x0, 0x4000, 0x800, &(0x7f0000ffb000/0x4000)=nil) shmget$private(0x0, 0x1000, 0x54, &(0x7f0000ffb000/0x1000)=nil) r0 = shmget$private(0x0, 0x2000, 0x4, &(0x7f0000ffc000/0x2000)=nil) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000040)=""/150) shmctl$SHM_LOCK(r0, 0xb) ioctl$int_out(r1, 0x5460, &(0x7f0000000100)) shmctl$SHM_UNLOCK(0x0, 0xc) 14:34:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000200)) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000002c0)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000300)='net/packet\x00') ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000100)=0x6) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") pipe(&(0x7f00000000c0)) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0x200000000000042) ioctl$FS_IOC_FSGETXATTR(r3, 0x8038550a, &(0x7f0000000140)={0x8002, 0x8, 0x2, 0x7ff, 0x400000, 0x7ff0bdbe}) [ 166.584384] kobject: 'loop0' (ffff8880a498cee0): kobject_uevent_env [ 166.603019] kobject: 'kvm' (ffff888219f935d0): kobject_uevent_env 14:34:15 executing program 3: shmctl$SHM_LOCK(0x0, 0xb) shmget$private(0x0, 0x3000, 0x1400, &(0x7f0000ffb000/0x3000)=nil) shmget(0x1, 0x4000, 0x44, &(0x7f0000ffb000/0x4000)=nil) shmget(0x1, 0x1000, 0x40, &(0x7f0000ffc000/0x1000)=nil) shmget(0x2, 0x2000, 0x1000, &(0x7f0000ffd000/0x2000)=nil) shmget$private(0x0, 0x4000, 0x10, &(0x7f0000ffb000/0x4000)=nil) r0 = shmget$private(0x0, 0x1000, 0x100, &(0x7f0000ffb000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) [ 166.636735] kobject: 'loop0' (ffff8880a498cee0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 166.658960] kobject: 'kvm' (ffff888219f935d0): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 166.704715] kobject: 'loop4' (ffff8880a4ad92e0): kobject_uevent_env [ 166.710984] kobject: 'loop1' (ffff8880a49c4f60): kobject_uevent_env [ 166.711404] kobject: 'loop4' (ffff8880a4ad92e0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 166.728684] kobject: 'kvm' (ffff888219f935d0): kobject_uevent_env [ 166.738482] kobject: 'kvm' (ffff888219f935d0): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 166.749619] kobject: 'loop1' (ffff8880a49c4f60): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 166.762315] kobject: 'ppp0' (ffff8880871ad170): kobject_add_internal: parent: 'net', set: 'devices' [ 166.772562] kobject: 'loop4' (ffff8880a4ad92e0): kobject_uevent_env [ 166.774202] kobject: 'kvm' (ffff888219f935d0): kobject_uevent_env [ 166.779019] kobject: 'loop4' (ffff8880a4ad92e0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 166.785755] kobject: 'kvm' (ffff888219f935d0): fill_kobj_path: path = '/devices/virtual/misc/kvm' 14:34:16 executing program 5: syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x103440) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x1a200) clock_gettime(0xfffffffffffffffc, &(0x7f0000000300)) write$P9_RREMOVE(r0, &(0x7f00000000c0)={0x330}, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}, 0x8}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x6000000000000001, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r2, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00', 0x0, 0x0, 0x5, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f0000000240)=0x78) getpgid(0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r4, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00', 0x80000000000002}, 0x18) ioctl(r4, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x1ff, 0x0) write$FUSE_NOTIFY_DELETE(r3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x299) mount(&(0x7f0000001040)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x8000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f000002c000)=ANY=[@ANYBLOB="000000001800210000000000000000001c140000fe0000010000000004000980"], 0x1}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x40000000000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r6 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r6, 0x107, 0x7, &(0x7f0000000000)=0x2, 0x4) 14:34:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x4, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') rmdir(&(0x7f0000000000)='./file0\x00') r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x200, 0x0) mknodat(r3, &(0x7f00000000c0)='./file0\x00', 0x1008, 0x8000) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffece) 14:34:16 executing program 3: shmctl$SHM_UNLOCK(0x0, 0xc) 14:34:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100001890e, &(0x7f0000000040)="c0dca5055e0bcfec7be0700f6b35b6155feedfe3ca977800d64ee005101e349140ee8fb4973726138b952ac1ac3da8688536e005dd11bfab") unshare(0x8000000) r1 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x5}) mq_timedreceive(r1, &(0x7f0000000000)=""/24, 0x282, 0x0, 0x0) mq_timedsend(r1, 0x0, 0x0, 0x1, 0x0) [ 166.800225] kobject: 'loop4' (ffff8880a4ad92e0): kobject_uevent_env [ 166.811943] kobject: 'kvm' (ffff888219f935d0): kobject_uevent_env [ 166.818667] kobject: 'kvm' (ffff888219f935d0): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 166.820791] kobject: 'ppp0' (ffff8880871ad170): kobject_uevent_env [ 166.838389] kobject: 