[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 35.125917] kauditd_printk_skb: 8 callbacks suppressed [ 35.125928] audit: type=1800 audit(1550209859.351:29): pid=7433 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 35.156720] audit: type=1800 audit(1550209859.361:30): pid=7433 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.123' (ECDSA) to the list of known hosts. 2019/02/15 05:51:10 fuzzer started 2019/02/15 05:51:12 dialing manager at 10.128.0.26:45293 2019/02/15 05:51:12 syscalls: 1 2019/02/15 05:51:12 code coverage: enabled 2019/02/15 05:51:12 comparison tracing: enabled 2019/02/15 05:51:12 extra coverage: extra coverage is not supported by the kernel 2019/02/15 05:51:12 setuid sandbox: enabled 2019/02/15 05:51:12 namespace sandbox: enabled 2019/02/15 05:51:12 Android sandbox: /sys/fs/selinux/policy does not exist 2019/02/15 05:51:12 fault injection: enabled 2019/02/15 05:51:12 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/02/15 05:51:12 net packet injection: enabled 2019/02/15 05:51:12 net device setup: enabled 05:52:59 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f0000bdd000/0x1000)=nil, 0x1000, 0x0) syzkaller login: [ 155.541732] IPVS: ftp: loaded support on port[0] = 21 05:52:59 executing program 1: syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) [ 155.639098] chnl_net:caif_netlink_parms(): no params data found [ 155.715976] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.738146] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.745510] device bridge_slave_0 entered promiscuous mode [ 155.752571] IPVS: ftp: loaded support on port[0] = 21 [ 155.764691] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.771986] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.779734] device bridge_slave_1 entered promiscuous mode [ 155.818833] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 155.842525] bond0: Enslaving bond_slave_1 as an active interface with an up link 05:53:00 executing program 2: clone(0x200, 0x0, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000002c0)="65260f18800000000064ff0941c3c4e2c9975842c4c27d794e00c401fa2cce3e0f1110c442019dccd3196ea3") creat(&(0x7f0000000000)='./file1\x00', 0x91) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) execve(&(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x108) dup2(r0, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(r3, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f0000000440)={0x1c, 0x0, 0xc34, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0xc0) [ 155.872195] team0: Port device team_slave_0 added [ 155.892058] team0: Port device team_slave_1 added [ 155.992827] IPVS: ftp: loaded support on port[0] = 21 [ 156.020933] device hsr_slave_0 entered promiscuous mode 05:53:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 156.078280] device hsr_slave_1 entered promiscuous mode [ 156.149272] IPVS: ftp: loaded support on port[0] = 21 [ 156.169254] chnl_net:caif_netlink_parms(): no params data found [ 156.250479] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.256910] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.264828] device bridge_slave_0 entered promiscuous mode [ 156.273256] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.279732] bridge0: port 2(bridge_slave_1) entered forwarding state [ 156.286624] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.293009] bridge0: port 1(bridge_slave_0) entered forwarding state [ 156.312295] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.318907] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.326658] device bridge_slave_1 entered promiscuous mode 05:53:00 executing program 4: mknod(&(0x7f0000000100)='./bus\x00', 0x8000, 0x86134) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) write(0xffffffffffffffff, 0x0, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) [ 156.436447] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 156.493510] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 156.506890] IPVS: ftp: loaded support on port[0] = 21 [ 156.513108] 8021q: adding VLAN 0 to HW filter on device bond0 [ 156.555063] chnl_net:caif_netlink_parms(): no params data found [ 156.591018] chnl_net:caif_netlink_parms(): no params data found [ 156.608372] team0: Port device team_slave_0 added [ 156.613391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 156.636121] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.656740] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.667164] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 156.682578] team0: Port device team_slave_1 added 05:53:00 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x20011, r0, 0x10000000000) [ 156.706988] 8021q: adding VLAN 0 to HW filter on device team0 [ 156.780697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 156.790047] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 156.800675] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.807038] bridge0: port 1(bridge_slave_0) entered forwarding state [ 156.835246] IPVS: ftp: loaded support on port[0] = 21 [ 156.880511] device hsr_slave_0 entered promiscuous mode [ 156.928459] device hsr_slave_1 entered promiscuous mode [ 156.988294] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.994634] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.001673] device bridge_slave_0 entered promiscuous mode [ 157.010127] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.016518] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.023678] device bridge_slave_1 entered promiscuous mode [ 157.039325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 157.047096] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 157.056182] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.062585] bridge0: port 2(bridge_slave_1) entered forwarding state [ 157.069949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 157.085058] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.092033] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.099368] device bridge_slave_0 entered promiscuous mode [ 157.105871] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.112313] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.119519] device bridge_slave_1 entered promiscuous mode [ 157.131963] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 157.146357] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 157.174756] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 157.185238] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 157.192985] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 157.200942] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 157.208827] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 157.221101] team0: Port device team_slave_0 added [ 157.227502] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 157.254987] team0: Port device team_slave_1 added [ 157.279115] team0: Port device team_slave_0 added [ 157.287694] team0: Port device team_slave_1 added [ 157.298711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 157.306275] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 157.329756] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 157.337247] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 157.345087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 157.352759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 157.403139] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 157.471417] device hsr_slave_0 entered promiscuous mode [ 157.508478] device hsr_slave_1 entered promiscuous mode [ 157.599767] device hsr_slave_0 entered promiscuous mode [ 157.658385] device hsr_slave_1 entered promiscuous mode [ 157.762258] chnl_net:caif_netlink_parms(): no params data found [ 157.773851] chnl_net:caif_netlink_parms(): no params data found [ 157.785960] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 157.888279] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.894658] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.904842] device bridge_slave_0 entered promiscuous mode [ 157.912225] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.919009] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.926099] device bridge_slave_1 entered promiscuous mode [ 157.936355] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.943071] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.950459] device bridge_slave_0 entered promiscuous mode 05:53:02 executing program 0: [ 158.004716] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 158.013218] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.020306] bridge0: port 2(bridge_slave_1) entered disabled state [ 158.030675] device bridge_slave_1 entered promiscuous mode [ 158.042259] 8021q: adding VLAN 0 to HW filter on device bond0 05:53:02 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20012, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) madvise(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xb) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x4, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00c@@'], 0x0, 0x0, 0x0}) [ 158.063997] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 158.123353] binder_alloc: 7626: binder_alloc_buf failed to map page at 20001000 in userspace [ 158.135407] 8021q: adding VLAN 0 to HW filter on device bond0 [ 158.141414] binder: 7626:7627 transaction failed 29201/-12, size 0-0 line 3035 [ 158.144894] binder_alloc: binder_alloc_mmap_handler: 7626 20001000-20004000 already mapped failed -16 [ 158.155084] team0: Port device team_slave_0 added [ 158.165883] binder: BINDER_SET_CONTEXT_MGR already set 05:53:02 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x5) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x0, 0x0, &(0x7f0000000140)) [ 158.177394] team0: Port device team_slave_1 added [ 158.182332] binder: 7626:7627 ioctl 40046207 0 returned -16 [ 158.201448] binder: undelivered TRANSACTION_ERROR: 29201 [ 158.207371] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 158.215009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 05:53:02 executing program 0: syz_emit_ethernet(0x28, &(0x7f0000000000)={@random="b3db0e43fa0f", @local, [], {@ipv6={0x86dd, {0x0, 0x6, "5ea8b3", 0x10, 0x0, 0x0, @local, @mcast2, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "13934f", 0x0, "ecefff"}}}}}}}, 0x0) [ 158.232735] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 158.240080] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 158.254886] 8021q: adding VLAN 0 to HW filter on device team0 [ 158.264258] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 158.279577] bond0: Enslaving bond_slave_1 as an active interface with an up link 05:53:02 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x40000000000200, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f0000001640)=""/247, 0xffffffcc}], 0x1, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x611, 0x0) fcntl$setstatus(r1, 0x4, 0x80) pwritev(r1, &(0x7f00000003c0), 0x273, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x5, 0x10, r0, 0x0) r2 = socket$inet6(0x18, 0x8001, 0x0) bind(r2, &(0x7f0000000200)=@in6, 0xc) ioctl$KDMKTONE(0xffffffffffffffff, 0x20004b08, 0x0) connect$inet6(r2, &(0x7f0000000000), 0xc) 05:53:02 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0xe, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) [ 158.310727] device hsr_slave_0 entered promiscuous mode 05:53:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, r1, 0x509, 0x70bd27, 0x0, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x0, @link='syz1\x00'}}}}, 0x68}}, 0x0) [ 158.353631] device hsr_slave_1 entered promiscuous mode [ 158.400595] 8021q: adding VLAN 0 to HW filter on device team0 [ 158.420018] 8021q: adding VLAN 0 to HW filter on device bond0 [ 158.441530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 158.449838] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 158.457407] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.463793] bridge0: port 1(bridge_slave_0) entered forwarding state [ 158.471560] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 158.479702] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 158.487373] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.493784] bridge0: port 1(bridge_slave_0) entered