[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 28.862194] kauditd_printk_skb: 7 callbacks suppressed [ 28.862205] audit: type=1800 audit(1545475535.143:29): pid=5878 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 28.894902] audit: type=1800 audit(1545475535.143:30): pid=5878 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 [....] startpar: service(s) returned failure: rsyslog ...[?25l[?1c7[FAIL8[?25h[?0c failed! Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 33.111414] sshd (6040) used greatest stack depth: 15728 bytes left Warning: Permanently added '10.128.0.111' (ECDSA) to the list of known hosts. 2018/12/22 10:45:46 fuzzer started 2018/12/22 10:45:48 dialing manager at 10.128.0.26:40341 2018/12/22 10:45:48 syscalls: 1 2018/12/22 10:45:48 code coverage: enabled 2018/12/22 10:45:48 comparison tracing: enabled 2018/12/22 10:45:48 setuid sandbox: enabled 2018/12/22 10:45:48 namespace sandbox: enabled 2018/12/22 10:45:48 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/22 10:45:48 fault injection: enabled 2018/12/22 10:45:48 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/22 10:45:48 net packet injection: enabled 2018/12/22 10:45:48 net device setup: enabled 10:48:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000001fc0)='./file0\x00', 0x40, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) close(r0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) fchownat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getpeername$inet6(r0, 0x0, &(0x7f0000000040)) add_key(0x0, 0x0, 0x0, 0xfffffffffffffe46, 0x0) [ 181.257543] IPVS: ftp: loaded support on port[0] = 21 10:48:07 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(0xffffffffffffffff, 0x0, 0x0) r2 = gettid() ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) r3 = fcntl$dupfd(r1, 0x0, r0) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) socket$unix(0x1, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) socket$netlink(0x10, 0x3, 0x0) shmctl$SHM_INFO(0x0, 0xe, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r3, 0x10e, 0x2, &(0x7f0000000040), 0x4) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmctl$SHM_INFO(0x0, 0xe, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) tkill(r2, 0x1000000000016) [ 181.541227] IPVS: ftp: loaded support on port[0] = 21 10:48:07 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) [ 181.836120] IPVS: ftp: loaded support on port[0] = 21 10:48:08 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x100000003) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0a5c2d023c126285718070") seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x400050000}]}) syz_execute_func(&(0x7f0000000000)="c46181e2b4f6ffa53a20c4427d786d0167f2440f34ffc427cc39f717c4dc75180f5f6500e97726b810ae0010ae00a5a563ad48eb9e9e7fd4be00aa6151ddb52ba38a4d381cb9a2e12226f242d64a59c4026dbfe244b3abe5b86736d1b2") syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="0090000000000000fffffdfc000000000000000000000000e0e51532000002000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) [ 182.216087] IPVS: ftp: loaded support on port[0] = 21 10:48:08 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x8, 0x20000) r1 = syz_open_dev$usbmon(&(0x7f00000003c0)='/dev/usbmon#\x00', 0x2, 0x2002) linkat(r0, &(0x7f0000000380)='./file0\x00', r1, &(0x7f0000000400)='./file0/file0\x00', 0x1400) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$trusted_overlay_opaque(r2, 0x0, &(0x7f0000000100)='y\x00', 0x2, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000440)={0x4, {{0xa, 0x4e23, 0x0, @mcast1, 0x3}}}, 0x88) fchmodat(r1, &(0x7f0000000500)='./file0\x00', 0x51) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000540)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000180)={{}, {0x20000000304, @link_local}, 0x4, {0x2, 0x0, @broadcast}, '\x00\x00\x00\x00\x01\x00\x00\x00\xff\xff\xff\xff\xff\xff\xf1\x00'}) [ 182.455977] IPVS: ftp: loaded support on port[0] = 21 10:48:09 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'\x00', 0x400}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x37, &(0x7f0000000240)}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x43732e5398416f1a}) [ 183.082168] IPVS: ftp: loaded support on port[0] = 21 [ 183.196981] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.220317] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.234647] device bridge_slave_0 entered promiscuous mode [ 183.393714] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.421797] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.439516] device bridge_slave_1 entered promiscuous mode [ 183.610732] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 183.806913] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 183.856449] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.872827] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.880925] device bridge_slave_0 entered promiscuous mode [ 183.982214] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.007940] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.015294] device bridge_slave_1 entered promiscuous mode [ 184.189984] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 184.214494] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.223349] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.249416] device bridge_slave_0 entered promiscuous mode [ 184.261940] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 184.317217] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 184.395003] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.416988] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.424697] device bridge_slave_1 entered promiscuous mode [ 184.442285] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 184.462672] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.486539] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.495222] device bridge_slave_0 entered promiscuous mode [ 184.554015] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 184.596091] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.616826] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.627805] device bridge_slave_1 entered promiscuous mode [ 184.675190] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 184.691522] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 184.707682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 184.718886] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 184.740347] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 184.796352] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 184.882466] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 184.909730] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.917700] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.937625] device bridge_slave_0 entered promiscuous mode [ 185.038463] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 185.049319] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.055691] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.078789] device bridge_slave_1 entered promiscuous mode [ 185.096707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 185.126301] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 185.143688] team0: Port device team_slave_0 added [ 185.188232] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 185.197849] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 185.217796] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 185.282034] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 185.300789] team0: Port device team_slave_1 added [ 185.333501] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 185.358327] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 185.397795] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 185.426147] ip (6370) used greatest stack depth: 15008 bytes left [ 185.459746] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 185.527158] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.550624] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.559467] device bridge_slave_0 entered promiscuous mode [ 185.573851] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 185.610899] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 185.628944] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 185.644813] team0: Port device team_slave_0 added [ 185.655683] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 185.670759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 185.698277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 185.715730] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 185.744009] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 185.755307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 185.776022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 185.785022] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.800833] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.808896] device bridge_slave_1 entered promiscuous mode [ 185.817601] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 185.825006] team0: Port device team_slave_1 added [ 185.834005] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 185.848115] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 185.854991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 185.878305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 185.918229] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 185.932515] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 185.960290] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 185.972316] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 185.986422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 186.008123] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 186.049382] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 186.056257] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 186.097134] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 186.162789] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 186.173223] team0: Port device team_slave_0 added [ 186.194485] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 186.211607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 186.228973] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 186.285463] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 186.293392] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 186.310056] team0: Port device team_slave_0 added [ 186.316504] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.325320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 