'ppp0' (ffff8880871ad170): fill_kobj_path: path = '/devices/virtual/net/ppp0' 14:34:16 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\b\x02') openat$cgroup_ro(r0, &(0x7f0000000140)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed' [ 166.887576] kobject: 'kvm' (ffff888219f935d0): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 166.893049] kobject: 'loop2' (ffff8880a4a391e0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 166.913150] kobject: 'queues' (ffff88808fd5ee48): kobject_uevent_env [ 166.921663] kobject: 'kvm' (ffff888219f935d0): kobject_uevent_env [ 166.925846] kobject: 'queues' (ffff88808fd5ee48): kobject_uevent_env: filter function caused the event to drop! [ 166.929397] kobject: 'kvm' (ffff888219f935d0): fill_kobj_path: path = '/devices/virtual/misc/kvm' 14:34:16 executing program 3: shmget$private(0x0, 0x3000, 0x40, &(0x7f0000ffd000/0x3000)=nil) shmget$private(0x0, 0x1000, 0x2, &(0x7f0000ffc000/0x1000)=nil) shmget(0x2, 0x4000, 0x200, &(0x7f0000ffc000/0x4000)=nil) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000040)={0x0, 0x0, 0xfffffffffffffffd, 0x84000, 0xffffffffffffff9c}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x202, 0x0) ioctl$FICLONE(r0, 0x40049409, r1) r2 = shmget(0x1, 0x3000, 0x80, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_LOCK(r2, 0xb) shmctl$SHM_UNLOCK(0x0, 0xc) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x1ffd, 0x0) ioctl$NBD_CLEAR_SOCK(r3, 0xab04) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_FLUSHABLE(r4, 0x112, 0x8, &(0x7f0000000080)=0x400, 0xfd49) 14:34:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100001890e, &(0x7f0000000040)="c0dca5055e0bcfec7be0700f6b35b6155feedfe3ca977800d64ee005101e349140ee8fb4973726138b952ac1ac3da8688536e005dd11bfab") r1 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x5}) mq_timedreceive(r1, &(0x7f0000000000)=""/24, 0x282, 0x0, 0x0) mq_timedsend(r1, 0x0, 0x0, 0x1, 0x0) [ 166.946681] kobject: 'loop3' (ffff8880a4a7f260): kobject_uevent_env [ 166.957527] kobject: 'loop3' (ffff8880a4a7f260): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 166.969777] kobject: 'rx-0' (ffff8880a58c8cd0): kobject_add_internal: parent: 'queues', set: 'queues' [ 166.982366] kobject: 'loop2' (ffff8880a4a391e0): kobject_uevent_env [ 166.997594] kobject: 'rx-0' (ffff8880a58c8cd0): kobject_uevent_env [ 167.006054] kobject: 'loop2' (ffff8880a4a391e0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 167.016334] kobject: 'rx-0' (ffff8880a58c8cd0): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/rx-0' [ 167.029492] kobject: 'loop3' (ffff8880a4a7f260): kobject_uevent_env [ 167.037015] kobject: 'tx-0' (ffff888086215d18): kobject_add_internal: parent: 'queues', set: 'queues' [ 167.046502] kobject: 'loop3' (ffff8880a4a7f260): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 167.047098] kobject: 'loop5' (ffff8880a4b2e220): kobject_uevent_env [ 167.059155] kobject: 'tx-0' (ffff888086215d18): kobject_uevent_env [ 167.069643] kobject: 'tx-0' (ffff888086215d18): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/tx-0' [ 167.077301] kobject: 'loop5' (ffff8880a4b2e220): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 167.087154] kobject: 'bond0.0' (ffff88808a9d8cb0): kobject_add_internal: parent: 'net', set: 'devices' [ 167.097556] kobject: 'loop3' (ffff8880a4a7f260): kobject_uevent_env [ 167.105797] kobject: 'loop3' (ffff8880a4a7f260): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 167.118278] kobject: 'loop4' (ffff8880a4ad92e0): kobject_uevent_env [ 167.125215] kobject: 'loop4' (ffff8880a4ad92e0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 167.132352] kobject: 'bond0.0' (ffff88808a9d8cb0): kobject_uevent_env [ 167.135564] kobject: 'loop3' (ffff8880a4a7f260): kobject_uevent_env [ 167.144869] kobject: 'bond0.0' (ffff88808a9d8cb0): fill_kobj_path: path = '/devices/virtual/net/bond0.0' [ 167.148149] kobject: 'loop3' (ffff8880a4a7f260): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 167.172186] kobject: 'queues' (ffff88808fd5ea48): kobject_add_internal: parent: 'bond0.0', set: '' [ 167.172887] kobject: 'loop0' (ffff8880a498cee0): kobject_uevent_env [ 167.184353] kobject: 'queues' (ffff88808fd5ea48): kobject_uevent_env [ 167.188695] kobject: 'loop0' (ffff8880a498cee0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 167.196311] kobject: 'queues' (ffff88808fd5ea48): kobject_uevent_env: filter function caused the event to drop! [ 167.205501] kobject: 'loop3' (ffff8880a4a7f260): kobject_uevent_env [ 167.205526] kobject: 'loop3' (ffff8880a4a7f260): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 167.206095] kobject: 'loop2' (ffff8880a4a391e0): kobject_uevent_env [ 167.206117] kobject: 'loop2' (ffff8880a4a391e0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 167.321164] kobject: 'rx-0' (ffff88809fc29e50): kobject_add_internal: parent: 'queues', set: 'queues' [ 167.346284] kobject: 'rx-0' (ffff88809fc29e50): kobject_uevent_env [ 167.362519] kobject: 'rx-0' (ffff88809fc29e50): fill_kobj_path: path = '/devices/virtual/net/bond0.0/queues/rx-0' [ 167.385232] kobject: 