forwarding state [ 158.500726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 158.508551] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 158.516196] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.522571] bridge0: port 2(bridge_slave_1) entered forwarding state [ 158.529501] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 158.536505] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 158.548532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 158.556193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 158.564251] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.570616] bridge0: port 2(bridge_slave_1) entered forwarding state [ 158.577498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 158.586026] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 158.614912] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 158.624860] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 158.639602] team0: Port device team_slave_0 added [ 158.645879] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 158.653895] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 158.661694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 158.669424] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 158.676981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 158.684677] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 158.692421] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 158.699997] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 158.707332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 158.714941] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 158.722332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 158.730237] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 158.738121] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 158.745131] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 158.752264] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 158.770674] team0: Port device team_slave_1 added [ 158.775982] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 158.783867] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 158.791683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 158.799529] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 158.813357] 8021q: adding VLAN 0 to HW filter on device team0 [ 158.826386] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 158.838271] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 158.847355] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 158.855364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 158.862432] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 158.869928] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 158.879149] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 158.916151] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 158.923872] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 158.931477] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.937823] bridge0: port 1(bridge_slave_0) entered forwarding state [ 158.945327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 159.000797] device hsr_slave_0 entered promiscuous mode [ 159.048568] device hsr_slave_1 entered promiscuous mode [ 159.109477] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 159.115818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 159.123726] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 159.131578] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.137916] bridge0: port 2(bridge_slave_1) entered forwarding state [ 159.156772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 159.178386] 8021q: adding VLAN 0 to HW filter on device bond0 [ 159.196940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 159.204612] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 159.213194] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 159.222667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 159.230839] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 159.238514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 159.245371] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 159.261428] 8021q: adding VLAN 0 to HW filter on device team0 [ 159.267588] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 159.278861] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 159.291380] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 159.301458] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 05:53:03 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0x83, 0xec2, 0x4000000000006}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000080)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x1}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001180)={0xa, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x80000001, 0x1000, &(0x7f0000000180)=""/4096, 0x41000, 0x1, [], 0x0, 0xa}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) [ 159.309188] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 159.316931] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 159.325109] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 159.333081] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 159.392284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 159.426996] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 159.437647] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.444044] bridge0: port 1(bridge_slave_0) entered forwarding state [ 159.451414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 159.459283] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 159.466767] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.473145] bridge0: port 2(bridge_slave_1) entered forwarding state [ 159.480424] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 159.488226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 159.496951] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 159.513259] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 159.521139] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 159.529108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 159.539130] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 159.546886] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 159.582059] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 159.612341] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 159.622739] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 159.635892] 8021q: adding VLAN 0 to HW filter on device bond0 [ 159.642380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 159.650524] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 159.657901] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 159.665562] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 159.673457] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 159.695273] 8021q: adding VLAN 0 to HW filter on device team0 [ 159.711746] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 159.722997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 159.733301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 159.740586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 159.748703] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 159.756168] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.762521] bridge0: port 1(bridge_slave_0) entered forwarding state [ 159.769631] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 159.784180] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 05:53:04 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x82800, 0x0) io_setup(0x2, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f00000008c0)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 05:53:04 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) [ 159.808932] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 159.816785] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.823167] bridge0: port 2(bridge_slave_1) entered forwarding state [ 159.861772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 159.880915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 159.918004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 159.925490] [ 159.925493] ======================================================== [ 159.925496] WARNING: possible irq lock inversion dependency detected [ 159.925502] 5.0.0-rc6+ #71 Not tainted [ 159.925504] -------------------------------------------------------- [ 159.925509] kworker/1:3/7614 just changed the state of lock: [ 159.925512] 00000000e5468ae1 (&(&ctx->ctx_lock)->rlock){..-.}, at: free_ioctx_users+0x2d/0x4a0 [ 159.925533] but this lock took another, SOFTIRQ-unsafe lock in the past: [ 159.925535] (&fiq->waitq){+.+.} [ 159.925551] [ 159.925551] [ 159.925551] and interrupts could create inverse lock ordering between them. [ 159.925551] [ 159.925554] [ 159.925554] other info that might help us debug this: [ 159.925556] Possible interrupt unsafe locking scenario: [ 159.925556] [ 159.925558] CPU0 CPU1 [ 159.925560] ---- ---- [ 159.925562] lock(&fiq->waitq); [ 159.925567] local_irq_disable(); [ 159.925568] lock(&(&ctx->ctx_lock)->rlock); [ 159.925573] lock(&fiq->waitq); [ 159.925577] [ 159.925578] lock(&(&ctx->ctx_lock)->rlock); [ 159.925583] [ 159.925583] *** DEADLOCK *** [ 159.925583] [ 159.925589] 6 locks held by kworker/1:3/7614: [ 159.925591] #0: 0000000001db0431 ((wq_completion)"events"){+.+.}, at: process_one_work+0x87e/0x1790 [ 159.925611] #1: 00000000b3ad289d ((linkwatch_work).work){+.+.}, at: process_one_work+0x8b4/0x1790 [ 159.925627] #2: 000000008ceafcff (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 159.925643] #3: 0000000054d2b8a2 (console_lock){+.+.}, at: vprintk_emit+0x267/0x6d0 [ 159.925660] #4: 000000001b76b359 (rcu_callback){....}, at: rcu_process_callbacks+0xa0d/0x1390 [ 159.925677] #5: 00000000d3eb959f (rcu_read_lock_sched){....}, at: percpu_ref_switch_to_atomic_rcu+0x1b8/0x520 [ 159.925707] [ 159.925707] the shortest dependencies between 2nd lock and 1st lock: [ 159.925713] -> (&fiq->waitq){+.+.} { [ 159.925722] HARDIRQ-ON-W at: [ 159.925733] lock_acquire+0x16f/0x3f0 [ 159.925742] _raw_spin_lock+0x2f/0x40 [ 159.925751] flush_bg_queue+0x1f3/0x3c0 [ 159.925761] fuse_request_queue_background+0x2d1/0x580 [ 159.925770] fuse_request_send_background+0x58/0x120 [ 159.925779] cuse_channel_open+0x5ba/0x830 [ 159.925787] misc_open+0x398/0x4c0 [ 159.925795] chrdev_open+0x247/0x6b0 [ 159.925815] do_dentry_open+0x47d/0x1130 [ 159.925822] vfs_open+0xa0/0xd0 [ 159.925831] path_openat+0x10d7/0x4690 [ 159.925840] do_filp_open+0x1a1/0x280 [ 159.925847] do_sys_open+0x3fe/0x5d0 [ 159.925855] __ia32_compat_sys_openat+0x98/0xf0 [ 159.925865] do_fast_syscall_32+0x281/0xc98 [ 159.925874] entry_SYSENTER_compat+0x70/0x7f [ 159.925877] SOFTIRQ-ON-W at: [ 159.925886] lock_acquire+0x16f/0x3f0 [ 159.925893] _raw_spin_lock+0x2f/0x40 [ 159.925901] flush_bg_queue+0x1f3/0x3c0 [ 159.925910] fuse_request_queue_background+0x2d1/0x580 [ 159.925919] fuse_request_send_background+0x58/0x120 [ 159.925927] cuse_channel_open+0x5ba/0x830 [ 159.925933] misc_open+0x398/0x4c0 [ 159.925940] chrdev_open+0x247/0x6b0 [ 159.925949] do_dentry_open+0x47d/0x1130 [ 159.925956] vfs_open+0xa0/0xd0 [ 159.925964] path_openat+0x10d7/0x4690 [ 159.925973] do_filp_open+0x1a1/0x280 [ 159.925980] do_sys_open+0x3fe/0x5d0 [ 159.925987] __ia32_compat_sys_openat+0x98/0xf0 [ 159.925996] do_fast_syscall_32+0x281/0xc98 [ 159.926004] entry_SYSENTER_compat+0x70/0x7f [ 159.926007] INITIAL USE at: [ 159.926015] lock_acquire+0x16f/0x3f0 [ 159.926022] _raw_spin_lock+0x2f/0x40 [ 159.926030] flush_bg_queue+0x1f3/0x3c0 [ 159.926039] fuse_request_queue_background+0x2d1/0x580 [ 159.926047] fuse_request_send_background+0x58/0x120 [ 159.926055] cuse_channel_open+0x5ba/0x830 [ 159.926062] misc_open+0x398/0x4c0 [ 159.926068] chrdev_open+0x247/0x6b0 [ 159.926077] do_dentry_open+0x47d/0x1130 [ 159.926084] vfs_open+0xa0/0xd0 [ 159.926093] path_openat+0x10d7/0x4690 [ 159.926101] do_filp_open+0x1a1/0x280 [ 159.926108] do_sys_open+0x3fe/0x5d0 [ 159.926116] __ia32_compat_sys_openat+0x98/0xf0 [ 159.926125] do_fast_syscall_32+0x281/0xc98 [ 159.926133] entry_SYSENTER_compat+0x70/0x7f [ 159.926135] } [ 159.926146] ... key at: [] __key.43075+0x0/0x40 [ 159.926148] ... acquired at: [ 159.926155] _raw_spin_lock+0x2f/0x40 [ 159.926162] io_submit_one+0xedf/0x1cf0 [ 159.926171] __ia32_compat_sys_io_submit+0x1be/0x570 [ 159.926179] do_fast_syscall_32+0x281/0xc98 [ 159.926187] entry_SYSENTER_compat+0x70/0x7f [ 159.926189] [ 159.926191] -> (&(&ctx->ctx_lock)->rlock){..