186.355878] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 186.367503] team0: Port device team_slave_1 added [ 186.404874] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 186.433492] team0: Port device team_slave_1 added [ 186.447070] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 186.479388] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 186.518244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 186.539425] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 186.564762] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 186.582877] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 186.643625] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 186.650725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 186.666854] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 186.700770] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 186.713948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 186.728045] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 186.751160] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 186.764956] team0: Port device team_slave_0 added [ 186.772076] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 186.804922] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 186.814863] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.825010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 186.841729] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 186.853116] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.864579] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 186.911289] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 186.927356] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 186.934751] team0: Port device team_slave_1 added [ 186.948476] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 186.968049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 187.000155] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 187.009446] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 187.021301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 187.037259] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.058117] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 187.086044] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 187.106322] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 187.126724] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 187.148026] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 187.169909] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 187.240419] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 187.247522] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 187.258328] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 187.407751] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 187.418439] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 187.433417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 187.463827] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 187.498114] team0: Port device team_slave_0 added [ 187.506422] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.512937] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.519969] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.526341] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.549193] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 187.555820] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 187.576758] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.598781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 187.636520] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 187.651189] team0: Port device team_slave_1 added [ 187.657106] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 187.749850] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 187.757563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 187.765432] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 187.870514] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 187.888258] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 187.901226] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 187.976087] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 187.988056] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 188.012457] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 188.061320] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.067738] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.074425] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.080842] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.105980] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 188.127039] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 188.136763] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.153400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 188.633002] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.639442] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.646103] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.652554] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.662381] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 188.669965] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.707928] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.817728] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.824115] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.830852] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.837227] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.863285] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 188.873457] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.879873] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.886525] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.892925] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.903439] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 189.589346] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.595745] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.602458] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.608858] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.624207] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 189.750287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 189.766831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 189.788167] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 192.528624] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.090433] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 193.135900] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.484766] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 193.510050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.518717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.555559] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 193.852835] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.940628] 8021q: adding VLAN 0 to HW filter on device team0 [ 194.123550] 8021q: adding VLAN 0 to HW filter on device bond0 [ 194.135531] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 194.157535] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 194.207792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 194.240413] 8021q: adding VLAN 0 to HW filter on device bond0 [ 194.407244] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 194.600831] 8021q: adding VLAN 0 to HW filter on device team0 [ 194.636139] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 194.733349] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 194.862274] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 194.869434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 194.878378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.098871] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.173884] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 195.189521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 195.198558] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.225205] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 195.240890] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 195.258074] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.376137] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.588350] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 195.700468] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.714478] 8021q: adding VLAN 0 to HW filter on device team0 [ 196.028412] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 196.036422] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 196.044534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 196.571221] 8021q: adding VLAN 0 to HW filter on device team0 10:48:23 executing program 0: io_setup(0x20, &(0x7f0000000080)=0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000600)=""/246) io_submit(r0, 0x1, &(0x7f00000000c0)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 10:48:23 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) pipe2(0x0, 0x80000) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.cpus\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r1, 0x0, 0x7ffff000) 10:48:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r0, &(0x7f0000000900)=""/4096, 0x1000) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f00000001c0)={{0x3, 0x0, 0x3, 0x1}, 0x3, 0x0, 'id1\x00', 'timer1\x00', 0x0, 0xc5, 0x8, 0xcc97, 0x2}) ftruncate(r2, 0x80080) sendfile(r1, r2, 0x0, 0x200800100000001) 10:48:23 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x10, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR64=&(0x7f0000000200)=ANY=[@ANYBLOB="852a6273322e"], @ANYPTR64=&(0x7f0000000240)=ANY=[]], 0x0, 0x0, 0x0}) [ 197.398972] hrtimer: interrupt took 37150 ns [ 197.514077] binder: 7538:7539 unknown command 536871424 [ 197.535026] binder: 7538:7539 ioctl c0306201 200000c0 returned -22 [ 197.572572] binder_alloc: binder_alloc_mmap_handler: 7538 20001000-20004000 already mapped failed -16 [ 197.592938] binder: 7538:7544 unknown command 536871424 [ 197.600085] binder: BINDER_SET_CONTEXT_MGR already set 10:48:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r0, &(0x7f0000000900)=""/4096, 0x1000) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f00000001c0)={{0x3, 0x0, 0x3, 0x1}, 0x3, 0x0, 'id1\x00', 'timer1\x00', 0x0, 0xc5, 0x8, 0xcc97, 0x2}) ftruncate(r2, 0x80080) sendfile(r1, r2, 0x0, 0x200800100000001) [ 197.619449] binder: 7538:7539 ioctl 40046207 0 returned -16 [ 197.637734] binder: 7538:7544 ioctl c0306201 200000c0 returned -22 10:48:24 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) r0 = syz_open_procfs(0x0, 0x0) read(r0, &(0x7f0000000080)=""/140, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000260007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 10:48:24 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) [ 197.806184] netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. [ 197.819444] netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. 