'tx-0' (ffff8880a13092d8): kobject_add_internal: parent: 'queues', set: 'queues' [ 167.397496] kobject: 'tx-0' (ffff8880a13092d8): kobject_uevent_env [ 167.404394] kobject: 'tx-0' (ffff8880a13092d8): fill_kobj_path: path = '/devices/virtual/net/bond0.0/queues/tx-0' [ 167.417264] kobject: 'batman_adv' (ffff8880a0a10200): kobject_add_internal: parent: 'bond0.0', set: '' [ 167.430562] kobject: 'rx-0' (ffff8880a58c8cd0): kobject_cleanup, parent ffff88808fd5ee48 [ 167.438903] kobject: 'rx-0' (ffff8880a58c8cd0): auto cleanup 'remove' event [ 167.447906] kobject: 'rx-0' (ffff8880a58c8cd0): kobject_uevent_env [ 167.454358] kobject: 'rx-0' (ffff8880a58c8cd0): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/rx-0' [ 167.464948] kobject: 'rx-0' (ffff8880a58c8cd0): auto cleanup kobject_del [ 167.471865] kobject: 'rx-0' (ffff8880a58c8cd0): calling ktype release [ 167.478561] kobject: 'rx-0': free name [ 167.482902] kobject: 'tx-0' (ffff888086215d18): kobject_cleanup, parent ffff88808fd5ee48 [ 167.491182] kobject: 'tx-0' (ffff888086215d18): auto cleanup 'remove' event [ 167.498278] kobject: 'tx-0' (ffff888086215d18): kobject_uevent_env [ 167.504660] kobject: 'tx-0' (ffff888086215d18): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/tx-0' [ 167.515281] kobject: 'tx-0' (ffff888086215d18): auto cleanup kobject_del [ 167.530949] kobject: 'tx-0' (ffff888086215d18): calling ktype release [ 167.537534] kobject: 'tx-0': free name [ 167.541492] kobject: 'queues' (ffff88808fd5ee48): kobject_cleanup, parent (null) [ 167.549993] kobject: 'queues' (ffff88808fd5ee48): calling ktype release [ 167.556802] kobject: 'queues' (ffff88808fd5ee48): kset_release [ 167.562807] kobject: 'queues': free name [ 167.568340] kobject: 'ppp0' (ffff8880871ad170): kobject_uevent_env [ 167.575224] kobject: 'ppp0' (ffff8880871ad170): fill_kobj_path: path = '/devices/virtual/net/ppp0' [ 167.600378] kobject: 'ppp0' (ffff8880871ad170): kobject_cleanup, parent (null) [ 167.608639] kobject: 'ppp0' (ffff8880871ad170): calling ktype release [ 167.615281] kobject: 'ppp0': free name [ 167.629490] kobject: 'loop4' (ffff8880a4ad92e0): kobject_uevent_env [ 167.636017] kobject: 'loop4' (ffff8880a4ad92e0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 167.670208] kobject: 'loop4' (ffff8880a4ad92e0): kobject_uevent_env [ 167.677179] kobject: 'loop4' (ffff8880a4ad92e0): fill_kobj_path: path = '/devices/virtual/block/loop4' 14:34:16 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000180)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bbeec7be070") r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x202000, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045516, 0x0) 14:34:16 executing program 3: shmctl$SHM_UNLOCK(0x0, 0xc) 14:34:16 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000180)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f00000000c0)=0x10001) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)=0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x50, 0x0) perf_event_open(&(0x7f0000000000)={0x7, 0x70, 0xc9e0, 0x3f, 0x1ff, 0x1ff, 0x0, 0x9, 0x20, 0x0, 0x7, 0x0, 0x8050000000000, 0x26c7, 0x6, 0x2e3, 0xdc8, 0x100000000, 0xffffffffffffffff, 0x6, 0x3, 0x100, 0x5, 0x3, 0x133, 0x100000001, 0x6, 0xffffffffffffff7f, 0x9a, 0x9, 0xd5a199f, 0xf4, 0x7, 0x161, 0x2, 0x92, 0x10001, 0x7, 0x0, 0x6, 0x4, @perf_config_ext={0x6a91}, 0x10, 0x12b6, 0x4, 0x8, 0x3, 0x1, 0x8d3}, r1, 0x2, r2, 0xa) 14:34:16 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x3, @broadcast}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x200000000000011, 0x80000000000003, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00', 0x0}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000380)=0x595, 0x4) sendmmsg(r1, &(0x7f0000000d00), 0x400004e, 0xffffa888) sendto$inet(r0, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) sendto(r0, &(0x7f0000000080)="c5", 0x1, 0x4000051, 0x0, 0x0) 14:34:16 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x5}) mq_timedreceive(r0, &(0x7f0000000000)=""/24, 0x282, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x1, 0x0) 14:34:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r1 = dup(r0) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) io_submit(0x0, 0x400000d8, &(0x7f000049bfe8)=[&(0x7f00004dbfc0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x3c6}]) ioctl$SIOCX25GSUBSCRIP(r1, 0x89e0, &(0x7f0000000180)={'veth1_to_team\x00', 0x6, 0x3}) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000280)={0x9, 0x5, 0x3}) fsetxattr(r2, &(0x7f0000000000)=@random={'system.', 'procposix_acl_access\x00'}, &(0x7f0000000040)='sha224-generic\x00', 0xf, 0x1) getsockopt$ax25_int(r1, 0x101, 0xa, &(0x7f0000000100), &(0x7f0000000140)=0x4) 14:34:16 executing program 1: prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) syz_read_part_table(0x40000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="020082ffffff01000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 14:34:16 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x5}) mq_timedreceive(r0, &(0x7f0000000000)=""/24, 