-.} { [ 159.926200] IN-SOFTIRQ-W at: [ 159.926209] lock_acquire+0x16f/0x3f0 [ 159.926216] _raw_spin_lock_irq+0x60/0x80 [ 159.926224] free_ioctx_users+0x2d/0x4a0 [ 159.926233] percpu_ref_switch_to_atomic_rcu+0x3e7/0x520 [ 159.926241] rcu_process_callbacks+0x928/0x1390 [ 159.926249] __do_softirq+0x266/0x95a [ 159.926258] irq_exit+0x180/0x1d0 [ 159.926266] smp_apic_timer_interrupt+0x14a/0x570 [ 159.926274] apic_timer_interrupt+0xf/0x20 [ 159.926283] console_unlock+0xc0d/0x10a0 [ 159.926291] vprintk_emit+0x280/0x6d0 [ 159.926299] vprintk_default+0x28/0x30 [ 159.926317] vprintk_func+0x7e/0x189 [ 159.926324] printk+0xba/0xed [ 159.926335] addrconf_notify.cold+0x2c/0x84 [ 159.926344] notifier_call_chain+0xc7/0x240 [ 159.926353] raw_notifier_call_chain+0x2e/0x40 [ 159.926362] call_netdevice_notifiers_info+0x3f/0x90 [ 159.926370] netdev_state_change+0x10d/0x140 [ 159.926379] linkwatch_do_dev+0xf7/0x170 [ 159.926387] __linkwatch_run_queue+0x2cd/0x570 [ 159.926395] linkwatch_event+0x4e/0x70 [ 159.926404] process_one_work+0x98e/0x1790 [ 159.926412] worker_thread+0x98/0xe40 [ 159.926419] kthread+0x357/0x430 [ 159.926427] ret_from_fork+0x3a/0x50 [ 159.926429] INITIAL USE at: [ 159.926438] lock_acquire+0x16f/0x3f0 [ 159.926445] _raw_spin_lock_irq+0x60/0x80 [ 159.926452] io_submit_one+0xeb6/0x1cf0 [ 159.926460] __ia32_compat_sys_io_submit+0x1be/0x570 [ 159.926469] do_fast_syscall_32+0x281/0xc98 [ 159.926477] entry_SYSENTER_compat+0x70/0x7f [ 159.926479] } [ 159.926488] ... key at: [] __key.51970+0x0/0x40 [ 159.926490] ... acquired at: [ 159.926497] mark_lock+0x427/0x1380 [ 159.926505] __lock_acquire+0x128f/0x4700 [ 159.926512] lock_acquire+0x16f/0x3f0 [ 159.926519] _raw_spin_lock_irq+0x60/0x80 [ 159.926526] free_ioctx_users+0x2d/0x4a0 [ 159.926535] percpu_ref_switch_to_atomic_rcu+0x3e7/0x520 [ 159.926554] rcu_process_callbacks+0x928/0x1390 [ 159.926562] __do_softirq+0x266/0x95a [ 159.926569] irq_exit+0x180/0x1d0 [ 159.926577] smp_apic_timer_interrupt+0x14a/0x570 [ 159.926595] apic_timer_interrupt+0xf/0x20 [ 159.926603] console_unlock+0xc0d/0x10a0 [ 159.926611] vprintk_emit+0x280/0x6d0 [ 159.926619] vprintk_default+0x28/0x30 [ 159.926628] vprintk_func+0x7e/0x189 [ 159.926636] printk+0xba/0xed [ 159.926644] addrconf_notify.cold+0x2c/0x84 [ 159.926653] notifier_call_chain+0xc7/0x240 [ 159.926661] raw_notifier_call_chain+0x2e/0x40 [ 159.926670] call_netdevice_notifiers_info+0x3f/0x90 [ 159.926678] netdev_state_change+0x10d/0x140 [ 159.926686] linkwatch_do_dev+0xf7/0x170 [ 159.926694] __linkwatch_run_queue+0x2cd/0x570 [ 159.926702] linkwatch_event+0x4e/0x70 [ 159.926711] process_one_work+0x98e/0x1790 [ 159.926719] worker_thread+0x98/0xe40 [ 159.926727] kthread+0x357/0x430 [ 159.926734] ret_from_fork+0x3a/0x50 [ 159.926736] [ 159.926738] [ 159.926738] stack backtrace: [ 159.926748] CPU: 1 PID: 7614 Comm: kworker/1:3 Not tainted 5.0.0-rc6+ #71 [ 159.926753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 159.926764] Workqueue: events linkwatch_event [ 159.926769] Call Trace: [ 159.926772] [ 159.926784] dump_stack+0x172/0x1f0 [ 159.926796] print_irq_inversion_bug.part.0+0x2c0/0x2cd [ 159.926806] check_usage_forwards.cold+0x20/0x29 [ 159.926826] ? check_usage_backwards+0x340/0x340 [ 159.926839] ? save_stack_trace+0x1a/0x20 [ 159.926846] ? save_trace+0xe0/0x290 [ 159.926855] mark_lock+0x427/0x1380 [ 159.926863] ? __lock_acquire+0x53b/0x4700 [ 159.926872] ? check_usage_backwards+0x340/0x340 [ 159.926881] __lock_acquire+0x128f/0x4700 [ 159.926890] ? mark_held_locks+0x100/0x100 [ 159.926902] ? mark_held_locks+0x100/0x100 [ 159.926911] ? __wake_up_common_lock+0xfe/0x190 [ 159.926922] ? mark_held_locks+0x100/0x100 [ 159.926930] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 159.926938] ? lockdep_hardirqs_on+0x19b/0x5d0 [ 159.926946] ? trace_hardirqs_on+0x67/0x230 [ 159.926956] ? kasan_check_read+0x11/0x20 [ 159.926966] lock_acquire+0x16f/0x3f0 [ 159.926974] ? free_ioctx_users+0x2d/0x4a0 [ 159.926984] _raw_spin_lock_irq+0x60/0x80 [ 159.926992] ? free_ioctx_users+0x2d/0x4a0 [ 159.927000] free_ioctx_users+0x2d/0x4a0 [ 159.927010] ? rcu_dynticks_curr_cpu_in_eqs+0x54/0xb0 [ 159.927021] percpu_ref_switch_to_atomic_rcu+0x3e7/0x520 [ 159.927030] ? percpu_ref_exit+0xd0/0xd0 [ 159.927040] rcu_process_callbacks+0x928/0x1390 [ 159.927051] ? rcu_check_gp_start_stall+0x240/0x240 [ 159.927058] ? __lock_is_held+0xb6/0x140 [ 159.927070] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 159.927080] __do_softirq+0x266/0x95a [ 159.927088] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 159.927097] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 159.927126] irq_exit+0x180/0x1d0 [ 159.927136] smp_apic_timer_interrupt+0x14a/0x570 [ 159.927146] apic_timer_interrupt+0xf/0x20 [ 159.927150] [ 159.927161] RIP: 0010:console_unlock+0xc0d/0x10a0 [ 159.927171] Code: fc ff df 48 c1 e8 03 80 3c 08 00 0f 85 49 04 00 00 48 83 3d 94 50 38 07 00 0f 84 af 02 00 00 e8 b9 af 15 00 48 8b 7d 98 57 9d <0f> 1f 44 00 00 e9 5f ff ff ff e8 a4 af 15 00 48 8b 7d 08 c7 05 56 [ 159.927176] RSP: 0018:ffff888064b5f7a8 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 [ 159.927185] RAX: ffff888064b504c0 RBX: 0000000000000200 RCX: dffffc0000000000 [ 159.927190] RDX: 0000000000000000 RSI: ffffffff815a3167 RDI: 0000000000000293 [ 159.927196] RBP: ffff888064b5f838 R08: ffff888064b504c0 R09: ffff888064b50dd8 [ 159.927201] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 159.927207] R13: ffffffff841a2590 R14: ffffffff88f81e30 R15: 0000000000006601 [ 159.927220] ? netconsole_netdev_event+0x2a0/0x2a0 [ 159.927231] ? console_unlock+0xc07/0x10a0 [ 159.927247] vprintk_emit+0x280/0x6d0 [ 159.927269] vprintk_default+0x28/0x30 [ 159.927279] vprintk_func+0x7e/0x189 [ 159.927288] ? mark_held_locks+0x100/0x100 [ 159.927298] printk+0xba/0xed [ 159.927329] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 159.927343] ? addrconf_notify+0x19bc/0x2280 [ 159.927355] addrconf_notify.cold+0x2c/0x84 [ 159.927363] ? _raw_spin_unlock_bh+0x31/0x40 [ 159.927373] ? __local_bh_enable_ip+0x15a/0x270 [ 159.927383] ? lockdep_hardirqs_on+0x415/0x5d0 [ 159.927404] ? clusterip_netdev_event+0x474/0x670 [ 159.927424] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 159.927434] ? tls_dev_event+0x118/0xa70 [ 159.927445] ? inet6_ifinfo_notify+0x150/0x150 [ 159.927455] ? tls_device_sk_destruct+0x650/0x650 [ 159.927464] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 159.927474] ? ip6mr_device_event+0x1ad/0x220 [ 159.927485] notifier_call_chain+0xc7/0x240 [ 159.927494] ? inet6_ifinfo_notify+0x150/0x150 [ 159.927503] ? notifier_call_chain+0xc7/0x240 [ 159.927515] raw_notifier_call_chain+0x2e/0x40 [ 159.927526] call_netdevice_notifiers_info+0x3f/0x90 [ 159.927558] netdev_state_change+0x10d/0x140 [ 159.927567] ? arch_local_irq_restore+0x60/0x60 [ 159.927579] linkwatch_do_dev+0xf7/0x170 [ 159.927588] __linkwatch_run_queue+0x2cd/0x570 [ 159.927598] ? linkwatch_schedule_work+0x170/0x170 [ 159.927618] ? check_preemption_disabled+0x48/0x290 [ 159.927640] linkwatch_event+0x4e/0x70 [ 159.927652] process_one_work+0x98e/0x1790 [ 159.927675] ? pwq_dec_nr_in_flight+0x320/0x320 [ 159.927683] ? lock_acquire+0x16f/0x3f0 [ 159.927696] worker_thread+0x98/0xe40 [ 159.927704] ? trace_hardirqs_on+0x67/0x230 [ 159.927716] kthread+0x357/0x430 [ 159.927725] ? process_one_work+0x1790/0x1790 [ 159.927735] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 159.927744] ret_from_fork+0x3a/0x50 [ 159.969665] kobject: 'loop5' (000000001d122b75): kobject_uevent_env [ 159.975645] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 159.977978] kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 159.991883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 160.696399] kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env [ 160.702976] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 160.710463] kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 160.711029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 161.278291] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 161.295443] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 161.302444] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 161.302814] kobject: 'loop0' (000000008a1a76be): kobject_uevent_env [ 161.310508] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 161.324008] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 161.331023] kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 161.360273] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 161.366392] kobject: 'vlan0' (000000006f61864c): kobject_add_internal: parent: 'mesh', set: '' 05:53:05 executing program 4: mknod(&(0x7f0000000100)='./bus\x00', 0x8000, 0x86134) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) write(0xffffffffffffffff, 0x0, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='$\\#&\x00', 0xfffffffffffffffe) 05:53:05 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') preadv(r1, &(0x7f00000017c0), 0x199, 0x67) 05:53:05 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x20011, r0, 0x10000000000) 05:53:05 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x20011, r0, 0x10000000000) 05:53:05 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x5) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, &(0x7f0000000080)=0x6cf) [ 161.394898] kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env [ 161.401405] kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 161.425367] kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env 05:53:05 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x5) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, &(0x7f0000000080)=0x6cf) 05:53:05 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') preadv(r1, &(0x7f00000017c0), 0x199, 0x67) 05:53:05 executing program 4: mknod(&(0x7f0000000100)='./bus\x00', 0x8000, 0x86134) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) write(0xffffffffffffffff, 0x0, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:05 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x20011, r0, 0x10000000000) 05:53:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='$\\#&\x00', 0xfffffffffffffffe) [ 161.455777] kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' 05:53:05 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') preadv(r1, &(0x7f00000017c0), 0x199, 0x67) 05:53:05 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') preadv(r1, &(0x7f00000017c0), 0x199, 0x67) 05:53:05 executing program 4: mknod(&(0x7f0000000100)='./bus\x00', 0x8000, 0x86134) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) write(0xffffffffffffffff, 0x0, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) [ 161.507466] kobject: 'loop0' (000000008a1a76be): kobject_uevent_env [ 161.524314] kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' 05:53:05 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x20011, r0, 0x10000000000) 05:53:05 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x5) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, &(0x7f0000000080)=0x6cf) 05:53:05 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') preadv(r1, &(0x7f00000017c0), 0x199, 0x67) [ 161.570448] kobject: 'loop3' (00000000059c58ce): kobject_uevent_env [ 161.585123] kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 161.608647] kobject: 'loop5' (000000001d122b75): kobject_uevent_env [ 161.615362] kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' 05:53:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='$\\#&\x00', 0xfffffffffffffffe) 05:53:05 executing program 5: mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x20011, 0xffffffffffffffff, 0x10000000000) 05:53:05 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') preadv(r1, &(0x7f00000017c0), 0x199, 0x67) 05:53:05 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x5) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, &(0x7f0000000080)=0x6cf) 05:53:05 executing program 4: mknod(&(0x7f0000000100)='./bus\x00', 0x8000, 