10:48:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r1, 0x0, 0x8, &(0x7f00000000c0)='bridge0\x00'}, 0x30) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740), 0x0, &(0x7f0000000040)=ANY=[]}, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000100)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7d7, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000340)={'vlan0\x00', @dev}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socket$kcm(0x11, 0x20000000000000a, 0x300) r3 = socket$kcm(0x2, 0x400000805, 0x0) sendmsg$kcm(r3, &(0x7f0000000740)={&(0x7f0000000640)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000200)}], 0x1}, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f00000000c0)) [ 198.011611] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 198.064941] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 198.239612] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 198.392722] syz-executor0 (7579) used greatest stack depth: 13512 bytes left [ 198.527488] [ 198.529157] ====================================================== [ 198.535475] WARNING: possible circular locking dependency detected [ 198.541799] 4.20.0-rc6-next-20181217+ #172 Not tainted [ 198.546763] kobject: 'loop1' (00000000e5d9ebce): kobject_uevent_env [ 198.547084] ------------------------------------------------------ [ 198.554790] kobject: 'loop1' (00000000e5d9ebce): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 198.559796] syz-executor4/7612 is trying to acquire lock: [ 198.559802] 00000000f6fa6616 (&tbl->lock){+.-.}, at: neigh_change_state+0x1dc/0x7a0 [ 198.559832] [ 198.559832] but task is already holding lock: [ 198.559836] 00000000ff4f3866 (&n->lock){++--}, at: __neigh_update+0xe6/0x1eb0 [ 198.595850] [ 198.595850] which lock already depends on the new lock. [ 198.595850] [ 198.604166] [ 198.604166] the existing dependency chain (in reverse order) is: [ 198.611775] [ 198.611775] -> #1 (&n->lock){++--}: [ 198.616973] _raw_write_lock+0x2d/0x40 [ 198.621426] neigh_periodic_work+0x3c0/0xc30 [ 198.626340] process_one_work+0xc90/0x1c40 [ 198.631086] worker_thread+0x17f/0x1390 [ 198.635575] kthread+0x35a/0x440 [ 198.639462] ret_from_fork+0x3a/0x50 [ 198.643682] [ 198.643682] -> #0 (&tbl->lock){+.-.}: [ 198.648984] lock_acquire+0x1ed/0x520 [ 198.653305] _raw_write_lock_bh+0x31/0x40 [ 198.657975] neigh_change_state+0x1dc/0x7a0 [ 198.662815] __neigh_update+0x478/0x1eb0 [ 198.667397] neigh_update+0x37/0x50 [ 198.671545] arp_req_set+0x54c/0xaa0 [ 198.675776] arp_ioctl+0x48b/0xae0 [ 198.679834] inet_ioctl+0x237/0x360 [ 198.683978] sock_do_ioctl+0xeb/0x420 [ 198.688292] sock_ioctl+0x313/0x690 [ 198.692444] do_vfs_ioctl+0x1de/0x1790 [ 198.696851] ksys_ioctl+0xa9/0xd0 [ 198.700824] __x64_sys_ioctl+0x73/0xb0 [ 198.705230] do_syscall_64+0x1b9/0x820 [ 198.709636] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.715349] [ 198.715349] other info that might help us debug this: [ 198.715349] [ 198.723488] Possible unsafe locking scenario: [ 198.723488] [ 198.729535] CPU0 CPU1 [ 198.734188] ---- ---- [ 198.738855] lock(&n->lock); [ 198.741964] lock(&tbl->lock); [ 198.747749] lock(&n->lock); [ 198.753363] lock(&tbl->lock); [ 198.756645] [ 198.756645] *** DEADLOCK *** [ 198.756645] [ 198.762714] 2 locks held by syz-executor4/7612: [ 198.767372] #0: 00000000764df585 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 198.774659] #1: 00000000ff4f3866 (&n->lock){++--}, at: __neigh_update+0xe6/0x1eb0 [ 198.782406] [ 198.782406] stack backtrace: [ 198.786905] CPU: 0 PID: 7612 Comm: syz-executor4 Not tainted 4.20.0-rc6-next-20181217+ #172 [ 198.795384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.804734] Call Trace: [ 198.807327] dump_stack+0x244/0x39d [ 198.810957] ? dump_stack_print_info.cold.1+0x20/0x20 [ 198.816144] ? vprintk_func+0x85/0x181 [ 198.820034] print_circular_bug.isra.36.cold.58+0x1bd/0x27d [ 198.825744] ? save_trace+0xe0/0x290 [ 198.829456] __lock_acquire+0x3399/0x4c20 [ 198.833613] ? mark_held_locks+0x130/0x130 [ 198.837856] ? kasan_check_read+0x11/0x20 [ 198.842002] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 198.847280] ? arp_constructor+0x3a5/0xd80 [ 198.851522] ? lock_downgrade+0x900/0x900 [ 198.855676] ? check_preemption_disabled+0x48/0x280 [ 198.860715] ? mark_held_locks+0x130/0x130 [ 198.864951] ? mark_held_locks+0xc7/0x130 [ 198.869100] ? __local_bh_enable_ip+0x160/0x260 [ 198.873767] ? __local_bh_enable_ip+0x160/0x260 [ 198.878436] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 198.883021] ? trace_hardirqs_on+0xbd/0x310 [ 198.887348] ? trace_hardirqs_off_caller+0x310/0x310 [ 198.892455] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 198.898001] ? ___neigh_create+0x1704/0x2630 [ 198.902404] ? ___neigh_create+0x1704/0x2630 [ 198.906816] lock_acquire+0x1ed/0x520 [ 198.910617] ? neigh_change_state+0x1dc/0x7a0 [ 198.915120] ? lock_release+0xa00/0xa00 [ 198.919102] _raw_write_lock_bh+0x31/0x40 [ 198.923249] ? neigh_change_state+0x1dc/0x7a0 [ 198.927745] neigh_change_state+0x1dc/0x7a0 [ 198.932068] ? neigh_parms_alloc+0x6d0/0x6d0 [ 198.936492] ? mark_held_locks+0xc7/0x130 [ 198.940649] ? kasan_check_write+0x14/0x20 [ 198.944907] ? do_raw_write_lock+0x14f/0x310 [ 198.949312] ? do_raw_read_unlock+0x70/0x70 [ 198.953635] ? neigh_lookup+0x586/0x7c0 [ 198.957623] ? trace_hardirqs_off_caller+0x310/0x310 [ 198.962740] __neigh_update+0x478/0x1eb0 [ 198.966801] ? __local_bh_enable_ip+0x160/0x260 [ 198.971472] ? arp_key_eq+0x10/0xa0 [ 198.975539] ? __neigh_notify+0x160/0x160 [ 198.979692] ? ip_route_output_key_hash_rcu+0x3490/0x3490 [ 198.985231] ? find_held_lock+0x36/0x1c0 [ 198.989292] neigh_update+0x37/0x50 [ 198.992920] arp_req_set+0x54c/0xaa0 [ 198.996648] ? arp_req_delete+0x870/0x870 [ 199.000799] ? apparmor_cred_prepare+0x5a0/0x5a0 [ 199.005555] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 199.011097] arp_ioctl+0x48b/0xae0 [ 199.014633] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 199.019833] ? arp_constructor+0xd80/0xd80 [ 199.024068] ? futex_wake+0x304/0x760 [ 199.027878] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 199.033327] inet_ioctl+0x237/0x360 [ 199.036958] ? inet_stream_connect+0xa0/0xa0 [ 199.041376] ? mark_held_locks+0x130/0x130 [ 199.045611] ? graph_lock+0x270/0x270 [ 199.049414] ? do_futex+0x249/0x26d0 [ 199.053168] ? copy_user_handle_tail+0x54/0xb0 [ 199.057753] ? .E_write_words+0x23/0x2e [ 199.061737] ? find_held_lock+0x36/0x1c0 [ 199.065799] sock_do_ioctl+0xeb/0x420 [ 199.069598] ? compat_ifr_data_ioctl+0x170/0x170 [ 199.074354] ? check_preemption_disabled+0x48/0x280 [ 199.079368] ? kasan_check_read+0x11/0x20 [ 199.083514] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 199.088817] ? rcu_read_unlock_special+0x370/0x370 [ 199.093752] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 199.098966] sock_ioctl+0x313/0x690 [ 199.102601] ? dlci_ioctl_set+0x40/0x40 [ 199.106579] ? ksys_dup3+0x680/0x680 [ 199.110293] ? __might_fault+0x12b/0x1e0 [ 199.114353] ? lock_downgrade+0x900/0x900 [ 199.118504] ? lock_release+0xa00/0xa00 [ 199.122476] ? perf_trace_sched_process_exec+0x860/0x860 [ 199.127923] ? dlci_ioctl_set+0x40/0x40 [ 199.131896] do_vfs_ioctl+0x1de/0x1790 [ 199.135785] ? ioctl_preallocate+0x300/0x300 [ 199.140195] ? __fget_light+0x2e9/0x430 [ 199.144170] ? fget_raw+0x20/0x20 [ 199.147623] ? _copy_to_user+0xc8/0x110 [ 199.151619] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 199.157163] ? put_timespec64+0x10f/0x1b0 [ 199.161313] ? nsecs_to_jiffies+0x30/0x30 [ 199.165463] ? do_syscall_64+0x9a/0x820 [ 199.169434] ? do_syscall_64+0x9a/0x820 [ 199.173404] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 199.177987] ? security_file_ioctl+0x94/0xc0 [ 199.182393] ksys_ioctl+0xa9/0xd0 [ 199.185844] __x64_sys_ioctl+0x73/0xb0 [ 199.189732] do_syscall_64+0x1b9/0x820 [ 199.193618] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 199.198989] ? syscall_return_slowpath+0x5e0/0x5e0 [ 199.203916] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 199.208764] ? trace_hardirqs_on_caller+0x310/0x310 [ 199.213777] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 199.218796] ? prepare_exit_to_usermode+0x291/0x3b0 [ 199.223815] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 199.228680] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 199.233863] RIP: 0033:0x457669 [ 199.237056] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 199.255951] RSP: 002b:00007f47ce422c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 199.263667] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669 [ 199.270945] RDX: 0000000020000180 RSI: 0000000000008955 RDI: 0000000000000006 [ 199.278208] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 199.285473] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f47ce4236d4 [ 199.292752] R13: 00000000004c2747 R14: 00000000004d46f8 R15: 00000000ffffffff [ 199.333085] kobject: 'loop4' (000000004400cba0): kobject_uevent_env [ 199.356155] kobject: 'loop4' (000000004400cba0): fill_kobj_path: path = '/devices/virtual/block/loop4' 10:48:25 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) [ 199.420290] kobject: 'loop2' (0000000002dde2ec): kobject_uevent_env [ 199.426773] kobject: 'loop2' (0000000002dde2ec): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 199.476227] kobject: 'loop2' (0000000002dde2ec): kobject_uevent_env [ 199.498173] kobject: 'loop2' (0000000002dde2ec): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 199.548443] kobject: 'loop2' (0000000002dde2ec): kobject_uevent_env [ 199.554889] kobject: 'loop2' (0000000002dde2ec): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 199.580985] kobject: 'loop3' (00000000e313bff6): kobject_uevent_env [ 199.590086] kobject: 'loop3' (00000000e313bff6): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 199.715459] kobject: 'loop3' (00000000e313bff6): kobject_uevent_env [ 199.723151] kobject: 'loop3' (00000000e313bff6): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 