0x282, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x1, 0x0) 14:34:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha1\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x357, &(0x7f0000000000), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x3f, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0xd}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000040)=0x7, r3, 0x0, 0x0, 0x1}}, 0x20) [ 167.744212] kobject: 'loop4' (ffff8880a4ad92e0): kobject_uevent_env [ 167.764736] kobject: 'loop4' (ffff8880a4ad92e0): fill_kobj_path: path = '/devices/virtual/block/loop4' 14:34:17 executing program 3: r0 = shmget(0x2, 0x2000, 0x4, &(0x7f0000ffe000/0x2000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x0) shmctl$SHM_LOCK(0x0, 0xb) shmctl$SHM_UNLOCK(r0, 0xc) 14:34:17 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x5}) mq_timedreceive(r0, &(0x7f0000000000)=""/24, 0x282, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x1, 0x0) 14:34:17 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r0, 0x8818564c, &(0x7f0000000180)) clone(0x804007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) rt_sigpending(&(0x7f00000009c0), 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x2000000004e22}, 0x1c) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x1) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x2) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000140)={0xa, 0x4e22}, 0x1c) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000100)=0x44) 14:34:17 executing program 5: write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x4000, 0x0) linkat(r0, 0x0, r0, 0x0, 0x1000) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x7fffffff, 0x4) write$FUSE_CREATE_OPEN(r0, 0x0, 0xa) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x6a2000, 0x0) write$sndseq(r0, &(0x7f0000000100)=[{0xfffffffffffffff8, 0xffffffffffffff7f, 0x100000001, 0xffff, @tick=0x400, {0x4}, {0x0, 0x1}, @raw32={[0x0, 0x4, 0x7]}}], 0x30) 14:34:17 executing program 0: ioctl(0xffffffffffffffff, 0x100001890e, &(0x7f0000000040)="c0dca5055e0bcfec7be0700f6b35b6155feedfe3ca977800d64ee005101e349140ee8fb4973726138b952ac1ac3da8688536e005dd11bfab") r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x5}) mq_timedreceive(r0, &(0x7f0000000000)=""/24, 0x282, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x1, 0x0) [ 167.789872] kobject: 'loop1' (ffff8880a49c4f60): kobject_uevent_env [ 167.803719] kobject: 'loop1' (ffff8880a49c4f60): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 167.814258] kobject: 'loop5' (ffff8880a4b2e220): kobject_uevent_env [ 167.850612] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 167.856428] kobject: 'loop5' (ffff8880a4b2e220): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 167.864369] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 167.874372] QAT: Invalid ioctl [ 167.880430] kobject: 'loop1' (ffff8880a49c4f60): kobject_uevent_env [ 167.883541] PM: Marking nosave pages: [mem 0x00000000-0x00000fff] 14:34:17 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x19, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x100000000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd2c, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e22, 0x3f, @empty, 0x33}}}, &(0x7f0000000180)=0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f00000001c0)={r3, 0x7}, 0x8) 14:34:17 executing program 0: ioctl(0xffffffffffffffff, 0x100001890e, &(0x7f0000000040)="c0dca5055e0bcfec7be0700f6b35b6155feedfe3ca977800d64ee005101e349140ee8fb4973726138b952ac1ac3da8688536e005dd11bfab") r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x5}) mq_timedreceive(r0, &(0x7f0000000000)=""/24, 0x282, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x1, 0x0) 14:34:17 executing program 3: shmctl$SHM_LOCK(0x0, 0xb) shmctl$SHM_UNLOCK(0x0, 0xc) r0 = gettid() ioprio_set$pid(0x0, r0, 0x7) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000140)=""/26) [ 167.900470] loop1: p1 [ 167.900744] QAT: Invalid ioctl [ 167.911141] kobject: 'loop1' (ffff8880a49c4f60): kobject_uevent_env [ 167.914423] QAT: Invalid ioctl [ 167.918491] PM: Marking nosave pages: [mem 0x0009f000-0x000fffff] [ 167.931633] kobject: 'loop1' (ffff8880a49c4f60): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 167.937836] kobject: 'loop1' (ffff8880a49c4f60): fill_kobj_path: path = '/devices/virtual/block/loop1' 14:34:17 executing program 0: ioctl(0xffffffffffffffff, 0x100001890e, &(0x7f0000000040)="c0dca5055e0bcfec7be0700f6b35b6155feedfe3ca977800d64ee005101e349140ee8fb4973726138b952ac1ac3da8688536e005dd11bfab") r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x5}) mq_timedreceive(r0, &(0x7f0000000000)=""/24, 0x282, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x1, 0x0) [ 167.951556] QAT: Invalid ioctl [ 167.959298] kobject: 'loop0' (ffff8880a498cee0): kobject_uevent_env [ 167.960510] PM: Marking nosave pages: [mem 0xbfffd000-0xffffffff] [ 167.977437] kobject: 'loop1p1' (ffff88805d264058): kobject_add_internal: parent: 'loop1', set: 'devices' [ 167.984104] kobject: 'loop0' (ffff8880a498cee0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 