0x86134) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:05 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') preadv(r1, &(0x7f00000017c0), 0x199, 0x67) 05:53:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='$\\#&\x00', 0xfffffffffffffffe) [ 161.644989] kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env [ 161.668239] kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' 05:53:05 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x5) getsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, &(0x7f0000000080)=0x6cf) 05:53:05 executing program 5: mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x20011, 0xffffffffffffffff, 0x10000000000) 05:53:05 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x67) 05:53:05 executing program 4: mknod(&(0x7f0000000100)='./bus\x00', 0x8000, 0x86134) pwritev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) [ 161.710172] kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env [ 161.722709] kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' 05:53:06 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') 05:53:06 executing program 1: request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='$\\#&\x00', 0xfffffffffffffffe) 05:53:06 executing program 0: getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, 0x0, &(0x7f0000000080)=0x6cf) 05:53:06 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x67) 05:53:06 executing program 5: mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x20011, 0xffffffffffffffff, 0x10000000000) 05:53:06 executing program 4: mknod(&(0x7f0000000100)='./bus\x00', 0x8000, 0x86134) pwritev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) [ 161.761084] kobject: 'loop3' (00000000059c58ce): kobject_uevent_env [ 161.771025] kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 161.787957] kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env [ 161.800365] kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' 05:53:06 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') 05:53:06 executing program 0: getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, 0x0, &(0x7f0000000080)=0x6cf) 05:53:06 executing program 1: request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='$\\#&\x00', 0xfffffffffffffffe) 05:53:06 executing program 5: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x20011, r0, 0x10000000000) 05:53:06 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x67) [ 161.838719] kobject: 'loop5' (000000001d122b75): kobject_uevent_env [ 161.867246] kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' 05:53:06 executing program 0: getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, 0x0, &(0x7f0000000080)=0x6cf) 05:53:06 executing program 4: mknod(&(0x7f0000000100)='./bus\x00', 0x8000, 0x86134) pwritev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) [ 161.883502] kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env [ 161.909144] kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' 05:53:06 executing program 1: request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='$\\#&\x00', 0xfffffffffffffffe) 05:53:06 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)) syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') 05:53:06 executing program 5: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x20011, r0, 0x10000000000) 05:53:06 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') preadv(r1, &(0x7f00000017c0), 0x199, 0x67) [ 161.935578] kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env [ 161.952881] kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' 05:53:06 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x5) getsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, &(0x7f0000000080)=0x6cf) 05:53:06 executing program 4: r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:06 executing program 2: syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') 05:53:06 executing program 5: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x20011, r0, 0x10000000000) 05:53:06 executing program 1: request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='$\\#&\x00', 0xfffffffffffffffe) [ 161.988874] kobject: 'loop5' (000000001d122b75): kobject_uevent_env [ 162.012153] kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' 05:53:06 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x10000000000) 05:53:06 executing program 4: r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:06 executing program 1: request_key(&(0x7f0000000100)='dns_resolver\x00', 0x0, &(0x7f00000001c0)='$\\#&\x00', 0xfffffffffffffffe) 05:53:06 executing program 2: syz_open_procfs(0x0, 0x0) 05:53:06 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') preadv(r0, &(0x7f00000017c0), 0x199, 0x67) [ 162.049282] kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env [ 162.072204] kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' 05:53:06 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x5) getsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, &(0x7f0000000080)=0x6cf) [ 162.094517] kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env [ 162.113990] kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' 05:53:06 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x10000000000) 05:53:06 executing program 1: request_key(&(0x7f0000000100)='dns_resolver\x00', 0x0, &(0x7f00000001c0)='$\\#&\x00', 0xfffffffffffffffe) 05:53:06 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') preadv(r0, &(0x7f00000017c0), 0x199, 0x67) 05:53:06 executing program 2: syz_open_procfs(0x0, 0x0) 05:53:06 executing program 4: r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:06 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x5) getsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, &(0x7f0000000080)=0x6cf) [ 162.144533] kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env [ 162.179936] kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' 05:53:06 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x10000000000) 05:53:06 executing program 3: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x199, 0x67) 05:53:06 executing program 2: syz_open_procfs(0x0, 0x0) 05:53:06 executing program 1: request_key(&(0x7f0000000100)='dns_resolver\x00', 0x0, &(0x7f00000001c0)='$\\#&\x00', 0xfffffffffffffffe) [ 162.209443] kobject: 'loop0' (000000008a1a76be): kobject_uevent_env [ 162.215872] kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' 05:53:06 executing program 4: mknod(0x0, 0x8000, 0x86134) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:06 executing program 3: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x199, 0x67) [ 162.252733] kobject: 'loop5' (000000001d122b75): kobject_uevent_env [ 162.274101] kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' 05:53:06 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') preadv(r1, &(0x7f00000017c0), 0x199, 0x67) 05:53:06 executing program 5: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x20011, 0xffffffffffffffff, 0x10000000000) 05:53:06 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, &(0x7f0000000080)=0x6cf) 05:53:06 executing program 3: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x199, 0x67) [ 162.305139] kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env [ 162.324456] kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' 05:53:06 executing program 1: request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000180)={'syz'}, &(0x7f00000001c0)='$\\#&\x00', 0xfffffffffffffffe) 05:53:06 executing program 2: mknod(&(0x7f0000000100)='./bus\x00', 0x8000, 0x86134) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) write(0xffffffffffffffff, 0x0, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:06 executing program 5: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x20011, 0xffffffffffffffff, 0x10000000000) [ 162.353148] kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env [ 162.367864] kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' 05:53:06 executing program 1: request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000180)={'syz'}, 0x0, 0xfffffffffffffffe) 05:53:06 executing program 4: mknod(0x0, 0x8000, 0x86134) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:06 executing program 3: syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x67) [ 162.410493] kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env [ 162.419948] kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' 05:53:06 executing program 2: mknod(&(0x7f0000000100)='./bus\x00', 0x8000, 0x86134) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) write(0xffffffffffffffff, 0x0, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:06 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, &(0x7f0000000080)=0x6cf) 05:53:06 executing program 1: request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000180)={'syz'}, 0x0, 0xfffffffffffffffe) 05:53:06 executing program 5: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x20011, 0xffffffffffffffff, 0x10000000000) [ 162.458628] kobject: 'loop0' (000000008a1a76be): kobject_uevent_env [ 162.489324] kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' 05:53:06 executing program 3: syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x67) 05:53:06 executing program 2: mknod(&(0x7f0000000100)='./bus\x00', 0x8000, 0x86134) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) write(0xffffffffffffffff, 0x0, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:06 executing program 4: mknod(0x0, 0x8000, 0x86134) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) [ 162.515882] kobject: 'loop5' (000000001d122b75): kobject_uevent_env [ 162.536790] kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' 05:53:06 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, &(0x7f0000000080)=0x6cf) 05:53:06 executing program 1: request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000180)={'syz'}, 0x0, 0xfffffffffffffffe) 05:53:06 executing program 4: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x86134) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:06 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x20011, r0, 0x0) 05:53:06 executing program 2: mknod(&(0x7f0000000100)='./bus\x00', 0x8000, 0x86134) open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 05:53:06 executing program 3: syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x67) [ 162.560733] kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env [ 162.585455] kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' 05:53:06 executing program 2: mknod(&(0x7f0000000100)='./bus\x00', 0x8000, 0x86134) open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) 05:53:06 executing program 4: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:06 executing program 0: socket$inet6(0xa, 0x3, 0x5) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, 0x0, &(0x7f0000000080)=0x6cf) 05:53:06 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') preadv(r0, 0x0, 0x0, 0x67) 05:53:06 executing program 1: [ 162.616659] kobject: 'loop0' (000000008a1a76be): kobject_uevent_env [ 162.643118] kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' 05:53:06 executing program 1: 05:53:06 executing program 5: 05:53:06 executing program 2: mknod(&(0x7f0000000100)='./bus\x00', 0x8000, 0x86134) [ 162.688562] kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env [ 162.717292] kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' 05:53:06 executing program 0: socket$inet6(0xa, 0x3, 0x5) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, 0x0, &(0x7f0000000080)=0x6cf) 05:53:06 executing program 5: 05:53:07 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') preadv(r0, 0x0, 0x0, 0x67) 05:53:07 executing program 1: 05:53:07 executing program 4: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = open(0x0, 0x5, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) [ 162.740577] kobject: 'loop5' (000000001d122b75): kobject_uevent_env [ 162.758726] kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' 05:53:07 executing program 0: socket$inet6(0xa, 0x3, 0x5) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, 0x0, &(0x7f0000000080)=0x6cf) 05:53:07 executing program 1: 05:53:07 executing program 5: 05:53:07 executing program 2: mknod(0x0, 0x8000, 