199.794310] kobject: 'loop5' (00000000e258ff7a): kobject_uevent_env [ 199.802235] ldm_validate_privheads(): Disk read failed. [ 199.808614] kobject: 'vet' (00000000b2fa64e3): kobject_add_internal: parent: 'net', set: 'devices' [ 199.817828] kobject: 'loop5' (00000000e258ff7a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 199.827846] Dev loop3: unable to read RDB block 1 [ 199.833087] loop3: unable to read partition table [ 199.839086] kobject: 'vet' (00000000b2fa64e3): kobject_uevent_env [ 199.845400] kobject: 'vet' (00000000b2fa64e3): fill_kobj_path: path = '/devices/virtual/net/vet' [ 199.854584] loop3: partition table beyond EOD, truncated [ 199.869708] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 199.877127] kobject: 'queues' (000000001107dba9): kobject_add_internal: parent: 'vet', set: '' [ 199.887045] kobject: 'queues' (000000001107dba9): kobject_uevent_env [ 199.893715] kobject: 'queues' (000000001107dba9): kobject_uevent_env: filter function caused the event to drop! [ 199.904153] kobject: 'rx-0' (00000000bc716a13): kobject_add_internal: parent: 'queues', set: 'queues' [ 199.914204] kobject: 'rx-0' (00000000bc716a13): kobject_uevent_env [ 199.920739] kobject: 'rx-0' (00000000bc716a13): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 199.931124] kobject: 'tx-0' (000000000724f08b): kobject_add_internal: parent: 'queues', set: 'queues' [ 199.940705] kobject: 'loop3' (00000000e313bff6): kobject_uevent_env [ 199.947223] kobject: 'loop3' (00000000e313bff6): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 199.956971] kobject: 'tx-0' (000000000724f08b): kobject_uevent_env [ 199.963766] kobject: 'tx-0' (000000000724f08b): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 199.978795] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 199.993696] kobject: 'tx-1' (000000000a1ef3ba): kobject_add_internal: parent: 'queues', set: 'queues' [ 200.003314] kobject: 'tx-1' (000000000a1ef3ba): kobject_uevent_env [ 200.009912] kobject: 'tx-1' (000000000a1ef3ba): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-1' [ 200.020240] kobject: 'rx-1' (00000000b4e1ac88): kobject_add_internal: parent: 'queues', set: 'queues' [ 200.029910] kobject: 'rx-1' (00000000b4e1ac88): kobject_uevent_env [ 200.036255] kobject: 'rx-1' (00000000b4e1ac88): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-1' [ 200.046966] kobject: 'tx-1' (000000000a1ef3ba): kobject_cleanup, parent 000000001107dba9 [ 200.055502] kobject: 'tx-1' (000000000a1ef3ba): auto cleanup 'remove' event [ 200.062828] kobject: 'tx-1' (000000000a1ef3ba): kobject_uevent_env [ 200.069732] kobject: 'tx-1' (000000000a1ef3ba): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-1' [ 200.080061] kobject: 'tx-1' (000000000a1ef3ba): auto cleanup kobject_del [ 200.086974] kobject: 'tx-1' (000000000a1ef3ba): calling ktype release [ 200.093844] kobject: 'tx-1': free name [ 200.098282] kobject: 'rx-1' (00000000b4e1ac88): kobject_cleanup, parent 000000001107dba9 [ 200.106987] kobject: 'rx-1' (00000000b4e1ac88): auto cleanup 'remove' event [ 200.114394] kobject: 'rx-1' (00000000b4e1ac88): kobject_uevent_env [ 200.120972] kobject: 'rx-1' (00000000b4e1ac88): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-1' [ 200.131313] kobject: 'rx-1' (00000000b4e1ac88): auto cleanup kobject_del [ 200.138397] kobject: 'rx-1' (00000000b4e1ac88): calling ktype release [ 200.145026] kobject: 'rx-1': free name [ 200.151375] kobject: 'rx-0' (00000000bc716a13): kobject_cleanup, parent 000000001107dba9 [ 200.159802] kobject: 'rx-0' (00000000bc716a13): auto cleanup 'remove' event [ 200.166952] kobject: 'rx-0' (00000000bc716a13): kobject_uevent_env [ 200.173591] kobject: 'rx-0' (00000000bc716a13): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 200.184008] kobject: 'rx-0' (00000000bc716a13): auto cleanup kobject_del [ 200.191181] kobject: 'rx-0' (00000000bc716a13): calling ktype release [ 200.198181] kobject: 'rx-0': free name [ 200.202156] kobject: 'tx-0' (000000000724f08b): kobject_cleanup, parent 000000001107dba9 [ 200.210616] kobject: 'tx-0' (000000000724f08b): auto cleanup 'remove' event [ 200.217932] kobject: 'tx-0' (000000000724f08b): kobject_uevent_env [ 200.224326] kobject: 'tx-0' (000000000724f08b): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 200.234746] kobject: 'tx-0' (000000000724f08b): auto cleanup kobject_del [ 200.241846] kobject: 'tx-0' (000000000724f08b): calling ktype release [ 200.248686] kobject: 'tx-0': free name [ 200.252635] kobject: 'queues' (000000001107dba9): kobject_cleanup, parent (null) [ 200.261284] kobject: 'queues' (000000001107dba9): calling ktype release [ 200.268255] kobject: 'queues' (000000001107dba9): kset_release [ 200.274277] kobject: 'queues': free name [ 200.278904] kobject: 'vet' (00000000b2fa64e3): kobject_uevent_env [ 200.285217] kobject: 'vet' (00000000b2fa64e3): fill_kobj_path: path = '/devices/virtual/net/vet' [ 200.337632] kobject: 'vet' (00000000b2fa64e3): kobject_cleanup, parent (null) [ 200.345916] kobject: 'vet' (00000000b2fa64e3): calling ktype release [ 200.353115] kobject: 'vet': free name [ 200.371086] kobject: 'loop5' (00000000e258ff7a): kobject_uevent_env [ 200.378756] kobject: 'loop5' (00000000e258ff7a): fill_kobj_path: path = '/devices/virtual/block/loop5' 10:48:26 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000640)='/dev/audio\x00', 0x200, 0x0) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r2 = dup2(0xffffffffffffffff, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[]}}, 0x44801) sendmsg$FOU_CMD_DEL(r2, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) sendmmsg(r0, &(0x7f000000b200)=[{{&(0x7f0000000c40)=@sco={0x1f, {0x0, 0x3, 0x8, 0x5, 0xfff, 0x9}}, 0x80, &(0x7f0000001040)=[{&(0x7f0000000f80)}], 0x1, 0x0, 0x0, 0x4010}, 0x3}, {{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001580)="8712b9d2eac0c3e8", 0x8}], 0x1, 0x0, 0x0, 0x40000}, 0x6}, {{&(0x7f0000003a00)=@llc={0x1a, 0x20, 0x9, 0x4, 0x40, 0x0, @remote}, 0x80, &(0x7f0000005ec0)=[{&(0x7f0000005e80)="2f816e40a63798", 0x7}], 0x1, 0x0, 0x0, 0x4010}, 0x4}, {{&(0x7f00000073c0)=@nfc_llcp={0x27, 0x1, 0x2, 0x6, 0x8458, 0x3, "72b7daee95a4fdbd379091c7a865a3578567e7be515630460de5a30e0e1d22848983b991229dc2e2bf1a79d141b615dce9db19feb8f30d4850a30d433890a4", 0x11}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xc001}, 0x4}, {{&(0x7f0000008640)=@nfc={0x27, 0x1, 0x0, 0x2}, 0x80, &(0x7f0000008800)=[{&(0x7f00000086c0)="0f19573ee4a8880e4998e05da4d37deea8b852e8cfe50e85ae57ad49c40682dfd08cb57f2ac68d8d", 0x28}], 0x1, 0x0, 0x0, 0x404c080}, 0x49}, {{&(0x7f0000009e40)=@nfc_llcp={0x27, 0x0, 0x1, 0x7, 0x0, 0x0, "8fa4820a3a40762372dd4f860830a61bc54ba8bf3a42b5ea421d59d621435941515249ff71563aed3851c241032c62ba445eb1aeadac189e70eaebcc6122f7", 0x1a}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x24000000}, 0xffe0}], 0x6, 0x80) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f0000000440)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000480)) 10:48:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r1, 0x0, 0x8, &(0x7f00000000c0)='bridge0\x00'}, 0x30) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740), 0x0, &(0x7f0000000040)=ANY=[]}, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000100)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7d7, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000340)={'vlan0\x00', @dev}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socket$kcm(0x11, 0x20000000000000a, 0x300) r3 = socket$kcm(0x2, 0x400000805, 0x0) sendmsg$kcm(r3, &(0x7f0000000740)={&(0x7f0000000640)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000200)}], 0x1}, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f00000000c0)) 10:48:26 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x8, 0x20000) r1 = syz_open_dev$usbmon(&(0x7f00000003c0)='/dev/usbmon#\x00', 0x2, 0x2002) linkat(r0, &(0x7f0000000380)='./file0\x00', r1, &(0x7f0000000400)='./file0/file0\x00', 0x1400) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$trusted_overlay_opaque(r2, 0x0, &(0x7f0000000100)='y\x00', 0x2, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000440)={0x4, {{0xa, 0x4e23, 0x0, @mcast1, 0x3}}}, 0x88) fchmodat(r1, &(0x7f0000000500)='./file0\x00', 0x51) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000540)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000180)={{}, {0x20000000304, @link_local}, 0x4, {0x2, 0x0, @broadcast}, '\x00\x00\x00\x00\x01\x00\x00\x00\xff\xff\xff\xff\xff\xff\xf1\x00'}) 10:48:26 executing program 2: semget(0x2, 0x3, 0x0) 10:48:26 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x100000003) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0a5c2d023c126285718070") seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x400050000}]}) syz_execute_func(&(0x7f0000000000)="c46181e2b4f6ffa53a20c4427d786d0167f2440f34ffc427cc39f717c4dc75180f5f6500e97726b810ae0010ae00a5a563ad48eb9e9e7fd4be00aa6151ddb52ba38a4d381cb9a2e12226f242d64a59c4026dbfe244b3abe5b86736d1b2") syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="0090000000000000fffffdfc000000000000000000000000e0e51532000002000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) 10:48:26 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'\x00', 0x400}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x37, &(0x7f0000000240)}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x43732e5398416f1a}) 10:48:26 executing program 2: semget(0x2, 0x3, 0x0) [ 200.479489] kobject: 'loop3' (00000000e313bff6): kobject_uevent_env [ 200.485964] kobject: 'loop3' (00000000e313bff6): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 200.508321] kobject: 'vet' (000000003d31fe1a): kobject_add_internal: parent: 'net', set: 'devices' 10:48:26 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000640)='/dev/audio\x00', 0x200, 0x0) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r2 = dup2(0xffffffffffffffff, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[]}}, 0x44801) sendmsg$FOU_CMD_DEL(r2, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) sendmmsg(r0, &(0x7f000000b200)=[{{&(0x7f0000000c40)=@sco={0x1f, {0x0, 0x3, 0x8, 0x5, 0xfff, 0x9}}, 0x80, &(0x7f0000001040)=[{&(0x7f0000000f80)}], 0x1, 0x0, 0x0, 0x4010}, 0x3}, {{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001580)="8712b9d2eac0c3e8", 0x8}], 0x1, 0x0, 0x0, 0x40000}, 0x6}, {{&(0x7f0000003a00)=@llc={0x1a, 0x20, 0x9, 0x4, 0x40, 0x0, @remote}, 0x80, &(0x7f0000005ec0)=[{&(0x7f0000005e80)="2f816e40a63798", 