168.000065] kobject: 'loop1p1' (ffff88805d264058): kobject_uevent_env [ 168.007810] kobject: 'loop5' (ffff8880a4b2e220): kobject_uevent_env [ 168.016704] kobject: 'loop5' (ffff8880a4b2e220): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 168.017940] PM: Basic memory bitmaps created [ 168.027311] kobject: 'loop3' (ffff8880a4a7f260): kobject_uevent_env [ 168.034097] kobject: 'loop1p1' (ffff88805d264058): kobject_uevent_env: uevent_suppress caused the event to drop! [ 168.048255] kobject: 'holders' (ffff8880a8dc2f80): kobject_add_internal: parent: 'loop1p1', set: '' [ 168.050467] kobject: 'loop3' (ffff8880a4a7f260): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 168.063048] kobject: 'loop1p1' (ffff88805d264058): kobject_uevent_env [ 168.072532] PM: Basic memory bitmaps freed [ 168.074287] kobject: 'loop1p1' (ffff88805d264058): fill_kobj_path: path = '/devices/virtual/block/loop1/loop1p1' [ 168.079002] kobject: 'loop0' (ffff8880a498cee0): kobject_uevent_env [ 168.091824] PM: Marking nosave pages: [mem 0x00000000-0x00000fff] [ 168.098185] kobject: 'loop0' (ffff8880a498cee0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 168.102680] PM: Marking nosave pages: [mem 0x0009f000-0x000fffff] [ 168.113695] kobject: 'loop5' (ffff8880a4b2e220): kobject_uevent_env [ 168.117646] PM: Marking nosave pages: [mem 0xbfffd000-0xffffffff] [ 168.124304] kobject: 'loop5' (ffff8880a4b2e220): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 168.141882] kobject: 'loop1' (ffff8880a49c4f60): kobject_uevent_env [ 168.142724] kobject: 'loop0' (ffff8880a498cee0): kobject_uevent_env [ 168.150565] kobject: 'loop1' (ffff8880a49c4f60): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 168.155187] kobject: 'loop0' (ffff8880a498cee0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 168.175111] PM: Basic memory bitmaps created [ 168.181691] kobject: 'loop2' (ffff8880a4a391e0): kobject_uevent_env [ 168.181812] kobject: 'holders' (ffff8880a8dc2f80): kobject_cleanup, parent ffff88805d264058 [ 168.188228] kobject: 'loop2' (ffff8880a4a391e0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 168.202736] PM: Basic memory bitmaps freed [ 168.210685] kobject: 'holders' (ffff8880a8dc2f80): auto cleanup kobject_del [ 168.213311] kobject: 'loop0' (ffff8880a498cee0): kobject_uevent_env [ 168.221369] kobject: 'holders' (ffff8880a8dc2f80): calling ktype release [ 168.224776] kobject: 'loop0' (ffff8880a498cee0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 168.233284] kobject: (ffff8880a8dc2f80): dynamic_kobj_release 14:34:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x12402, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x74, &(0x7f0000000040)=[@in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e20, 0xffff, @ipv4={[], [], @multicast1}, 0x1}, @in6={0xa, 0x4e23, 0x9, @local, 0x96}, @in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x4e20, 0x6, @local, 0x9}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f00000001c0)={r4, @in={{0x2, 0x4e22, @multicast1}}, 0x8, 0xd4a}, &(0x7f0000000280)=0x90) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:34:17 executing program 3: shmctl$SHM_LOCK(0x0, 0xb) shmctl$SHM_UNLOCK(0x0, 0xc) r0 = shmget(0x1, 0x4000, 0x21, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) r1 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000080)=0x80, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r2 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x121000) ioctl$VIDIOC_G_DV_TIMINGS(r2, 0xc0845658, &(0x7f0000000180)={0x0, @reserved}) 14:34:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000640)={&(0x7f0000000040)=@rc={0x1f, {0x20, 0x7, 0xffff, 0x10001, 0x3, 0x10001}, 0x5}, 0x80, &(0x7f00000005c0)=[{&(0x7f00000001c0)="6b7f2d7f06a26c9a3915d16c5d3f177ff45a4c1ea20ac72cd60d749ae703e2a7b399e45eed2ab22d70b05ee69e05bbe25865a49c1fa8f265e8ccb2a64140cbeafa3373f7d20b58e17c3e33d39be9a6c9db73bf68e3e7b7f14c997228b81b5afdef9980b621473b2e2f2f2f206ddb9373ffd8df693493d320156c63e489e771fb10b3a90df7c0cead3aab9c5f22df0498a0b19d6c1bac92bc0b79f83a398feedd84c7c2a01b55fb3d270e57b527953439061b68c2bee06f677790e16f8c74c0c58cd2c3b36e479ac7d4df69", 0xcb}, {&(0x7f00000000c0)="344e751b0a5abd171e813ceba7c292a4654ee8146f0e1c7ba53f982b68cddcdb4a9fda19c3f03b081f5465247d25f8f15e6e3730c227e4fc4f55e631de833c2f205244a527629d280d6377eb92e9bfee8e69d13b96f1825cb800d37e3fa244891d6c5ed295fff05395b3fdd6709d3c4b5a81368ef5bad239f16fa02d58109d2d99afd40037e35c348eb37c39c9960723d057414a3759f7b8c477342d09266932a64c67", 0xa3}, {&(0x7f00000002c0)="daf0e5fb3aa0be1d691791bf9463c8876f166e6937daf3f97564a4d171fb94651312dc604aecf4830903e04f9fc8dd1dad625c1c6f69d8f2dec0d6bc1d8ac7ec2103cc1f793f7ba307dd98cd201c56ce6877aa", 0x53}, {&(0x7f0000000340)="38197f0325a6686fb7e27781337c94e56d1247dd4155c596e3d0255d5895ffd9a54ba664bbe61fc5079b2594e1ff63c64676e0d110a55fc796f79d6d7b8ee5e309d359bfb983492f2d862d925482f6d4c2c847fb52e60b2bb5fc93109d906593705f5b46fa83f1e5da53d6a8b9fea95681b20256c1ca5e6d85a71a13272cb169fd538084ea05090e", 