0x86134) 05:53:07 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') preadv(r0, 0x0, 0x0, 0x67) [ 162.788880] kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env [ 162.795319] kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 162.828648] kobject: 'loop0' (000000008a1a76be): kobject_uevent_env 05:53:07 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x5) getsockopt$inet6_opts(r0, 0x29, 0x0, 0x0, &(0x7f0000000080)=0x6cf) 05:53:07 executing program 4: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = open(0x0, 0x5, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:07 executing program 5: 05:53:07 executing program 1: [ 162.849221] kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 162.871927] kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env [ 162.888820] kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' 05:53:07 executing program 2: mknod(0x0, 0x8000, 0x86134) 05:53:07 executing program 5: 05:53:07 executing program 1: 05:53:07 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 05:53:07 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x5) getsockopt$inet6_opts(r0, 0x29, 0x0, 0x0, &(0x7f0000000080)=0x6cf) 05:53:07 executing program 4: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = open(0x0, 0x5, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) [ 162.922925] kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env [ 162.939293] kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' 05:53:07 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x5) getsockopt$inet6_opts(r0, 0x29, 0x0, 0x0, &(0x7f0000000080)=0x6cf) 05:53:07 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') preadv(r0, 0x0, 0x0, 0x67) 05:53:07 executing program 2: mknod(0x0, 0x8000, 0x86134) 05:53:07 executing program 5: request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000180)={'syz'}, 0x0, 0xfffffffffffffffe) [ 162.970145] kobject: 'loop5' (000000001d122b75): kobject_uevent_env [ 162.991986] kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 163.016653] kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env 05:53:07 executing program 4: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:07 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x5) getsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, &(0x7f0000000080)=0x6cf) 05:53:07 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') preadv(r0, 0x0, 0x0, 0x67) 05:53:07 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x5) getsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, 0x0) [ 163.028891] kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' 05:53:07 executing program 2: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x86134) 05:53:07 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x5) getsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, &(0x7f0000000080)=0x6cf) 05:53:07 executing program 4: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:07 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x5) getsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, 0x0) [ 163.088604] kobject: 'loop0' (000000008a1a76be): kobject_uevent_env [ 163.095032] kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 163.124844] kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env 05:53:07 executing program 5: request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000180)={'syz'}, 0x0, 0xfffffffffffffffe) 05:53:07 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') preadv(r0, 0x0, 0x0, 0x67) [ 163.147250] kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' 05:53:07 executing program 2: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) 05:53:07 executing program 4: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:07 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x5) getsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, 0x0) 05:53:07 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x5) getsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, &(0x7f0000000080)=0x6cf) 05:53:07 executing program 5: request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000180)={'syz'}, 0x0, 0xfffffffffffffffe) 05:53:07 executing program 3: preadv(0xffffffffffffffff, 0x0, 0x0, 0x67) [ 163.188666] kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env [ 163.208861] kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 163.220978] kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env [ 163.228220] kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' 05:53:07 executing program 5: request_key(0x0, &(0x7f0000000180)={'syz'}, 0x0, 0xfffffffffffffffe) 05:53:07 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x10000000000) 05:53:07 executing program 4: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:07 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x5) getsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, &(0x7f0000000080)=0x6cf) [ 163.275559] kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env [ 163.306203] kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' 05:53:07 executing program 3: preadv(0xffffffffffffffff, 0x0, 0x0, 0x67) 05:53:07 executing program 1: socket$inet6(0xa, 0x0, 0x5) 05:53:07 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x10000000000) 05:53:07 executing program 4: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:07 executing program 5: request_key(0x0, &(0x7f0000000180)={'syz'}, 0x0, 0xfffffffffffffffe) [ 163.340902] kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env [ 163.367516] kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' 05:53:07 executing program 3: preadv(0xffffffffffffffff, 0x0, 0x0, 0x67) 05:53:07 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x5) getsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, &(0x7f0000000080)=0x6cf) 05:53:07 executing program 5: request_key(0x0, &(0x7f0000000180)={'syz'}, 0x0, 0xfffffffffffffffe) 05:53:07 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x10000000000) 05:53:07 executing program 3: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x67) 05:53:07 executing program 1: socket$inet6(0xa, 0x0, 0x0) [ 163.403465] kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env [ 163.442110] kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' 05:53:07 executing program 4: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:07 executing program 2: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) 05:53:07 executing program 3: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x67) [ 163.481920] kobject: 'loop3' (00000000059c58ce): kobject_uevent_env [ 163.501302] kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' 05:53:07 executing program 5: request_key(&(0x7f0000000100)='dns_resolver\x00', 0x0, 0x0, 0xfffffffffffffffe) 05:53:07 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x5) getsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, &(0x7f0000000080)=0x6cf) 05:53:07 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) [ 163.533271] kobject: 'loop0' (000000008a1a76be): kobject_uevent_env [ 163.551365] kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' 05:53:07 executing program 1: request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='$\\#&\x00', 0xfffffffffffffffe) [ 163.582196] kobject: 'loop3' (00000000059c58ce): kobject_uevent_env 05:53:07 executing program 5: request_key(&(0x7f0000000100)='dns_resolver\x00', 0x0, 0x0, 0xfffffffffffffffe) 05:53:07 executing program 4: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, 0x0, 0x0, 0x0) 05:53:07 executing program 3: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x67) 05:53:07 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) [ 163.604266] kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 163.637405] kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env 05:53:07 executing program 0: socket$inet6(0xa, 0x0, 0x5) 05:53:07 executing program 1: request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='$\\#&\x00', 0xfffffffffffffffe) 05:53:07 executing program 5: request_key(&(0x7f0000000100)='dns_resolver\x00', 0x0, 0x0, 0xfffffffffffffffe) 05:53:07 executing program 3: syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') preadv(0xffffffffffffffff, 0x0, 0x0, 0x67) 05:53:07 executing program 4: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, 0x0, 0x0, 0x0) [ 163.660000] kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 163.697814] kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env 05:53:07 executing program 4: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, 0x0, 0x0, 0x0) 05:53:07 executing program 1: request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='$\\#&\x00', 0xfffffffffffffffe) 05:53:07 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) [ 163.711435] kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 163.735376] kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env 05:53:08 executing program 0: socket$inet6(0xa, 0x0, 0x0) 05:53:08 executing program 3: syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') preadv(0xffffffffffffffff, 0x0, 0x0, 0x67) 05:53:08 executing program 5: socket$inet6(0xa, 0x0, 0x5) 05:53:08 executing program 2: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, 0x0, 0x0, 0x0) [ 163.767748] kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 163.795258] kobject: 'loop0' (000000008a1a76be): kobject_uevent_env 05:53:08 executing program 1: request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='$\\#&\x00', 0xfffffffffffffffe) 05:53:08 executing program 4: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, &(0x7f00000002c0), 0x0, 0x0) 05:53:08 executing program 3: syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') preadv(0xffffffffffffffff, 0x0, 0x0, 0x67) 05:53:08 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x5) getsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, &(0x7f0000000080)=0x6cf) [ 163.823360] kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 163.857290] kobject: 'loop3' (00000000059c58ce): kobject_uevent_env 05:53:08 executing program 2: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, 0x0, 0x0, 0x0) 05:53:08 executing program 4: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, &(0x7f00000002c0), 0x0, 0x0) 05:53:08 executing program 1: request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='$\\#&\x00', 0xfffffffffffffffe) 05:53:08 executing program 5: mknod(&(0x7f0000000100)='./bus\x00', 0x8000, 0x86134) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:08 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') preadv(r0, 0x0, 0x0, 0x0) [ 163.891226] kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 163.919220] kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env [ 163.925825] kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' 05:53:08 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x5) getsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, &(0x7f0000000080)=0x6cf) [ 163.939908] kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env [ 163.946325] kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 163.963058] kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env [ 163.972616] kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 163.983436] kobject: 'loop3' (00000000059c58ce): kobject_uevent_env [ 163.992686] kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 164.003526] kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env 05:53:08 executing program 3 (fault-call:1 fault-nth:0): r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') preadv(r0, 0x0, 0x0, 0x0) 05:53:08 executing program 5: mknod(&(0x7f0000000100)='./bus\x00', 0x8000, 0x86134) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:08 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x5) getsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, &(0x7f0000000080)=0x6cf) 05:53:08 executing program 4: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, &(0x7f00000002c0), 0x0, 0x0) 05:53:08 executing program 1: request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='$\\#&\x00', 0xfffffffffffffffe) 05:53:08 executing program 2: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, 0x0, 0x0, 0x0) 05:53:08 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') preadv(r0, 