0x7}], 0x1, 0x0, 0x0, 0x4010}, 0x4}, {{&(0x7f00000073c0)=@nfc_llcp={0x27, 0x1, 0x2, 0x6, 0x8458, 0x3, "72b7daee95a4fdbd379091c7a865a3578567e7be515630460de5a30e0e1d22848983b991229dc2e2bf1a79d141b615dce9db19feb8f30d4850a30d433890a4", 0x11}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xc001}, 0x4}, {{&(0x7f0000008640)=@nfc={0x27, 0x1, 0x0, 0x2}, 0x80, &(0x7f0000008800)=[{&(0x7f00000086c0)="0f19573ee4a8880e4998e05da4d37deea8b852e8cfe50e85ae57ad49c40682dfd08cb57f2ac68d8d", 0x28}], 0x1, 0x0, 0x0, 0x404c080}, 0x49}, {{&(0x7f0000009e40)=@nfc_llcp={0x27, 0x0, 0x1, 0x7, 0x0, 0x0, "8fa4820a3a40762372dd4f860830a61bc54ba8bf3a42b5ea421d59d621435941515249ff71563aed3851c241032c62ba445eb1aeadac189e70eaebcc6122f7", 0x1a}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x24000000}, 0xffe0}], 0x6, 0x80) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f0000000440)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000480)) 10:48:26 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x8, 0x20000) r1 = syz_open_dev$usbmon(&(0x7f00000003c0)='/dev/usbmon#\x00', 0x2, 0x2002) linkat(r0, &(0x7f0000000380)='./file0\x00', r1, &(0x7f0000000400)='./file0/file0\x00', 0x1400) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$trusted_overlay_opaque(r2, 0x0, &(0x7f0000000100)='y\x00', 0x2, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000440)={0x4, {{0xa, 0x4e23, 0x0, @mcast1, 0x3}}}, 0x88) fchmodat(r1, &(0x7f0000000500)='./file0\x00', 0x51) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000540)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000180)={{}, {0x20000000304, @link_local}, 0x4, {0x2, 0x0, @broadcast}, '\x00\x00\x00\x00\x01\x00\x00\x00\xff\xff\xff\xff\xff\xff\xf1\x00'}) [ 200.528387] kobject: 'vet' (000000003d31fe1a): kobject_uevent_env [ 200.530108] kobject: 'loop1' (00000000e5d9ebce): kobject_uevent_env [ 200.539231] kobject: 'vet' (000000003d31fe1a): fill_kobj_path: path = '/devices/virtual/net/vet' [ 200.557891] kobject: 'loop1' (00000000e5d9ebce): fill_kobj_path: path = '/devices/virtual/block/loop1' 10:48:26 executing program 2: semget(0x2, 0x3, 0x0) 10:48:26 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000640)='/dev/audio\x00', 0x200, 0x0) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r2 = dup2(0xffffffffffffffff, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[]}}, 0x44801) sendmsg$FOU_CMD_DEL(r2, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) sendmmsg(r0, &(0x7f000000b200)=[{{&(0x7f0000000c40)=@sco={0x1f, {0x0, 0x3, 0x8, 0x5, 0xfff, 0x9}}, 0x80, &(0x7f0000001040)=[{&(0x7f0000000f80)}], 0x1, 0x0, 0x0, 0x4010}, 0x3}, {{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001580)="8712b9d2eac0c3e8", 0x8}], 0x1, 0x0, 0x0, 0x40000}, 0x6}, {{&(0x7f0000003a00)=@llc={0x1a, 0x20, 0x9, 0x4, 0x40, 0x0, @remote}, 0x80, &(0x7f0000005ec0)=[{&(0x7f0000005e80)="2f816e40a63798", 0x7}], 0x1, 0x0, 0x0, 0x4010}, 0x4}, {{&(0x7f00000073c0)=@nfc_llcp={0x27, 0x1, 0x2, 0x6, 0x8458, 0x3, "72b7daee95a4fdbd379091c7a865a3578567e7be515630460de5a30e0e1d22848983b991229dc2e2bf1a79d141b615dce9db19feb8f30d4850a30d433890a4", 0x11}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xc001}, 0x4}, {{&(0x7f0000008640)=@nfc={0x27, 0x1, 0x0, 0x2}, 0x80, &(0x7f0000008800)=[{&(0x7f00000086c0)="0f19573ee4a8880e4998e05da4d37deea8b852e8cfe50e85ae57ad49c40682dfd08cb57f2ac68d8d", 0x28}], 0x1, 0x0, 0x0, 0x404c080}, 0x49}, {{&(0x7f0000009e40)=@nfc_llcp={0x27, 0x0, 0x1, 0x7, 0x0, 0x0, "8fa4820a3a40762372dd4f860830a61bc54ba8bf3a42b5ea421d59d621435941515249ff71563aed3851c241032c62ba445eb1aeadac189e70eaebcc6122f7", 0x1a}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x24000000}, 0xffe0}], 0x6, 0x80) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f0000000440)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000480)) [ 200.597773] kobject: 'loop2' (0000000002dde2ec): kobject_uevent_env [ 200.600791] kobject: 'queues' (0000000023f49e3f): kobject_add_internal: parent: 'vet', set: '' [ 200.612457] kobject: 'loop2' (0000000002dde2ec): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 200.636554] kobject: 'loop4' (000000004400cba0): kobject_uevent_env 10:48:27 executing program 2: semget(0x2, 0x3, 0x0) [ 200.660772] kobject: 'loop4' (000000004400cba0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 200.667669] kobject: 'queues' (0000000023f49e3f): kobject_uevent_env [ 200.691312] kobject: 'queues' (0000000023f49e3f): kobject_uevent_env: filter function caused the event to drop! [ 200.702872] kobject: 'loop3' (00000000e313bff6): kobject_uevent_env 10:48:27 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000640)='/dev/audio\x00', 0x200, 0x0) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r2 = dup2(0xffffffffffffffff, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[]}}, 0x44801) sendmsg$FOU_CMD_DEL(r2, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) sendmmsg(r0, &(0x7f000000b200)=[{{&(0x7f0000000c40)=@sco={0x1f, {0x0, 0x3, 0x8, 0x5, 0xfff, 0x9}}, 0x80, &(0x7f0000001040)=[{&(0x7f0000000f80)}], 0x1, 0x0, 0x0, 0x4010}, 0x3}, {{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001580)="8712b9d2eac0c3e8", 0x8}], 0x1, 0x0, 0x0, 0x40000}, 0x6}, {{&(0x7f0000003a00)=@llc={0x1a, 0x20, 0x9, 0x4, 0x40, 0x0, @remote}, 0x80, &(0x7f0000005ec0)=[{&(0x7f0000005e80)="2f816e40a63798", 0x7}], 0x1, 0x0, 0x0, 0x4010}, 0x4}, {{&(0x7f00000073c0)=@nfc_llcp={0x27, 0x1, 0x2, 0x6, 0x8458, 0x3, "72b7daee95a4fdbd379091c7a865a3578567e7be515630460de5a30e0e1d22848983b991229dc2e2bf1a79d141b615dce9db19feb8f30d4850a30d433890a4", 0x11}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xc001}, 0x4}, {{&(0x7f0000008640)=@nfc={0x27, 0x1, 0x0, 0x2}, 0x80, &(0x7f0000008800)=[{&(0x7f00000086c0)="0f19573ee4a8880e4998e05da4d37deea8b852e8cfe50e85ae57ad49c40682dfd08cb57f2ac68d8d", 0x28}], 0x1, 0x0, 0x0, 0x404c080}, 0x49}, {{&(0x7f0000009e40)=@nfc_llcp={0x27, 0x0, 0x1, 0x7, 0x0, 0x0, "8fa4820a3a40762372dd4f860830a61bc54ba8bf3a42b5ea421d59d621435941515249ff71563aed3851c241032c62ba445eb1aeadac189e70eaebcc6122f7", 0x1a}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x24000000}, 0xffe0}], 0x6, 0x80) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f0000000440)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000480)) [ 200.723702] kobject: 'rx-0' (00000000cfd16e73): kobject_add_internal: parent: 'queues', set: 'queues' [ 200.730679] kobject: 'loop3' (00000000e313bff6): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 200.743781] kobject: 'rx-0' (00000000cfd16e73): kobject_uevent_env [ 200.750740] kobject: 'rx-0' (00000000cfd16e73): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 200.761387] kobject: 'tx-0' (00000000d667f038): kobject_add_internal: parent: 'queues', set: 'queues' [ 200.779379] kobject: 'loop1' (00000000e5d9ebce): kobject_uevent_env [ 200.799745] kobject: 'loop1' (00000000e5d9ebce): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 200.802417] kobject: 'tx-0' (00000000d667f038): kobject_uevent_env [ 200.839399] kobject: 'tx-0' (00000000d667f038): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 200.854712] kobject: 'loop2' (0000000002dde2ec): kobject_uevent_env [ 200.862481] ldm_validate_privheads(): Disk read failed. [ 200.880058] kobject: 'loop2' (0000000002dde2ec): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 200.895772] Dev loop3: unable to read RDB block 1 [ 200.920821] kobject: 'loop4' (000000004400cba0): kobject_uevent_env [ 200.927266] kobject: 'loop4' (000000004400cba0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 200.928219] loop3: unable to read partition table [ 200.954601] loop3: partition table beyond EOD, truncated [ 200.967384] kobject: 'rx-0' (00000000cfd16e73): kobject_cleanup, parent 0000000023f49e3f [ 200.970056] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 200.975621] kobject: 'rx-0' (00000000cfd16e73): auto cleanup 'remove' event [ 200.975630] kobject: 'rx-0' (00000000cfd16e73): kobject_uevent_env [ 200.975676] kobject: 'rx-0' (00000000cfd16e73): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 200.975743] kobject: 'rx-0' (00000000cfd16e73): auto cleanup kobject_del [ 201.018149] kobject: 'loop3' (00000000e313bff6): kobject_uevent_env [ 201.025848] kobject: 'loop3' (00000000e313bff6): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 201.027595] kobject: 'rx-0' (00000000cfd16e73): calling ktype release [ 201.041934] kobject: 'rx-0': free name [ 201.045859] kobject: 'tx-0' (00000000d667f038): kobject_cleanup, parent 0000000023f49e3f [ 201.055477] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 201.060529] kobject: 'tx-0' (00000000d667f038): auto cleanup 'remove' event 10:48:27 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000640)='/dev/audio\x00', 0x200, 0x0) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r2 = dup2(0xffffffffffffffff, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[]}}, 0x44801) sendmsg$FOU_CMD_DEL(r2, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) sendmmsg(r0, &(0x7f000000b200)=[{{&(0x7f0000000c40)=@sco={0x1f, {0x0, 0x3, 0x8, 0x5, 0xfff, 0x9}}, 0x80, &(0x7f0000001040)=[{&(0x7f0000000f80)}], 0x1, 0x0, 0x0, 0x4010}, 0x3}, {{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001580)="8712b9d2eac0c3e8", 0x8}], 0x1, 0x0, 0x0, 0x40000}, 0x6}, {{&(0x7f0000003a00)=@llc={0x1a, 0x20, 0x9, 0x4, 0x40, 0x0, @remote}, 0x80, &(0x7f0000005ec0)=[{&(0x7f0000005e80)="2f816e40a63798", 0x7}], 0x1, 0x0, 0x0, 0x4010}, 0x4}, {{&(0x7f00000073c0)=@nfc_llcp={0x27, 0x1, 0x2, 0x6, 0x8458, 0x3, "72b7daee95a4fdbd379091c7a865a3578567e7be515630460de5a30e0e1d22848983b991229dc2e2bf1a79d141b615dce9db19feb8f30d4850a30d433890a4", 0x11}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xc001}, 0x4}, {{&(0x7f0000008640)=@nfc={0x27, 0x1, 0x0, 0x2}, 0x80, &(0x7f0000008800)=[{&(0x7f00000086c0)="0f19573ee4a8880e4998e05da4d37deea8b852e8cfe50e85ae57ad49c40682dfd08cb57f2ac68d8d", 0x28}], 0x1, 0x0, 0x0, 0x404c080}, 0x49}, {{&(0x7f0000009e40)=@nfc_llcp={0x27, 0x0, 0x1, 0x7, 0x0, 0x0, "8fa4820a3a40762372dd4f860830a61bc54ba8bf3a42b5ea421d59d621435941515249ff71563aed3851c241032c62ba445eb1aeadac189e70eaebcc6122f7", 0x1a}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x24000000}, 0xffe0}], 0x6, 0x80) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f0000000440)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000480)) 10:48:27 executing program 2: semget(0xffffffffffffffff, 0x3, 0x0) 10:48:27 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000640)='/dev/audio\x00', 