0x88}, {&(0x7f0000000400)="a03e972e43c27d62ddf8042f01803e86c8cfc7c94da527d51ea2c4b28e68d964bfe49b85a9c7f12a4bd959e54b0ee27e8d1d55ac98875c2225f9ea2439ffe730627c5735ea803439414e9e05e4f266706cf3599e7ec08f6dafccbcc25e30c1056453a9b5e291900d38bec6559e", 0x6d}, {&(0x7f0000000480)="5c31fb4fa95fe87f9a5198a500868a613c97c02ea26cc201f0fe365a117dafa3452e6e28314490f24b75e2066203fe7db81a630f", 0x34}, {&(0x7f00000004c0)="db944240aee16622f121d2080ebb7b6e0b150b17c0c88955d70dd5f31fc65396481a8546560ce29ccec75928615f71f66b7b4ac80216857213b192d97c0c550303c195e29860f3f6ce7ce7522911235e8e4df59be3225dc1b03a678d502e8ff645def32235cc358c25bdf624c80cc7ffad832f3daa56631d67932c47b25b376515648774ff497feb361dc0b819c54b0c7a47b8382c7b4bff3613401a2c1c36c3a87ca62f791af3d12122d11c848dfb1e61d3f1229f3dc74e9bfe1f70936814c7b33d070e06fab82879c9dc88d7be09fac3b38425764af11cd919576c9c0dc6", 0xdf}], 0x7}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x00\x00\x06)\x00\xfc\xcc', @ifru_flags}) connect$inet6(0xffffffffffffffff, 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x100) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 14:34:17 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100001890e, &(0x7f0000000040)="c0dca5055e0bcfec7be0700f6b35b6155feedfe3ca977800d64ee005101e349140ee8fb4973726138b952ac1ac3da8688536e005dd11bfab") r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x5}) mq_timedreceive(r0, &(0x7f0000000000)=""/24, 0x282, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x1, 0x0) 14:34:17 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCCONS(r0, 0x541d) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000040)={0x0, @speck128}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000008880)='net/connector\x00') bind$ax25(r2, &(0x7f00000088c0)={{0x3, @default, 0x6}, [@null, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null]}, 0x48) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000180)={0x4, 0x10000}) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000140)=0x40) 14:34:17 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@dev, 0x0, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000200)=@dstopts, 0x8) r1 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x2, 0x2) syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$rds(r1, &(0x7f0000000140)={0x2, 0x4e22, @local}, 0x10) close(r0) [ 168.241843] kobject: 'loop3' (ffff8880a4a7f260): kobject_uevent_env [ 168.247044] kobject: 'holders': free name [ 168.253545] kobject: 'loop3' (ffff8880a4a7f260): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 168.267324] kobject: 'loop1p1' (ffff88805d264058): kobject_uevent_env [ 168.268020] kobject: 'loop0' (ffff8880a498cee0): kobject_uevent_env [ 168.277513] kobject: 'loop1p1' (ffff88805d264058): fill_kobj_path: path = '/devices/virtual/block/loop1/loop1p1' [ 168.280957] kobject: 'loop0' (ffff8880a498cee0): fill_kobj_path: path = '/devices/virtual/block/loop0' 14:34:17 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@dev, 0x0, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000200)=@dstopts, 0x8) r1 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x2, 0x2) syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$rds(r1, &(0x7f0000000140)={0x2, 0x4e22, @local}, 0x10) close(r0) [ 168.320659] kobject: 'loop4' (ffff8880a4ad92e0): kobject_uevent_env [ 168.330832] kobject: '©' (ffff8880a533b470): kobject_add_internal: parent: 'net', set: 'devices' [ 168.345772] kobject: '©' (ffff8880a533b470): kobject_uevent_env [ 168.351929] kobject: 'loop1p1' (ffff88805d264058): kobject_cleanup, parent (null) [ 168.351934] kobject: 'loop1p1' (ffff88805d264058): calling ktype release 14:34:17 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100001890e, &(0x7f0000000040)="c0dca5055e0bcfec7be0700f6b35b6155feedfe3ca977800d64ee005101e349140ee8fb4973726138b952ac1ac3da8688536e005dd11bfab") r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x5}) mq_timedreceive(r0, &(0x7f0000000000)=""/24, 0x282, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x1, 0x0) 14:34:17 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@dev, 0x0, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000200)=@dstopts, 0x8) r1 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x2, 0x2) syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$rds(r1, &(0x7f0000000140)={0x2, 0x4e22, @local}, 0x10) close(r0) [ 168.351966] kobject: 'loop1p1': free name [ 168.354108] kobject: 'loop4' (ffff8880a4ad92e0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 168.372376] kobject: '©' (ffff8880a533b470): fill_kobj_path: path = '/devices/virtual/net/©' [ 168.399484] kobject: 'kvm' (ffff888219f935d0): kobject_uevent_env [ 168.406475] kobject: 'kvm' (ffff888219f935d0): fill_kobj_path: path = '/devices/virtual/misc/kvm' 14:34:17 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100001890e, &(0x7f0000000040)="c0dca5055e0bcfec7be0700f6b35b6155feedfe3ca977800d64ee005101e349140ee8fb4973726138b952ac1ac3da8688536e005dd11bfab") r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x5}) mq_timedreceive(r0, &(0x7f0000000000)=""/24, 0x282, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x1, 0x0) 14:34:17 