0x0, 0x0, 0x0) [ 164.066675] kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 164.086535] kobject: 'loop0' (000000008a1a76be): kobject_uevent_env 05:53:08 executing program 0: getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, 0x0, &(0x7f0000000080)=0x6cf) 05:53:08 executing program 5: mknod(&(0x7f0000000100)='./bus\x00', 0x8000, 0x86134) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:08 executing program 2: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:53:08 executing program 4: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) [ 164.131209] kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 164.168426] kobject: 'loop3' (00000000059c58ce): kobject_uevent_env 05:53:08 executing program 0: getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, 0x0, &(0x7f0000000080)=0x6cf) 05:53:08 executing program 1: request_key(&(0x7f0000000100)='dns_resolver\x00', 0x0, &(0x7f00000001c0)='$\\#&\x00', 0xfffffffffffffffe) 05:53:08 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x408000, 0x44) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000040)={0x0, 0x2be9910951b6235b, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000080)={0x0, r1, 0x275}) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') preadv(r2, 0x0, 0x0, 0x0) 05:53:08 executing program 4: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) 05:53:08 executing program 0: getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, 0x0, &(0x7f0000000080)=0x6cf) 05:53:08 executing program 5: mknod(&(0x7f0000000100)='./bus\x00', 0x8000, 0x86134) pwritev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:08 executing program 1: request_key(&(0x7f0000000100)='dns_resolver\x00', 0x0, &(0x7f00000001c0)='$\\#&\x00', 0xfffffffffffffffe) [ 164.180907] kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 164.212006] kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env 05:53:08 executing program 2: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:53:08 executing program 4: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) 05:53:08 executing program 5: mknod(&(0x7f0000000100)='./bus\x00', 0x8000, 0x86134) pwritev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:08 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7, 0x200) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x5c) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') preadv(r1, 0x0, 0x0, 0x0) [ 164.261849] kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' 05:53:08 executing program 2: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:53:08 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x5) getsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, &(0x7f0000000080)=0x6cf) 05:53:08 executing program 1: request_key(&(0x7f0000000100)='dns_resolver\x00', 0x0, &(0x7f00000001c0)='$\\#&\x00', 0xfffffffffffffffe) [ 164.311673] kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env [ 164.321221] kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 164.333424] kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env [ 164.342150] kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' 05:53:08 executing program 5: mknod(&(0x7f0000000100)='./bus\x00', 0x8000, 0x86134) pwritev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:08 executing program 4 (fault-call:2 fault-nth:0): mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:08 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, 0x0, 0x0, 0x0) [ 164.362144] kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env 05:53:08 executing program 1: request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000180)={'syz'}, &(0x7f00000001c0)='$\\#&\x00', 0xfffffffffffffffe) 05:53:08 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64MMAP\x00', &(0x7f0000000080)='vmnet1bdev\x00', 0xb, 0x2) preadv(r0, 0x0, 0x0, 0x0) 05:53:08 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x5) getsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, &(0x7f0000000080)=0x6cf) 05:53:08 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) [ 164.407057] kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 164.420130] FAULT_INJECTION: forcing a failure. [ 164.420130] name failslab, interval 1, probability 0, space 0, times 1 [ 164.438760] kobject: 'loop3' (00000000059c58ce): kobject_uevent_env [ 164.445310] kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' 05:53:08 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, 0x0, 0x0, 0x0) 05:53:08 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) [ 164.456955] CPU: 0 PID: 8159 Comm: syz-executor.4 Not tainted 5.0.0-rc6+ #71 [ 164.464150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 164.473496] Call Trace: [ 164.476082] dump_stack+0x172/0x1f0 [ 164.479708] should_fail.cold+0xa/0x1b [ 164.482412] kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env [ 164.483586] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 164.483610] ? lock_downgrade+0x810/0x810 [ 164.483623] ? set_page_refcounted+0x100/0x100 [ 164.503823] ? ___might_sleep+0x163/0x280 [ 164.506984] kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 164.507992] __should_failslab+0x121/0x190 [ 164.521638] should_failslab+0x9/0x14 [ 164.525433] __kmalloc+0x2dc/0x740 [ 164.528967] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 164.534503] ? _copy_from_user+0xdd/0x150 [ 164.537902] kobject: 'loop0' (000000008a1a76be): kobject_uevent_env [ 164.538647] ? compat_rw_copy_check_uvector+0x339/0x3f0 [ 164.538661] compat_rw_copy_check_uvector+0x339/0x3f0 05:53:08 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) [ 164.538673] ? mark_held_locks+0x100/0x100 [ 164.538698] compat_import_iovec+0xbf/0x1fc [ 164.538709] ? iov_iter_get_pages+0xf30/0xf30 [ 164.538721] ? proc_cwd_link+0x1d0/0x1d0 [ 164.538745] compat_writev+0xca/0x3a0 [ 164.538756] ? do_pwritev+0x280/0x280 [ 164.538769] ? __fget+0x367/0x540 [ 164.538781] ? iterate_fd+0x360/0x360 [ 164.538795] ? wait_for_completion+0x440/0x440 [ 164.538826] ? __fget_light+0x1a9/0x230 [ 164.538838] do_compat_pwritev64+0x190/0x1c0 [ 164.538849] ? do_compat_writev+0x1f0/0x1f0 05:53:08 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, 0x0, 0x0, 0x0) [ 164.538861] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 164.538875] __ia32_compat_sys_pwritev+0xc7/0x140 [ 164.561363] kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 164.564358] do_fast_syscall_32+0x281/0xc98 [ 164.564373] entry_SYSENTER_compat+0x70/0x7f [ 164.564385] RIP: 0023:0xf7f79869 [ 164.587393] kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env 05:53:08 executing program 3: syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x10000, 0x0) ioctl$RTC_PLL_SET(r2, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000640)=""/168) r3 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1ff, 0x0, 0x0, 0xe0, 0x0, 0xfffffffbfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r0, 0x0) r5 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r5, r4) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r6, &(0x7f0000000280)=ANY=[], 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r7, 0x890c, &(0x7f00000000c0)={'ifb0\x02\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)}}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x100) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r8, &(0x7f0000000900)=ANY=[@ANYBLOB="a60000004cf36312548a291f9a000000040040000019000009f93e000000000081f3002e2f66e96c65308003000000010000000002000026000000000000000807002e2f66696c6530400400000006001500000000000600000000000000660700251418337c1c26ef3c856467973e427d2e2f666901651300008100000000000000000407002e2f66696c6530e001000000050000000000c9e2481e42bf66d37cd7f582cf90cb0000ff030000000000000607002e2f66694c65300000000000000000000032410f4648253ff58aef299c825cad45e56401ddec96215ac68d50eab410c36093f4f184a0700e40a27591530c9d6a6cf1abcd4f57839b74536f3200d142d44d0e58c3a82bb1b9278695ca7899c4d01fc7911139de1b5ef03062064fe37fc95f2cc78483a25f9cb551d516400000000000000000000000000000087a382b108e42079d401abbf301750f064ce37dd36e28fbbcc8e6c675f0182e7777dd2510af8b41f28880ff31e1c7e4ed0467dbe0144c06731d080875ca54f7f56701762231b85a6cdb0820a8faef2f7b72e0de31752e961ad26cfa04e235abb687e2d72eef6b1a940cfaf58748ea4b5de87b7152f558ab0c50b6a58c0770b0fd80b34f3a0a1ff5331b4f3ac92656a4cc9aa0b14c11c58f0c242ed0b1e14dc5a3df3841d64104070d2a2b293661e4e202cc2e6b10a61c702401a62da6980323fea94d86f207f39941051697ffe255137f9844061ab80d0338717c7329deb5d66095aaed683044f88f6a5674dcae2af90a3548eadaf1e71554ebb4807cf49697a3be290f45f2e9654376d804493f866ab6c52860e3a82a397823f746826ecf78f9b89592e263c599c479e02fb20c7c2d1ff4bf89973106428100000000000000c621f794dc05e44fd148881c9f637fb759acfc448c87db76d04af7dde0f9bc"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) utimensat(r8, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={{0x0, 0x2710}, {0x77359400}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0xc0505350, &(0x7f0000000200)={{0x2, 0x7f}, {0x10000, 0x3}, 0x7, 0x2, 0x81}) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340)}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r6, 0x540f, &(0x7f0000000280)=0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x2, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xfffffffbffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffff, 0x80000000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4}, r9, 0x6, 0xffffffffffffffff, 0x0) getcwd(&(0x7f0000000040)=""/144, 0x90) [ 164.587716] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 164.600896] kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 164.605001] RSP: 002b:00000000f5d750cc EFLAGS: 00000296 ORIG_RAX: 000000000000014e [ 164.605015] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000200002c0 [ 164.605023] RDX: 000000000000005e RSI: 0000000000000000 RDI: 0000000000000000 [ 164.605030] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 164.605038] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 05:53:08 executing program 1: request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000180)={'syz'}, 0x0, 0xfffffffffffffffe) [ 164.605049] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 164.617527] kobject: 'loop3' (00000000059c58ce): kobject_uevent_env [ 164.731390] kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 164.751440] kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env 05:53:09 executing program 4 (fault-call:2 fault-nth:1): mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:09 executing program 5: mknod(0x0, 0x8000, 0x86134) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:09 executing program 2: mknod(0x0, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, 0x0, 0x0, 0x0) 05:53:09 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x5) getsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, &(0x7f0000000080)=0x6cf) [ 164.757881] kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 164.770499] kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env [ 164.774817] hrtimer: interrupt took 23648 ns [ 164.776941] kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 164.794662] kobject: 'loop0' (000000008a1a76be): kobject_uevent_env 05:53:09 executing program 1: request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000180)={'syz'}, 0x0, 0xfffffffffffffffe) [ 164.801468] kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' 05:53:09 executing program 5: mknod(0x0, 0x8000, 0x86134) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:09 executing program 2: mknod(0x0, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, 0x0, 0x0, 0x0) 05:53:09 executing program 1: request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000180)={'syz'}, 0x0, 0xfffffffffffffffe) [ 164.842361] kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env [ 164.849648] FAULT_INJECTION: forcing a failure. [ 164.849648] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 164.864723] kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 164.887448] CPU: 1 PID: 8201 Comm: syz-executor.4 Not tainted 5.0.0-rc6+ #71 [ 164.889872] kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env [ 164.894634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 164.894639] Call Trace: [ 164.894662] dump_stack+0x172/0x1f0 [ 164.894692] should_fail.cold+0xa/0x1b [ 164.901229] kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 164.910431] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 164.910465] ? ___might_sleep+0x163/0x280 [ 164.910479] should_fail_alloc_page+0x50/0x60 [ 164.910493] __alloc_pages_nodemask+0x1a1/0x710 [ 164.913483] kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env [ 164.916665] ? kernel_text_address+0x73/0xf0 [ 164.916678] ? __alloc_pages_slowpath+0x2900/0x2900 [ 164.916688] ? mark_held_locks+0x100/0x100 [ 164.916702] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 164.920680] kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 164.930001] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 164.930017] alloc_pages_vma+0xdd/0x540 [ 164.930031] shmem_alloc_page+0xc0/0x180 [ 164.930045] ? shmem_swapin+0x1a0/0x1a0 [ 164.935503] kobject: 'loop3' (00000000059c58ce): kobject_uevent_env [ 164.939267] ? lock_downgrade+0x810/0x810 [ 164.939309] ? __this_cpu_preempt_check+0x1d/0x30 [ 164.939334] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 164.943930] kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 164.948481] ? percpu_counter_add_batch+0x13c/0x190 [ 164.948495] shmem_alloc_and_acct_page+0x165/0x970 [ 164.948509] shmem_getpage_gfp+0x449/0x3520 [ 164.948533] ? shmem_add_to_page_cache+0x1200/0x1200 [ 164.955873] kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env [ 164.959368] ? lock_downgrade+0x810/0x810 [ 164.959379] ? lock_acquire+0x16f/0x3f0 [ 164.959406] ? current_time+0x6b/0x140 [ 164.959419] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 164.959433] ? iov_iter_fault_in_readable+0x22c/0x450 [ 164.959449] shmem_write_begin+0x105/0x1e0 05:53:09 executing program 5: mknod(0x0, 0x8000, 0x86134) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:09 executing program 4 (fault-call:2 fault-nth:2): mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) [ 164.964572] kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 164.968695] generic_perform_write+0x231/0x530 [ 164.968711] ? page_endio+0x780/0x780 [ 164.968724] ? current_time+0x140/0x140 [ 164.968737] ? lock_acquire+0x16f/0x3f0 [ 164.974690] kobject: 'loop0' (000000008a1a76be): kobject_uevent_env [ 164.983687] __generic_file_write_iter+0x25e/0x630 [ 164.983700] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 164.983720] generic_file_write_iter+0x360/0x610 [ 164.983739] ? __generic_file_write_iter+0x630/0x630 [ 164.989386] kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 164.993225] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 164.993239] ? mark_held_locks+0x100/0x100 [ 164.993255] do_iter_readv_writev+0x5e0/0x8e0 [ 164.993271] ? vfs_dedupe_file_range+0x780/0x780 [ 164.997978] kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env [ 165.001573] ? apparmor_file_permission+0x25/0x30 [ 165.001588] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 165.001601] ? rw_verify_area+0x118/0x360 [ 165.001614] do_iter_write+0x184/0x610 [ 165.001629] ? rcu_sync_lockdep_assert+0xd/0xb0 [ 165.008125] kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 165.012144] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 165.012170] compat_writev+0x1f6/0x3a0 [ 165.012182] ? do_pwritev+0x280/0x280 [ 165.012195] ? __fget+0x367/0x540 [ 165.017397] kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env [ 165.022583] ? iterate_fd+0x360/0x360 [ 165.022608] ? wait_for_completion+0x440/0x440 [ 165.022621] ? __fget_light+0x1a9/0x230 [ 165.022635] do_compat_pwritev64+0x190/0x1c0 [ 165.032204] kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 165.037070] ? do_compat_writev+0x1f0/0x1f0 [ 165.037084] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 165.037098] __ia32_compat_sys_pwritev+0xc7/0x140 [ 165.037114] do_fast_syscall_32+0x281/0xc98 [ 165.042423] kobject: 'loop3' (00000000059c58ce): kobject_uevent_env [ 165.046352] entry_SYSENTER_compat+0x70/0x7f [ 165.046361] RIP: 0023:0xf7f79869 [ 165.046372] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 165.046380] RSP: 002b:00000000f5d750cc EFLAGS: 00000296 ORIG_RAX: 000000000000014e [ 165.051666] kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 165.057896] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000200002c0 [ 165.057903] RDX: 000000000000005e RSI: 0000000000000000 RDI: 0000000000000000 [ 165.057909] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 165.057915] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 165.057922] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 165.110794] FAULT_INJECTION: forcing a failure. [ 165.110794] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 165.133052] kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env [ 165.150929] CPU: 1 PID: 8213 Comm: syz-executor.4 Not tainted 5.0.0-rc6+ #71 [ 165.160997] kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 165.165402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.165405] Call Trace: [ 165.165421] dump_stack+0x172/0x1f0 [ 165.165433] should_fail.cold+0xa/0x1b [ 165.175615] kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env [ 165.176657] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 165.176669] ? ___might_sleep+0x163/0x280 [ 165.176682] should_fail_alloc_page+0x50/0x60 [ 165.182253] kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 165.186326] __alloc_pages_nodemask+0x1a1/0x710 [ 165.186337] ? kernel_text_address+0x73/0xf0 [ 165.186349] ? __alloc_pages_slowpath+0x2900/0x2900 [ 165.190553] kobject: 'loop0' (000000008a1a76be): kobject_uevent_env [ 165.194875] ? mark_held_locks+0x100/0x100 [ 165.194900] ? mark_held_locks+0x100/0x100 [ 165.194913] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 165.204387] kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 165.209860] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 05:53:09 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') write$FUSE_BMAP(r0, &(0x7f0000000000)={0x18, 0x0, 0x6, {0x280000}}, 0x18) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@mss={0x2, 0x672}, @mss={0x2, 0x7c}, @sack_perm, @timestamp, @window={0x3, 0xc54e, 0x8}], 0x5) preadv(r0, 0x0, 0x0, 0x0) 05:53:09 executing program 5: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x86134) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:09 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, &(0x7f0000000080)=0x6cf) 05:53:09 executing program 2: mknod(0x0, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, 0x0, 0x0, 0x0) 05:53:09 executing program 1 (fault-call:0 fault-nth:0): request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000180)={'syz'}, 0x0, 0xfffffffffffffffe) [ 165.209875] alloc_pages_vma+0xdd/0x540 [ 165.209888] shmem_alloc_page+0xc0/0x180 [ 165.214143] kobject: 'loop3' (00000000059c58ce): kobject_uevent_env [ 165.217711] ? shmem_swapin+0x1a0/0x1a0 [ 165.217723] ? lock_downgrade+0x810/0x810 [ 165.217745] ? __this_cpu_preempt_check+0x1d/0x30 [ 165.221254] kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 165.227565] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 165.227576] ? percpu_counter_add_batch+0x13c/0x190 [ 165.227590] shmem_alloc_and_acct_page+0x165/0x970 [ 165.231730] kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env [ 165.235951] shmem_getpage_gfp+0x449/0x3520 [ 165.235972] ? shmem_add_to_page_cache+0x1200/0x1200 [ 165.240002] kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 165.244332] ? __set_page_dirty_no_writeback+0x1ea/0x370 [ 165.244345] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 165.244360] ? balance_dirty_pages_ratelimited+0x168/0x1f50 [ 165.254239] kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env 05:53:09 executing program 5: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:09 executing program 2: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = open(0x0, 0x5, 0x0) pwritev(r0, 0x0, 0x0, 0x0) 05:53:09 executing program 5: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = open(0x0, 0x5, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:09 executing program 2: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = open(0x0, 0x5, 0x0) pwritev(r0, 0x0, 0x0, 0x0) [ 165.258109] ? do_writepages+0x2a0/0x2a0 [ 165.258122] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 165.258135] ? iov_iter_fault_in_readable+0x22c/0x450 [ 165.258149] shmem_write_begin+0x105/0x1e0 [ 165.263712] kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 165.268507] generic_perform_write+0x231/0x530 [ 165.268522] ? page_endio+0x780/0x780 [ 165.268546] ? current_time+0x140/0x140 [ 165.273188] kobject: 'loop0' (000000008a1a76be): kobject_uevent_env [ 165.279257] ? lock_acquire+0x16f/0x3f0 [ 165.279272] __generic_file_write_iter+0x25e/0x630 [ 165.279285] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 165.283724] kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 165.287021] generic_file_write_iter+0x360/0x610 [ 165.287037] ? __generic_file_write_iter+0x630/0x630 [ 165.308317] kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env [ 165.313654] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 165.313671] ? mark_held_locks+0x100/0x100 [ 165.323201] kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 165.330879] do_iter_readv_writev+0x5e0/0x8e0 [ 165.330896] ? vfs_dedupe_file_range+0x780/0x780 [ 165.330913] ? apparmor_file_permission+0x25/0x30 [ 165.338629] kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env [ 165.345486] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 165.345506] ? rw_verify_area+0x118/0x360 [ 165.352851] kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 165.360054] do_iter_write+0x184/0x610 05:53:09 executing program 4 (fault-call:2 fault-nth:3): mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:09 executing program 5: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = open(0x0, 0x5, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:09 executing program 5: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = open(0x0, 0x5, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) [ 165.360072] ? rcu_sync_lockdep_assert+0xd/0xb0 [ 165.360088] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 165.372241] kobject: 'loop3' (00000000059c58ce): kobject_uevent_env [ 165.378257] compat_writev+0x1f6/0x3a0 [ 165.378272] ? do_pwritev+0x280/0x280 [ 165.378289] ? __fget+0x367/0x540 [ 165.385511] kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 165.394894] ? iterate_fd+0x360/0x360 [ 165.394911] ? wait_for_completion+0x440/0x440 [ 165.394926] ? __fget_light+0x1a9/0x230 05:53:10 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x4001, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000180), &(0x7f00000001c0)=0x4) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x5) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000040), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000100)={0x13, 0x10, 0xfa00, {&(0x7f0000000200), r2}}, 0x18) 05:53:10 executing program 1 (fault-call:0 fault-nth:1): request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000180)={'syz'}, 0x0, 0xfffffffffffffffe) [ 165.404598] kobject: 'loop0' (000000008a1a76be): kobject_uevent_env [ 165.406875] do_compat_pwritev64+0x190/0x1c0 [ 165.406894] ? do_compat_writev+0x1f0/0x1f0 [ 165.406909] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 165.410591] kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 165.414403] __ia32_compat_sys_pwritev+0xc7/0x140 [ 165.414422] do_fast_syscall_32+0x281/0xc98 [ 165.421170] kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env [ 165.425908] entry_SYSENTER_compat+0x70/0x7f 05:53:10 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, &(0x7f0000000080)=0x6cf) 05:53:10 executing program 5: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:10 executing program 2: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = open(0x0, 0x5, 0x0) pwritev(r0, 0x0, 0x0, 0x0) 05:53:10 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x10001, 0x200000) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') preadv(r0, 0x0, 0x0, 0x0) [ 165.425922] RIP: 0023:0xf7f79869 [ 165.430118] kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 165.434546] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 165.434555] RSP: 