0x200, 0x0) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r2 = dup2(0xffffffffffffffff, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[]}}, 0x44801) sendmsg$FOU_CMD_DEL(r2, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) sendmmsg(r0, &(0x7f000000b200)=[{{&(0x7f0000000c40)=@sco={0x1f, {0x0, 0x3, 0x8, 0x5, 0xfff, 0x9}}, 0x80, &(0x7f0000001040)=[{&(0x7f0000000f80)}], 0x1, 0x0, 0x0, 0x4010}, 0x3}, {{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001580)="8712b9d2eac0c3e8", 0x8}], 0x1, 0x0, 0x0, 0x40000}, 0x6}, {{&(0x7f0000003a00)=@llc={0x1a, 0x20, 0x9, 0x4, 0x40, 0x0, @remote}, 0x80, &(0x7f0000005ec0)=[{&(0x7f0000005e80)="2f816e40a63798", 0x7}], 0x1, 0x0, 0x0, 0x4010}, 0x4}, {{&(0x7f00000073c0)=@nfc_llcp={0x27, 0x1, 0x2, 0x6, 0x8458, 0x3, "72b7daee95a4fdbd379091c7a865a3578567e7be515630460de5a30e0e1d22848983b991229dc2e2bf1a79d141b615dce9db19feb8f30d4850a30d433890a4", 0x11}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xc001}, 0x4}, {{&(0x7f0000008640)=@nfc={0x27, 0x1, 0x0, 0x2}, 0x80, &(0x7f0000008800)=[{&(0x7f00000086c0)="0f19573ee4a8880e4998e05da4d37deea8b852e8cfe50e85ae57ad49c40682dfd08cb57f2ac68d8d", 0x28}], 0x1, 0x0, 0x0, 0x404c080}, 0x49}, {{&(0x7f0000009e40)=@nfc_llcp={0x27, 0x0, 0x1, 0x7, 0x0, 0x0, "8fa4820a3a40762372dd4f860830a61bc54ba8bf3a42b5ea421d59d621435941515249ff71563aed3851c241032c62ba445eb1aeadac189e70eaebcc6122f7", 0x1a}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x24000000}, 0xffe0}], 0x6, 0x80) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) [ 201.082918] kobject: 'loop0' (000000001f64c8ea): kobject_uevent_env [ 201.087250] kobject: 'tx-0' (00000000d667f038): kobject_uevent_env [ 201.104227] kobject: 'loop0' (000000001f64c8ea): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 201.104469] kobject: 'tx-0' (00000000d667f038): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 201.148298] kobject: 'loop2' (0000000002dde2ec): kobject_uevent_env [ 201.148313] kobject: 'tx-0' (00000000d667f038): auto cleanup kobject_del [ 201.163449] kobject: 'tx-0' (00000000d667f038): calling ktype release [ 201.164061] kobject: 'loop2' (0000000002dde2ec): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 201.174930] kobject: 'tx-0': free name [ 201.184817] kobject: 'queues' (0000000023f49e3f): kobject_cleanup, parent (null) [ 201.195715] kobject: 'loop1' (00000000e5d9ebce): kobject_uevent_env [ 201.204276] kobject: 'queues' (0000000023f49e3f): calling ktype release [ 201.210233] kobject: 'loop1' (00000000e5d9ebce): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 201.217747] kobject: 'queues' (0000000023f49e3f): kset_release [ 201.229587] kobject: 'queues': free name [ 201.234094] kobject: 'vet' (000000003d31fe1a): kobject_uevent_env [ 201.246717] kobject: 'vet' (000000003d31fe1a): fill_kobj_path: path = '/devices/virtual/net/vet' [ 201.287465] kobject: 'vet' (000000003d31fe1a): kobject_cleanup, parent (null) 10:48:27 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x100000003) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0a5c2d023c126285718070") seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x400050000}]}) syz_execute_func(&(0x7f0000000000)="c46181e2b4f6ffa53a20c4427d786d0167f2440f34ffc427cc39f717c4dc75180f5f6500e97726b810ae0010ae00a5a563ad48eb9e9e7fd4be00aa6151ddb52ba38a4d381cb9a2e12226f242d64a59c4026dbfe244b3abe5b86736d1b2") syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="0090000000000000fffffdfc000000000000000000000000e0e51532000002000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) 10:48:27 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x8, 0x20000) r1 = syz_open_dev$usbmon(&(0x7f00000003c0)='/dev/usbmon#\x00', 0x2, 0x2002) linkat(r0, &(0x7f0000000380)='./file0\x00', r1, &(0x7f0000000400)='./file0/file0\x00', 0x1400) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$trusted_overlay_opaque(r2, 0x0, &(0x7f0000000100)='y\x00', 0x2, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000440)={0x4, {{0xa, 0x4e23, 0x0, @mcast1, 0x3}}}, 0x88) fchmodat(r1, &(0x7f0000000500)='./file0\x00', 0x51) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000540)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000180)={{}, {0x20000000304, @link_local}, 0x4, {0x2, 0x0, @broadcast}, '\x00\x00\x00\x00\x01\x00\x00\x00\xff\xff\xff\xff\xff\xff\xf1\x00'}) 10:48:27 executing program 2: semget(0xffffffffffffffff, 0x3, 0x0) 10:48:27 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000640)='/dev/audio\x00', 0x200, 0x0) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r2 = dup2(0xffffffffffffffff, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[]}}, 0x44801) sendmsg$FOU_CMD_DEL(r2, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) sendmmsg(r0, &(0x7f000000b200)=[{{&(0x7f0000000c40)=@sco={0x1f, {0x0, 0x3, 0x8, 0x5, 0xfff, 0x9}}, 0x80, &(0x7f0000001040)=[{&(0x7f0000000f80)}], 0x1, 0x0, 0x0, 0x4010}, 0x3}, {{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001580)="8712b9d2eac0c3e8", 0x8}], 0x1, 0x0, 0x0, 0x40000}, 0x6}, {{&(0x7f0000003a00)=@llc={0x1a, 0x20, 0x9, 0x4, 0x40, 0x0, @remote}, 0x80, &(0x7f0000005ec0)=[{&(0x7f0000005e80)="2f816e40a63798", 0x7}], 0x1, 0x0, 0x0, 0x4010}, 0x4}, {{&(0x7f00000073c0)=@nfc_llcp={0x27, 0x1, 0x2, 0x6, 0x8458, 0x3, "72b7daee95a4fdbd379091c7a865a3578567e7be515630460de5a30e0e1d22848983b991229dc2e2bf1a79d141b615dce9db19feb8f30d4850a30d433890a4", 0x11}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xc001}, 0x4}, {{&(0x7f0000008640)=@nfc={0x27, 0x1, 0x0, 0x2}, 0x80, &(0x7f0000008800)=[{&(0x7f00000086c0)="0f19573ee4a8880e4998e05da4d37deea8b852e8cfe50e85ae57ad49c40682dfd08cb57f2ac68d8d", 0x28}], 0x1, 0x0, 0x0, 0x404c080}, 0x49}, {{&(0x7f0000009e40)=@nfc_llcp={0x27, 0x0, 0x1, 0x7, 0x0, 0x0, "8fa4820a3a40762372dd4f860830a61bc54ba8bf3a42b5ea421d59d621435941515249ff71563aed3851c241032c62ba445eb1aeadac189e70eaebcc6122f7", 0x1a}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x24000000}, 0xffe0}], 0x6, 0x80) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) 10:48:27 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000640)='/dev/audio\x00', 0x200, 0x0) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r2 = dup2(0xffffffffffffffff, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[]}}, 0x44801) sendmsg$FOU_CMD_DEL(r2, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) sendmmsg(r0, &(0x7f000000b200)=[{{&(0x7f0000000c40)=@sco={0x1f, {0x0, 0x3, 0x8, 0x5, 0xfff, 0x9}}, 0x80, &(0x7f0000001040)=[{&(0x7f0000000f80)}], 0x1, 0x0, 0x0, 0x4010}, 0x3}, {{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001580)="8712b9d2eac0c3e8", 0x8}], 0x1, 0x0, 0x0, 0x40000}, 0x6}, {{&(0x7f0000003a00)=@llc={0x1a, 0x20, 0x9, 0x4, 0x40, 0x0, @remote}, 0x80, &(0x7f0000005ec0)=[{&(0x7f0000005e80)="2f816e40a63798", 0x7}], 0x1, 0x0, 0x0, 0x4010}, 0x4}, {{&(0x7f00000073c0)=@nfc_llcp={0x27, 0x1, 0x2, 0x6, 0x8458, 0x3, "72b7daee95a4fdbd379091c7a865a3578567e7be515630460de5a30e0e1d22848983b991229dc2e2bf1a79d141b615dce9db19feb8f30d4850a30d433890a4", 0x11}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xc001}, 0x4}, {{&(0x7f0000008640)=@nfc={0x27, 0x1, 0x0, 0x2}, 0x80, &(0x7f0000008800)=[{&(0x7f00000086c0)="0f19573ee4a8880e4998e05da4d37deea8b852e8cfe50e85ae57ad49c40682dfd08cb57f2ac68d8d", 0x28}], 0x1, 0x0, 0x0, 0x404c080}, 0x49}, {{&(0x7f0000009e40)=@nfc_llcp={0x27, 0x0, 0x1, 0x7, 0x0, 0x0, "8fa4820a3a40762372dd4f860830a61bc54ba8bf3a42b5ea421d59d621435941515249ff71563aed3851c241032c62ba445eb1aeadac189e70eaebcc6122f7", 0x1a}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x24000000}, 0xffe0}], 0x6, 0x80) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f0000000440)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000480)) 10:48:27 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'\x00', 0x400}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x37, &(0x7f0000000240)}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x43732e5398416f1a}) [ 201.295611] kobject: 'vet' (000000003d31fe1a): calling ktype release [ 201.302439] kobject: 'vet': free name [ 201.319965] kobject: 'loop5' (00000000e258ff7a): kobject_uevent_env [ 201.326468] kobject: 'loop5' (00000000e258ff7a): fill_kobj_path: path = '/devices/virtual/block/loop5' 10:48:27 executing program 2: semget(0xffffffffffffffff, 0x3, 0x0) [ 201.364726] kobject: 'loop3' (00000000e313bff6): kobject_uevent_env [ 201.377902] kobject: 'vet' (00000000d80bd20d): kobject_add_internal: parent: 'net', set: 'devices' [ 201.382486] kobject: 'loop3' (00000000e313bff6): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 201.408586] kobject: 'vet' (00000000d80bd20d): kobject_uevent_env 10:48:27 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000640)='/dev/audio\x00', 0x200, 0x0) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r2 = dup2(0xffffffffffffffff, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[]}}, 0x44801) sendmsg$FOU_CMD_DEL(r2, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) sendmmsg(r0, &(0x7f000000b200)=[{{&(0x7f0000000c40)=@sco={0x1f, {0x0, 0x3, 0x8, 0x5, 0xfff, 0x9}}, 0x80, &(0x7f0000001040)=[{&(0x7f0000000f80)}], 0x1, 0x0, 0x0, 0x4010}, 0x3}, {{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001580)="8712b9d2eac0c3e8", 0x8}], 0x1, 0x0, 0x0, 0x40000}, 0x6}, {{&(0x7f0000003a00)=@llc={0x1a, 0x20, 0x9, 0x4, 0x40, 0x0, @remote}, 0x80, &(0x7f0000005ec0)=[{&(0x7f0000005e80)="2f816e40a63798", 0x7}], 0x1, 0x0, 0x0, 0x4010}, 0x4}, {{&(0x7f00000073c0)=@nfc_llcp={0x27, 0x1, 0x2, 0x6, 0x8458, 0x3, "72b7daee95a4fdbd379091c7a865a3578567e7be515630460de5a30e0e1d22848983b991229dc2e2bf1a79d141b615dce9db19feb8f30d4850a30d433890a4", 0x11}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xc001}, 0x4}, {{&(0x7f0000008640)=@nfc={0x27, 0x1, 0x0, 0x2}, 0x80, &(0x7f0000008800)=[{&(0x7f00000086c0)="0f19573ee4a8880e4998e05da4d37deea8b852e8cfe50e85ae57ad49c40682dfd08cb57f2ac68d8d", 0x28}], 0x1, 0x0, 0x0, 0x404c080}, 0x49}, {{&(0x7f0000009e40)=@nfc_llcp={0x27, 0x0, 0x1, 0x7, 0x0, 0x0, "8fa4820a3a40762372dd4f860830a61bc54ba8bf3a42b5ea421d59d621435941515249ff71563aed3851c241032c62ba445eb1aeadac189e70eaebcc6122f7", 0x1a}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x24000000}, 0xffe0}], 0x6, 0x80) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) 10:48:27 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000640)='/dev/audio\x00', 0x200, 0x0) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r2 = dup2(0xffffffffffffffff, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[]}}, 