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@dev, 0x0, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000200)=@dstopts, 0x8) r1 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x2, 0x2) syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$rds(r1, &(0x7f0000000140)={0x2, 0x4e22, @local}, 0x10) close(r0) [ 168.409226] kobject: 'queues' (ffff888099067348): kobject_add_internal: parent: '©', set: '' [ 168.427306] kobject: 'loop3' (ffff8880a4a7f260): kobject_uevent_env [ 168.439046] kobject: 'queues' (ffff888099067348): kobject_uevent_env [ 168.450484] kobject: 'queues' (ffff888099067348): kobject_uevent_env: filter function caused the event to drop! [ 168.457392] kobject: 'kvm' (ffff888219f935d0): kobject_uevent_env 14:34:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="c0dca5055e0bcfec7be0700f6b35b6155feedfe3ca977800d64ee005101e349140ee8fb4973726138b952ac1ac3da8688536e005dd11bfab") r1 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x5}) mq_timedreceive(r1, &(0x7f0000000000)=""/24, 0x282, 0x0, 0x0) mq_timedsend(r1, 0x0, 0x0, 0x1, 0x0) [ 168.469389] kobject: 'kvm' (ffff888219f935d0): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 168.478767] kobject: 'loop3' (ffff8880a4a7f260): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 168.481400] kobject: 'rx-0' (ffff88809e62d9d0): kobject_add_internal: parent: 'queues', set: 'queues' [ 168.502504] kobject: 'kvm' (ffff888219f935d0): kobject_uevent_env [ 168.502732] kobject: 'rx-0' (ffff88809e62d9d0): kobject_uevent_env [ 168.508795] kobject: 'kvm' (ffff888219f935d0): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 168.524720] kobject: 'rx-0' (ffff88809e62d9d0): fill_kobj_path: path = '/devices/virtual/net/©/queues/rx-0' [ 168.525323] kobject: 'loop0' (ffff8880a498cee0): kobject_uevent_env [ 168.535326] kobject: 'tx-0' (ffff888094956a58): kobject_add_internal: parent: 'queues', set: 'queues' [ 168.568431] kobject: 'loop0' (ffff8880a498cee0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 168.569246] kobject: 'tx-0' (ffff888094956a58): kobject_uevent_env [ 168.578639] kobject: 'loop2' (ffff8880a4a391e0): kobject_uevent_env [ 168.584730] kobject: 'tx-0' (ffff888094956a58): fill_kobj_path: path = '/devices/virtual/net/©/queues/tx-0' [ 168.593173] kobject: 'loop2' (ffff8880a4a391e0): fill_kobj_path: path = '/devices/virtual/block/loop2' 14:34:17 executing program 1: mremap(&(0x7f000000d000/0x2000)=nil, 0xfffffffffffffe74, 0x1000, 0x0, &(0x7f0000007000/0x1000)=nil) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x40000, 0x0) socket$rxrpc(0x21, 0x2, 0xa) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{0x20, 'wlan1'}, {0x20, '/dev/vcs\x00'}, {0x20, 'securityuser-'}, {0x20, '/dev/vcs\x00'}], 0xa, "24e30a129857186c5f4f7817de28a53e"}, 0x43) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 14:34:17 executing program 3: shmctl$SHM_LOCK(0x0, 0xb) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000180)={0xfffffff, 0xffffffffffffffe1, 0x0, [], &(0x7f0000000140)={0x9e091f, 0x4, [], @p_u32=&(0x7f0000000100)=0x80000001}}) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f00000000c0)={0x17, 0x6f, &(0x7f0000000040)="0c11d74df7b8a00a402dc26afb92d0eddbfcf68f1a955f5d15a9ede78352cbf76eabcc41c7fc678a75c034fea2fa5c8e0898daf188f37c757470d67f50848a5ca8918d84c55b1ef1ef6ec590510b02bc34f7825c63dc157b1f830fae72fa58e2dcae8630c74ffd7f4ddee024723db8"}) shmctl$SHM_UNLOCK(0x0, 0xc) 14:34:17 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@dev, 0x0, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000200)=@dstopts, 0x8) syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x2, 0x2) syz_init_net_socket$netrom(0x6, 0x5, 0x0) close(r0) 14:34:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="c0dca5055e0bcfec7be0700f6b35b6155feedfe3ca977800d64ee005101e349140ee8fb4973726138b952ac1ac3da8688536e005dd11bfab") r1 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x5}) mq_timedreceive(r1, &(0x7f0000000000)=""/24, 0x282, 0x0, 0x0) mq_timedsend(r1, 0x0, 0x0, 0x1, 0x0) 14:34:17 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000180)={0x70, 0x0, 0xc, 0x7, 0xba}) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7, 0x200001) bind$isdn(r1, &(0x7f0000000040)={0x22, 0x80000001, 0x2, 0x9, 0x3}, 0x6) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000080)={&(0x7f0000ffd000/0x3000)=nil, 0x0, 0x5, 0x6, &(0x7f0000ffd000/0x3000)=nil, 0x10000}) 14:34:17 executing program 4: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) lseek(r0, 0x800000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x8) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYRESDEC], 0xc7d2) write$P9_RSYMLINK(r0, &(0x7f0000000000)={0x14, 0x11, 0x2, {0x2, 0x4, 0x6}}, 0x14) syz_init_net_socket$llc(0x1a, 0x3, 0x0) fallocate(r0, 0x3, 0x800004, 0x28020001) faccessat(r0, &(0x7f0000000040)='./bus\x00', 0x1e8, 0x0) [ 168.618327] kobject: 'loop0' (ffff8880a498cee0): kobject_uevent_env [ 168.626264] kobject: 'kvm' (ffff888219f935d0): kobject_uevent_env [ 168.632847] kobject: 'kvm' (ffff888219f935d0): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 168.636265] kobject: 