002b:00000000f5d750cc EFLAGS: 00000296 ORIG_RAX: 000000000000014e [ 165.444340] kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env [ 165.448641] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000200002c0 [ 165.448648] RDX: 000000000000005e RSI: 0000000000000000 RDI: 0000000000000000 [ 165.448655] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 165.448660] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 165.448670] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 165.453111] kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 165.503619] FAULT_INJECTION: forcing a failure. [ 165.503619] name failslab, interval 1, probability 0, space 0, times 0 [ 165.535034] kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env [ 165.604418] CPU: 1 PID: 8218 Comm: syz-executor.1 Not tainted 5.0.0-rc6+ #71 [ 165.619159] kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 165.624115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.624118] Call Trace: [ 165.624135] dump_stack+0x172/0x1f0 [ 165.624148] should_fail.cold+0xa/0x1b [ 165.629165] kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env [ 165.632533] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 165.632577] ? lock_downgrade+0x810/0x810 [ 165.632591] ? set_page_refcounted+0x100/0x100 [ 165.636621] kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 165.642968] ? ___might_sleep+0x163/0x280 [ 165.642982] __should_failslab+0x121/0x190 [ 165.642998] should_failslab+0x9/0x14 [ 165.647283] kobject: 'loop0' (000000008a1a76be): kobject_uevent_env [ 165.651888] __kmalloc_track_caller+0x2d8/0x740 [ 165.651903] ? __check_object_size+0x3d/0x42f [ 165.651916] ? wait_for_completion+0x440/0x440 [ 165.651930] ? strndup_user+0x77/0xd0 [ 165.657853] kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 165.666369] memdup_user+0x26/0xb0 [ 165.666382] strndup_user+0x77/0xd0 [ 165.666394] __ia32_sys_request_key+0x13b/0x430 [ 165.666407] ? __x64_sys_request_key+0x430/0x430 [ 165.671524] kobject: 'loop3' (00000000059c58ce): kobject_uevent_env [ 165.676264] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 165.676275] ? entry_SYSENTER_compat+0x68/0x7f [ 165.676289] ? trace_hardirqs_on+0x67/0x230 [ 165.682752] kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 165.687753] do_fast_syscall_32+0x281/0xc98 [ 165.687767] entry_SYSENTER_compat+0x70/0x7f [ 165.687778] RIP: 0023:0xf7f0b869 [ 165.692383] kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env [ 165.701440] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 165.701447] RSP: 002b:00000000f5d070cc EFLAGS: 00000296 ORIG_RAX: 000000000000011f [ 165.701459] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000020000180 [ 165.701465] RDX: 0000000000000000 RSI: 00000000fffffffe RDI: 0000000000000000 [ 165.701483] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 165.701493] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 165.706051] kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 165.710701] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 165.811246] FAULT_INJECTION: forcing a failure. [ 165.811246] name failslab, interval 1, probability 0, space 0, times 0 [ 165.834851] kobject: 'loop0' (000000008a1a76be): kobject_uevent_env [ 165.919775] FAULT_INJECTION: forcing a failure. [ 165.919775] name failslab, interval 1, probability 0, space 0, times 0 [ 165.930807] kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 165.937042] CPU: 1 PID: 8242 Comm: syz-executor.4 Not tainted 5.0.0-rc6+ #71 [ 165.948921] kobject: 'loop3' (00000000059c58ce): kobject_uevent_env [ 165.954613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.962059] kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 165.971225] Call Trace: [ 165.971244] dump_stack+0x172/0x1f0 [ 165.971260] should_fail.cold+0xa/0x1b [ 165.981164] kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env [ 165.983192] ? fault_create_debugfs_attr+0x1e0/0x1e0 05:53:10 executing program 5: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) [ 165.986839] kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 165.990708] ? ___might_sleep+0x163/0x280 [ 165.990727] __should_failslab+0x121/0x190 [ 165.990741] should_failslab+0x9/0x14 [ 165.997505] kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env [ 166.002247] kmem_cache_alloc+0x47/0x710 [ 166.002260] ? mark_held_locks+0x100/0x100 [ 166.002285] xas_alloc+0x2df/0x3d0 [ 166.006443] kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 166.011010] xas_create+0x5b0/0xec0 [ 166.011028] xas_create_range+0x198/0x5d0 [ 166.022212] kobject: 'loop1' (00000000c9963d5f): kobject_uevent_env [ 166.024613] shmem_add_to_page_cache+0x6f3/0x1200 [ 166.029099] kobject: 'loop1' (00000000c9963d5f): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 166.032653] ? shmem_writepage+0xe90/0xe90 [ 166.039450] kobject: 'loop3' (00000000059c58ce): kobject_uevent_env [ 166.043689] shmem_getpage_gfp+0x6d7/0x3520 [ 166.048372] kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 166.052779] ? shmem_add_to_page_cache+0x1200/0x1200 [ 166.056825] kobject: 'loop0' (000000008a1a76be): kobject_uevent_env [ 166.065984] ? __set_page_dirty_no_writeback+0x1ea/0x370 [ 166.065997] ? balance_dirty_pages_ratelimited+0x168/0x1f50 [ 166.066010] ? do_writepages+0x2a0/0x2a0 [ 166.069749] kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 166.073153] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 166.082073] kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env [ 166.082544] ? iov_iter_fault_in_readable+0x22c/0x450 [ 166.094732] kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 166.099014] shmem_write_begin+0x105/0x1e0 [ 166.099029] generic_perform_write+0x231/0x530 [ 166.099043] ? page_endio+0x780/0x780 [ 166.105870] kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env [ 166.112823] ? current_time+0x140/0x140 [ 166.112837] ? lock_acquire+0x16f/0x3f0 [ 166.112852] __generic_file_write_iter+0x25e/0x630 [ 166.112867] ? __sanitizer_cov_trace_cmp8+0x18/0x20 05:53:10 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x101202, 0x0) preadv(r0, 0x0, 0x0, 0x0) 05:53:10 executing program 2: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) pwritev(r0, 0x0, 0x0, 0x0) [ 166.117843] kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 166.121615] generic_file_write_iter+0x360/0x610 [ 166.121630] ? __generic_file_write_iter+0x630/0x630 [ 166.121645] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 166.125870] kobject: 'loop0' (000000008a1a76be): kobject_uevent_env [ 166.131400] ? mark_held_locks+0x100/0x100 [ 166.131414] do_iter_readv_writev+0x5e0/0x8e0 [ 166.131427] ? vfs_dedupe_file_range+0x780/0x780 05:53:10 executing program 4 (fault-call:2 fault-nth:4): mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:10 executing program 5: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 05:53:10 executing program 2: mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) pwritev(r0, 0x0, 0x0, 0x0) [ 166.150522] kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 166.158011] ? apparmor_file_permission+0x25/0x30 [ 166.165715] kobject: 'loop5' (000000001d122b75): kobject_uevent_env [ 166.172514] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 166.172526] ? rw_verify_area+0x118/0x360 [ 166.172545] do_iter_write+0x184/0x610 [ 166.180042] kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 166.187061] ? rcu_sync_lockdep_assert+0xd/0xb0 [ 166.197067] kobject: 'loop3' (00000000059c58ce): kobject_uevent_env 05:53:10 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xce\xe5\x1c\x95\x92\xea\x8cy\xabdG\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xc4\xc0\xf3\xed\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca#\xd7\xe8\xb6\xa6J\x03>\xd22\xb5\xe4\xf7\xdd\xbal\xaf\x98\xaa`u\'\x81\xf5\xd6\x90\xb1BW |h\xed\xe54\x86\xd7>\x90\xe5\x18\x0e\xca:\xd0evAVPox\xaf\x0e\x8ch-\x81\xaa\x92\x19\x80h\xc5 \xcb\x01\xd6L^\xb8\x92\x82~\xcbv\xb3\xab-\xfa\x88\xf2\x9dy\xff\x81\"\xe7=\x1aA{\xf0\xf5\x8b}') preadv(r0, 0x0, 0x0, 0x0) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f0000000000)={0x0, 0x0, @ioapic}) [ 166.203755] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 166.203770] compat_writev+0x1f6/0x3a0 [ 166.203784] ? do_pwritev+0x280/0x280 [ 166.216721] kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 166.222658] ? __fget+0x367/0x540 [ 166.222672] ? iterate_fd+0x360/0x360 [ 166.222690] ? wait_for_completion+0x440/0x440 [ 166.234455] kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env [ 166.243284] ? __fget_light+0x1a9/0x230 [ 166.243308] do_compat_pwritev64+0x190/0x1c0 [ 166.243324] ? do_compat_writev+0x1f0/0x1f0 [ 166.250785] kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 166.256912] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 166.266791] kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env [ 166.275697] __ia32_compat_sys_pwritev+0xc7/0x140 [ 166.275716] do_fast_syscall_32+0x281/0xc98 [ 166.275734] entry_SYSENTER_compat+0x70/0x7f [ 166.278527] kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 166.281934] RIP: 0023:0xf7f79869 [ 166.286093] kobject: 'loop0' (000000008a1a76be): kobject_uevent_env [ 166.292195] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 166.292201] RSP: 002b:00000000f5d750cc EFLAGS: 00000296 ORIG_RAX: 000000000000014e [ 166.292212] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000200002c0 [ 166.292221] RDX: 000000000000005e RSI: 0000000000000000 RDI: 0000000000000000 [ 166.298095] kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 166.306734] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 166.311309] kobject: 'loop5' (000000001d122b75): kobject_uevent_env [ 166.315094] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 166.319061] kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 166.325749] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 166.330319] kobject: 'loop3' (00000000059c58ce): kobject_uevent_env [ 166.355618] CPU: 1 PID: 8241 Comm: syz-executor.1 Not tainted 5.0.0-rc6+ #71 [ 166.379242] kobject: 'loop3' (00000000059c58ce): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 166.380043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.380048] Call Trace: [ 166.380065] dump_stack+0x172/0x1f0 [ 166.380081] should_fail.cold+0xa/0x1b [ 166.392111] kobject: 'loop5' (000000001d122b75): kobject_uevent_env [ 166.400225] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 166.400237] ? lock_downgrade+0x810/0x810 [ 166.400252] ? set_page_refcounted+0x100/0x100 [ 166.405399] kobject: 'loop5' (000000001d122b75): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 166.411742] ? ___might_sleep+0x163/0x280 [ 166.411759] __should_failslab+0x121/0x190 [ 166.411773] should_failslab+0x9/0x14 [ 166.417524] kobject: 'loop2' (00000000fd01c20a): kobject_uevent_env [ 166.422910] kmem_cache_alloc+0x2be/0x710 [ 166.422927] ? creds_are_invalid+0x125/0x150 [ 166.422944] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 166.427029] kobject: 'loop2' (00000000fd01c20a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 166.436429] ? __validate_process_creds+0x1d9/0x300 [ 166.436443] prepare_creds+0x3e/0x3c0 [ 166.436458] lookup_user_key+0x60a/0x1140 [ 166.442328] kobject: 'loop4' (00000000d2a695a8): kobject_uevent_env [ 166.448379] ? join_session_keyring+0x340/0x340 [ 166.448394] ? key_validate+0x100/0x100 [ 166.448419] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 166.453633] kobject: 'loop4' (00000000d2a695a8): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 166.463019] ? memdup_user+0x65/0xb0 [ 166.463032] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 166.463058] __ia32_sys_request_key+0x1f0/0x430 [ 166.467579] kobject: 'loop0' (000000008a1a76be): kobject_uevent_env [ 166.471861] ? __x64_sys_request_key+0x430/0x430 [ 166.471873] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 166.471889] ? entry_SYSENTER_compat+0x68/0x7f [ 166.475694] kobject: 'loop0' (000000008a1a76be): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 166.482079] ? trace_hardirqs_on+0x67/0x230 [ 166.482100] do_fast_syscall_32+0x281/0xc98 [ 166.486365] kobject: 'loop3' (00000000059c58ce): kobject_uevent_env [ 166.490007] entry_SYSENTER_compat+0x70/0x7f [ 166.490016] RIP: 0023:0xf7f0b869 [