0x44801) sendmsg$FOU_CMD_DEL(r2, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) sendmmsg(r0, &(0x7f000000b200)=[{{&(0x7f0000000c40)=@sco={0x1f, {0x0, 0x3, 0x8, 0x5, 0xfff, 0x9}}, 0x80, &(0x7f0000001040)=[{&(0x7f0000000f80)}], 0x1, 0x0, 0x0, 0x4010}, 0x3}, {{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001580)="8712b9d2eac0c3e8", 0x8}], 0x1, 0x0, 0x0, 0x40000}, 0x6}, {{&(0x7f0000003a00)=@llc={0x1a, 0x20, 0x9, 0x4, 0x40, 0x0, @remote}, 0x80, &(0x7f0000005ec0)=[{&(0x7f0000005e80)="2f816e40a63798", 0x7}], 0x1, 0x0, 0x0, 0x4010}, 0x4}, {{&(0x7f00000073c0)=@nfc_llcp={0x27, 0x1, 0x2, 0x6, 0x8458, 0x3, "72b7daee95a4fdbd379091c7a865a3578567e7be515630460de5a30e0e1d22848983b991229dc2e2bf1a79d141b615dce9db19feb8f30d4850a30d433890a4", 0x11}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xc001}, 0x4}, {{&(0x7f0000008640)=@nfc={0x27, 0x1, 0x0, 0x2}, 0x80, &(0x7f0000008800)=[{&(0x7f00000086c0)="0f19573ee4a8880e4998e05da4d37deea8b852e8cfe50e85ae57ad49c40682dfd08cb57f2ac68d8d", 0x28}], 0x1, 0x0, 0x0, 0x404c080}, 0x49}, {{&(0x7f0000009e40)=@nfc_llcp={0x27, 0x0, 0x1, 0x7, 0x0, 0x0, "8fa4820a3a40762372dd4f860830a61bc54ba8bf3a42b5ea421d59d621435941515249ff71563aed3851c241032c62ba445eb1aeadac189e70eaebcc6122f7", 0x1a}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x24000000}, 0xffe0}], 0x6, 0x80) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f0000000440)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000480)) [ 201.416609] kobject: 'vet' (00000000d80bd20d): fill_kobj_path: path = '/devices/virtual/net/vet' [ 201.437734] kobject: 'queues' (000000006f23c0e5): kobject_add_internal: parent: 'vet', set: '' [ 201.448718] kobject: 'loop1' (00000000e5d9ebce): kobject_uevent_env [ 201.455817] kobject: 'queues' (000000006f23c0e5): kobject_uevent_env 10:48:27 executing program 2: semget(0x2, 0x0, 0x0) 10:48:27 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000640)='/dev/audio\x00', 0x200, 0x0) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r2 = dup2(0xffffffffffffffff, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[]}}, 0x44801) sendmsg$FOU_CMD_DEL(r2, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) sendmmsg(r0, &(0x7f000000b200)=[{{&(0x7f0000000c40)=@sco={0x1f, {0x0, 0x3, 0x8, 0x5, 0xfff, 0x9}}, 0x80, &(0x7f0000001040)=[{&(0x7f0000000f80)}], 0x1, 0x0, 0x0, 0x4010}, 0x3}, {{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001580)="8712b9d2eac0c3e8", 0x8}], 0x1, 0x0, 0x0, 0x40000}, 0x6}, {{&(0x7f0000003a00)=@llc={0x1a, 0x20, 0x9, 0x4, 0x40, 0x0, @remote}, 0x80, &(0x7f0000005ec0)=[{&(0x7f0000005e80)="2f816e40a63798", 0x7}], 0x1, 0x0, 0x0, 0x4010}, 0x4}, {{&(0x7f00000073c0)=@nfc_llcp={0x27, 0x1, 0x2, 0x6, 0x8458, 0x3, "72b7daee95a4fdbd379091c7a865a3578567e7be515630460de5a30e0e1d22848983b991229dc2e2bf1a79d141b615dce9db19feb8f30d4850a30d433890a4", 0x11}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xc001}, 0x4}, {{&(0x7f0000008640)=@nfc={0x27, 0x1, 0x0, 0x2}, 0x80, &(0x7f0000008800)=[{&(0x7f00000086c0)="0f19573ee4a8880e4998e05da4d37deea8b852e8cfe50e85ae57ad49c40682dfd08cb57f2ac68d8d", 0x28}], 0x1, 0x0, 0x0, 0x404c080}, 0x49}, {{&(0x7f0000009e40)=@nfc_llcp={0x27, 0x0, 0x1, 0x7, 0x0, 0x0, "8fa4820a3a40762372dd4f860830a61bc54ba8bf3a42b5ea421d59d621435941515249ff71563aed3851c241032c62ba445eb1aeadac189e70eaebcc6122f7", 0x1a}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x24000000}, 0xffe0}], 0x6, 0x80) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f0000000440)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000480)) 10:48:27 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000640)='/dev/audio\x00', 0x200, 0x0) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r2 = dup2(0xffffffffffffffff, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[]}}, 0x44801) sendmsg$FOU_CMD_DEL(r2, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) sendmmsg(r0, &(0x7f000000b200)=[{{&(0x7f0000000c40)=@sco={0x1f, {0x0, 0x3, 0x8, 0x5, 0xfff, 0x9}}, 0x80, &(0x7f0000001040)=[{&(0x7f0000000f80)}], 0x1, 0x0, 0x0, 0x4010}, 0x3}, {{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001580)="8712b9d2eac0c3e8", 0x8}], 0x1, 0x0, 0x0, 0x40000}, 0x6}, {{&(0x7f0000003a00)=@llc={0x1a, 0x20, 0x9, 0x4, 0x40, 0x0, @remote}, 0x80, &(0x7f0000005ec0)=[{&(0x7f0000005e80)="2f816e40a63798", 0x7}], 0x1, 0x0, 0x0, 0x4010}, 0x4}, {{&(0x7f00000073c0)=@nfc_llcp={0x27, 0x1, 0x2, 0x6, 0x8458, 0x3, "72b7daee95a4fdbd379091c7a865a3578567e7be515630460de5a30e0e1d22848983b991229dc2e2bf1a79d141b615dce9db19feb8f30d4850a30d433890a4", 0x11}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xc001}, 0x4}, {{&(0x7f0000008640)=@nfc={0x27, 0x1, 0x0, 0x2}, 0x80, &(0x7f0000008800)=[{&(0x7f00000086c0)="0f19573ee4a8880e4998e05da4d37deea8b852e8cfe50e85ae57ad49c40682dfd08cb57f2ac68d8d", 0x28}], 0x1, 0x0, 0x0, 0x404c080}, 0x49}, {{&(0x7f0000009e40)=@nfc_llcp={0x27, 0x0, 0x1, 0x7, 0x0, 0x0, "8fa4820a3a40762372dd4f860830a61bc54ba8bf3a42b5ea421d59d621435941515249ff71563aed3851c241032c62ba445eb1aeadac189e70eaebcc6122f7", 0x1a}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x24000000}, 0xffe0}], 0x6, 0x80) [ 201.473948] kobject: 'loop1' (00000000e5d9ebce): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 201.477360] kobject: 'queues' (000000006f23c0e5): kobject_uevent_env: filter function caused the event to drop! [ 201.497721] kobject: 'rx-0' (00000000011c7a9d): kobject_add_internal: parent: 'queues', set: 'queues' [ 201.506019] kobject: 'loop2' (0000000002dde2ec): kobject_uevent_env [ 201.515156] kobject: 'rx-0' (00000000011c7a9d): kobject_uevent_env [ 201.530829] kobject: 'loop3' (00000000e313bff6): kobject_uevent_env [ 201.531436] kobject: 'loop2' (0000000002dde2ec): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 201.537410] kobject: 'rx-0' (00000000011c7a9d): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 201.557207] kobject: 'loop0' (000000001f64c8ea): kobject_uevent_env [ 201.561405] kobject: 'loop3' (00000000e313bff6): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 201.573305] kobject: 'loop0' (000000001f64c8ea): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 201.575089] kobject: 'tx-0' (00000000927dafdc): kobject_add_internal: parent: 'queues', set: 'queues' [ 201.605353] kobject: 'loop2' (0000000002dde2ec): kobject_uevent_env [ 201.612871] kobject: 'loop2' (0000000002dde2ec): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 201.623429] kobject: 'tx-0' (00000000927dafdc): kobject_uevent_env [ 201.624927] kobject: 'loop0' (000000001f64c8ea): kobject_uevent_env [ 201.636495] kobject: 'loop0' (000000001f64c8ea): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 201.636674] kobject: 'tx-0' (00000000927dafdc): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 201.672528] ldm_validate_privheads(): Disk read failed. [ 201.679535] Dev loop3: unable to read RDB block 1 [ 201.687689] loop3: unable to read partition table [ 201.696118] loop3: partition table beyond EOD, truncated [ 201.708509] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 201.749302] kobject: 'rx-0' (00000000011c7a9d): kobject_cleanup, parent 000000006f23c0e5 [ 201.757771] kobject: 'loop3' (00000000e313bff6): kobject_uevent_env [ 201.764214] kobject: 'loop3' (00000000e313bff6): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 201.767329] kobject: 'rx-0' (00000000011c7a9d): auto cleanup 'remove' event [ 201.781345] kobject: 'loop1' (00000000e5d9ebce): kobject_uevent_env [ 201.785083] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 201.790267] kobject: 'loop1' (00000000e5d9ebce): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 201.794211] kobject: 'rx-0' (00000000011c7a9d): kobject_uevent_env [ 201.810937] kobject: 'rx-0' (00000000011c7a9d): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 201.821681] kobject: 'rx-0' (00000000011c7a9d): auto cleanup kobject_del [ 201.826131] kobject: 'loop4' (000000004400cba0): kobject_uevent_env [ 201.830484] kobject: 'rx-0' (00000000011c7a9d): calling ktype release [ 201.834996] kobject: 'loop4' (000000004400cba0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 201.858250] kobject: 'rx-0': free name [ 201.862256] kobject: 'tx-0' (00000000927dafdc): kobject_cleanup, parent 000000006f23c0e5 [ 201.872378] kobject: 'tx-0' (00000000927dafdc): auto cleanup 'remove' event [ 201.881174] kobject: 'tx-0' (00000000927dafdc): kobject_uevent_env [ 201.887785] kobject: 'tx-0' (00000000927dafdc): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 201.898278] kobject: 'tx-0' (00000000927dafdc): auto cleanup kobject_del [ 201.905203] kobject: 'tx-0' (00000000927dafdc): calling ktype release [ 201.912054] kobject: 'tx-0': free name [ 201.916002] kobject: 'queues' (000000006f23c0e5): kobject_cleanup, parent (null) [ 201.924815] kobject: 'queues' (000000006f23c0e5): calling ktype release [ 201.931798] kobject: 'queues' (000000006f23c0e5): kset_release [ 201.938006] kobject: 'queues': free name [ 201.942468] kobject: 'vet' (00000000d80bd20d): kobject_uevent_env [ 201.949020] kobject: 'vet' (00000000d80bd20d): fill_kobj_path: path = '/devices/virtual/net/vet' [ 202.007435] kobject: 'vet' (00000000d80bd20d): kobject_cleanup, parent (null) [ 202.015776] kobject: 'vet' (00000000d80bd20d): calling ktype release [ 202.022629] kobject: 'vet': free name [ 202.039894] kobject: 'loop5' (00000000e258ff7a): kobject_uevent_env [ 202.046342] kobject: 'loop5' (00000000e258ff7a): fill_kobj_path: path = '/devices/virtual/block/loop5' 10:48:28 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x100000003) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0a5c2d023c126285718070") seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x400050000}]}) syz_execute_func(&(0x7f0000000000)="c46181e2b4f6ffa53a20c4427d786d0167f2440f34ffc427cc39f717c4dc75180f5f6500e97726b810ae0010ae00a5a563ad48eb9e9e7fd4be00aa6151ddb52ba38a4d381cb9a2e12226f242d64a59c4026dbfe244b3abe5b86736d1b2") syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="0090000000000000fffffdfc000000000000000000000000e0e51532000002000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) 10:48:28 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x100000003) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0a5c2d023c126285718070") seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x400050000}]}) syz_execute_func(&(0x7f0000000000)="c46181e2b4f6ffa53a20c4427d786d0167f2440f34ffc427cc39f717c4dc75180f5f6500e97726b810ae0010ae00a5a563ad48eb9e9e7fd4be00aa6151ddb52ba38a4d381cb9a2e12226f242d64a59c4026dbfe244b3abe5b86736d1b2") syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="0090000000000000fffffdfc000000000000000000000000e0e51532000002000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) 