'loop0' (ffff8880a498cee0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 168.655007] kobject: 'loop0' (ffff8880a498cee0): kobject_uevent_env [ 168.662090] kobject: 'loop0' (ffff8880a498cee0): fill_kobj_path: path = '/devices/virtual/block/loop0' 14:34:17 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@dev, 0x0, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000200)=@dstopts, 0x8) syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x2, 0x2) close(r0) 14:34:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="c0dca5055e0bcfec7be0700f6b35b6155feedfe3ca977800d64ee005101e349140ee8fb4973726138b952ac1ac3da8688536e005dd11bfab") r1 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x5}) mq_timedreceive(r1, &(0x7f0000000000)=""/24, 0x282, 0x0, 0x0) mq_timedsend(r1, 0x0, 0x0, 0x1, 0x0) [ 168.670290] syz-executor.1 (7786): attempted to duplicate a private mapping with mremap. This is not supported. [ 168.688006] kobject: 'loop0' (ffff8880a498cee0): kobject_uevent_env 14:34:17 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000000)={0x7fff}, 0x0, 0x8) clone(0x802002001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0xc002, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000080)={0xc7, @broadcast}) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x6) 14:34:17 executing program 3: r0 = shmget(0x2, 0x1000, 0x78000001, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) shmctl$SHM_LOCK(0x0, 0xb) shmctl$SHM_UNLOCK(0x0, 0xc) 14:34:17 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@dev, 0x0, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000200)=@dstopts, 0x8) close(r0) 14:34:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100001890e, 0x0) r1 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x5}) mq_timedreceive(r1, &(0x7f0000000000)=""/24, 0x282, 0x0, 0x0) mq_timedsend(r1, 0x0, 0x0, 0x1, 0x0) 14:34:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x200000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r3, 0x40045730, &(0x7f00000000c0)=0x5) ioctl$KVM_NMI(r2, 0xae9a) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000100)={[0x0, 0x0, 0x5000], 0x0, 0x20}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000000)) [ 168.720827] kobject: 'loop0' (ffff8880a498cee0): fill_kobj_path: path = '/devices/virtual/block/loop0' 14:34:17 executing program 3: shmctl$SHM_LOCK(0x0, 0xb) shmctl$SHM_UNLOCK(0x0, 0xc) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x28) uselib(&(0x7f0000000240)='./file0\x00') getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000280)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], &(0x7f0000000180)=0x93) pwrite64(r0, &(0x7f00000001c0)="27e7a37afba46480222bfc2c0bd34b84189b505649549d52bb8d193c3571c0e36dec4a17a3f5e085641abdd3f071e6df800a14d3f462ffebd8b7e8f65bae7214618b4f32bbdcf61e84ab8bb4f0bd51f02f1b30941b8a0584b1e86c6957e21ac100062e8b0945b28f2bfda55101", 0x6d, 0x0) 14:34:17 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000040)=0xe8) setuid(r3) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) syz_open_dev$dspn(0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x6000000000000000) 14:34:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100001890e, 0x0) r1 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x5}) mq_timedreceive(r1, &(0x7f0000000000)=""/24, 0x282, 0x0, 0x0) mq_timedsend(r1, 0x0, 0x0, 0x1, 0x0) 14:34:18 executing program 2: syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0xffffffffffffffff, 0x400) r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = dup2(r0, r0) pread64(r0, &(0x7f0000000000)=""/20, 0x14, 0x9) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000080)={0x2, {{0x2, 0x4e23, @empty}}}, 0x88) getsockopt$inet6_int(r1, 0x28, 0x1, 0x0, &(0x7f0000000040)=0xffffffff00000007) [ 168.768643] kobject: 'loop3' (ffff8880a4a7f260): kobject_uevent_env [ 168.805266] kobject: 'loop3' (ffff8880a4a7f260): fill_kobj_path: path = '/devices/virtual/block/loop3' 14:34:18 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@dev, 0x0, 0x0, 0xff, 0x1}, 0x20) close(r0) 14:34:18 executing program 3: shmctl$SHM_LOCK(0x0, 0xb) shmctl$SHM_UNLOCK(0x0, 0xc) r0 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_LOCK(r0, 0xb) 14:34:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100001890e, 0x0) r1 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x5}) mq_timedreceive(r1, &(0x7f0000000000)=""/24, 0x282, 0x0, 0x0) mq_timedsend(r1, 0x0, 0x0, 0x1, 0x0) [ 168.816712] kobject: 'kvm' (ffff888219f935d0): kobject_uevent_env [ 168.829689] kobject: 'loop0' (ffff8880a498cee0): kobject_uevent_env [ 168.840710] kobject: 'loop0' (ffff8880a498cee0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 168.843837] kobject: 'kvm' (ffff888219f935d0): fill_kobj_path: path = '/devices/virtual/misc/kvm' 14:34:18 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) close(r0) 14:34:18 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004040)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@rthdr={{0x18}}], 0x18}}], 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x6, &(0x7f0000000600)=[{