10:48:28 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000640)='/dev/audio\x00', 0x200, 0x0) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r2 = dup2(0xffffffffffffffff, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[]}}, 0x44801) sendmsg$FOU_CMD_DEL(r2, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) sendmmsg(r0, &(0x7f000000b200)=[{{&(0x7f0000000c40)=@sco={0x1f, {0x0, 0x3, 0x8, 0x5, 0xfff, 0x9}}, 0x80, &(0x7f0000001040)=[{&(0x7f0000000f80)}], 0x1, 0x0, 0x0, 0x4010}, 0x3}, {{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001580)="8712b9d2eac0c3e8", 0x8}], 0x1, 0x0, 0x0, 0x40000}, 0x6}, {{&(0x7f0000003a00)=@llc={0x1a, 0x20, 0x9, 0x4, 0x40, 0x0, @remote}, 0x80, &(0x7f0000005ec0)=[{&(0x7f0000005e80)="2f816e40a63798", 0x7}], 0x1, 0x0, 0x0, 0x4010}, 0x4}, {{&(0x7f00000073c0)=@nfc_llcp={0x27, 0x1, 0x2, 0x6, 0x8458, 0x3, "72b7daee95a4fdbd379091c7a865a3578567e7be515630460de5a30e0e1d22848983b991229dc2e2bf1a79d141b615dce9db19feb8f30d4850a30d433890a4", 0x11}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xc001}, 0x4}, {{&(0x7f0000008640)=@nfc={0x27, 0x1, 0x0, 0x2}, 0x80, &(0x7f0000008800)=[{&(0x7f00000086c0)="0f19573ee4a8880e4998e05da4d37deea8b852e8cfe50e85ae57ad49c40682dfd08cb57f2ac68d8d", 0x28}], 0x1, 0x0, 0x0, 0x404c080}, 0x49}, {{&(0x7f0000009e40)=@nfc_llcp={0x27, 0x0, 0x1, 0x7, 0x0, 0x0, "8fa4820a3a40762372dd4f860830a61bc54ba8bf3a42b5ea421d59d621435941515249ff71563aed3851c241032c62ba445eb1aeadac189e70eaebcc6122f7", 0x1a}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x24000000}, 0xffe0}], 0x6, 0x80) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) 10:48:28 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000640)='/dev/audio\x00', 0x200, 0x0) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r2 = dup2(0xffffffffffffffff, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[]}}, 0x44801) sendmsg$FOU_CMD_DEL(r2, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) 10:48:28 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x8, 0x20000) r1 = syz_open_dev$usbmon(&(0x7f00000003c0)='/dev/usbmon#\x00', 0x2, 0x2002) linkat(r0, &(0x7f0000000380)='./file0\x00', r1, &(0x7f0000000400)='./file0/file0\x00', 0x1400) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$trusted_overlay_opaque(r2, 0x0, &(0x7f0000000100)='y\x00', 0x2, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000440)={0x4, {{0xa, 0x4e23, 0x0, @mcast1, 0x3}}}, 0x88) fchmodat(r1, &(0x7f0000000500)='./file0\x00', 0x51) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000540)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000180)={{}, {0x20000000304, @link_local}, 0x4, {0x2, 0x0, @broadcast}, '\x00\x00\x00\x00\x01\x00\x00\x00\xff\xff\xff\xff\xff\xff\xf1\x00'}) 10:48:28 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'\x00', 0x400}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x37, &(0x7f0000000240)}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x43732e5398416f1a}) [ 202.175057] kobject: 'loop3' (00000000e313bff6): kobject_uevent_env [ 202.199227] kobject: 'vet' (00000000c7894b6d): kobject_add_internal: parent: 'net', set: 'devices' [ 202.203107] kobject: 'loop3' (00000000e313bff6): fill_kobj_path: path = '/devices/virtual/block/loop3' 10:48:28 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000640)='/dev/audio\x00', 0x200, 0x0) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r2 = dup2(0xffffffffffffffff, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[]}}, 0x44801) sendmsg$FOU_CMD_DEL(r2, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) sendmmsg(r0, &(0x7f000000b200)=[{{&(0x7f0000000c40)=@sco={0x1f, {0x0, 0x3, 0x8, 0x5, 0xfff, 0x9}}, 0x80, &(0x7f0000001040)=[{&(0x7f0000000f80)}], 0x1, 0x0, 0x0, 0x4010}, 0x3}, {{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001580)="8712b9d2eac0c3e8", 0x8}], 0x1, 0x0, 0x0, 0x40000}, 0x6}, {{&(0x7f0000003a00)=@llc={0x1a, 0x20, 0x9, 0x4, 0x40, 0x0, @remote}, 0x80, &(0x7f0000005ec0)=[{&(0x7f0000005e80)="2f816e40a63798", 0x7}], 0x1, 0x0, 0x0, 0x4010}, 0x4}, {{&(0x7f00000073c0)=@nfc_llcp={0x27, 0x1, 0x2, 0x6, 0x8458, 0x3, "72b7daee95a4fdbd379091c7a865a3578567e7be515630460de5a30e0e1d22848983b991229dc2e2bf1a79d141b615dce9db19feb8f30d4850a30d433890a4", 0x11}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xc001}, 0x4}, {{&(0x7f0000008640)=@nfc={0x27, 0x1, 0x0, 0x2}, 0x80, &(0x7f0000008800)=[{&(0x7f00000086c0)="0f19573ee4a8880e4998e05da4d37deea8b852e8cfe50e85ae57ad49c40682dfd08cb57f2ac68d8d", 0x28}], 0x1, 0x0, 0x0, 0x404c080}, 0x49}, {{&(0x7f0000009e40)=@nfc_llcp={0x27, 0x0, 0x1, 0x7, 0x0, 0x0, "8fa4820a3a40762372dd4f860830a61bc54ba8bf3a42b5ea421d59d621435941515249ff71563aed3851c241032c62ba445eb1aeadac189e70eaebcc6122f7", 0x1a}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x24000000}, 0xffe0}], 0x6, 0x80) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) 10:48:28 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000640)='/dev/audio\x00', 0x200, 0x0) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r2 = dup2(0xffffffffffffffff, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[]}}, 0x44801) [ 202.229626] kobject: 'vet' (00000000c7894b6d): kobject_uevent_env [ 202.238199] kobject: 'vet' (00000000c7894b6d): fill_kobj_path: path = '/devices/virtual/net/vet' [ 202.249694] kobject: 'loop1' (00000000e5d9ebce): kobject_uevent_env [ 202.256134] kobject: 'loop1' (00000000e5d9ebce): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 202.268291] kobject: 'queues' (000000006870d022): kobject_add_internal: parent: 'vet', set: '' 10:48:28 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000640)='/dev/audio\x00', 0x200, 0x0) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) dup2(0xffffffffffffffff, r1) 10:48:28 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000640)='/dev/audio\x00', 0x200, 0x0) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r2 = dup2(0xffffffffffffffff, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[]}}, 0x44801) sendmsg$FOU_CMD_DEL(r2, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) sendmmsg(r0, &(0x7f000000b200)=[{{&(0x7f0000000c40)=@sco={0x1f, {0x0, 0x3, 0x8, 0x5, 0xfff, 0x9}}, 0x80, &(0x7f0000001040)=[{&(0x7f0000000f80)}], 0x1, 0x0, 0x0, 0x4010}, 0x3}, {{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001580)="8712b9d2eac0c3e8", 0x8}], 0x1, 0x0, 0x0, 0x40000}, 0x6}, {{&(0x7f0000003a00)=@llc={0x1a, 0x20, 0x9, 0x4, 0x40, 0x0, @remote}, 0x80, &(0x7f0000005ec0)=[{&(0x7f0000005e80)="2f816e40a63798", 0x7}], 0x1, 0x0, 0x0, 0x4010}, 0x4}, {{&(0x7f00000073c0)=@nfc_llcp={0x27, 0x1, 0x2, 0x6, 0x8458, 0x3, "72b7daee95a4fdbd379091c7a865a3578567e7be515630460de5a30e0e1d22848983b991229dc2e2bf1a79d141b615dce9db19feb8f30d4850a30d433890a4", 0x11}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xc001}, 0x4}, {{&(0x7f0000008640)=@nfc={0x27, 0x1, 0x0, 0x2}, 0x80, &(0x7f0000008800)=[{&(0x7f00000086c0)="0f19573ee4a8880e4998e05da4d37deea8b852e8cfe50e85ae57ad49c40682dfd08cb57f2ac68d8d", 0x28}], 0x1, 0x0, 0x0, 0x404c080}, 0x49}, {{&(0x7f0000009e40)=@nfc_llcp={0x27, 0x0, 0x1, 0x7, 0x0, 0x0, "8fa4820a3a40762372dd4f860830a61bc54ba8bf3a42b5ea421d59d621435941515249ff71563aed3851c241032c62ba445eb1aeadac189e70eaebcc6122f7", 0x1a}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x24000000}, 0xffe0}], 0x6, 0x80) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) [ 202.285888] kobject: 'loop0' (000000001f64c8ea): kobject_uevent_env [ 202.304548] kobject: 'queues' (000000006870d022): kobject_uevent_env [ 202.308928] kobject: 'loop0' (000000001f64c8ea): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 202.336867] kobject: 'loop1' (00000000e5d9ebce): kobject_uevent_env [ 202.348707] kobject: 'queues' (000000006870d022): kobject_uevent_env: filter function caused the event to drop! [ 202.355208] kobject: 'loop2' (0000000002dde2ec): kobject_uevent_env [ 202.369138] kobject: 'loop1' (00000000e5d9ebce): fill_kobj_path: path = '/devices/virtual/block/loop1' 10:48:28 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000640)='/dev/audio\x00', 0x200, 0x0) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) 10:48:28 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000640)='/dev/audio\x00', 0x200, 0x0) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r2 = dup2(0xffffffffffffffff, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[]}}, 0x44801) sendmsg$FOU_CMD_DEL(r2, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) sendmmsg(r0, &(0x7f000000b200)=[{{&(0x7f0000000c40)=@sco={0x1f, {0x0, 0x3, 0x8, 0x5, 0xfff, 0x9}}, 0x80, &(0x7f0000001040)=[{&(0x7f0000000f80)}], 0x1, 0x0, 0x0, 0x4010}, 0x3}, {{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001580)="8712b9d2eac0c3e8", 0x8}], 0x1, 0x0, 0x0, 0x40000}, 0x6}, {{&(0x7f0000003a00)=@llc={0x1a, 0x20, 0x9, 0x4, 0x40, 0x0, @remote}, 0x80, &(0x7f0000005ec0)=[{&(0x7f0000005e80)="2f816e40a63798", 0x7}], 0x1, 0x0, 0x0, 0x4010}, 0x4}, {{&(0x7f00000073c0)=@nfc_llcp={0x27, 0x1, 0x2, 0x6, 0x8458, 0x3, "72b7daee95a4fdbd379091c7a865a3578567e7be515630460de5a30e0e1d22848983b991229dc2e2bf1a79d141b615dce9db19feb8f30d4850a30d433890a4", 0x11}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xc001}, 0x4}, {{&(0x7f0000008640)=@nfc={0x27, 0x1, 0x0, 0x2}, 0x80, &(0x7f0000008800)=[{&(0x7f00000086c0)="0f19573ee4a8880e4998e05da4d37deea8b852e8cfe50e85ae57ad49c40682dfd08cb57f2ac68d8d", 0x28}], 0x1, 0x0, 0x0, 0x404c080}, 0x49}, {{&(0x7f0000009e40)=@nfc_llcp={0x27, 0x0, 0x1, 0x7, 0x0, 0x0, "8fa4820a3a40762372dd4f860830a61bc54ba8bf3a42b5ea421d59d621435941515249ff71563aed3851c241032c62ba445eb1aeadac189e70eaebcc6122f7", 0x1a}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x24000000}, 0xffe0}], 0x6, 0x80) [ 202.381419] kobject: 'rx-0' (000000007722f0ac): kobject_add_internal: parent: 'queues', set: 'queues' [ 202.381503] kobject: 'loop2' (0000000002dde2ec): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 202.409665] kobject: 'rx-0' (000000007722f0ac): kobject_uevent_env [ 202.426773] kobject: 'rx-0' (000000007722f0ac): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 202.442953] kobject: 'tx-0' (00000000d1709124): kobject_add_internal: parent: 'queues', set: 'queues' [ 202.455444] kobject: 'tx-0' (00000000d1709124): kobject_uevent_env [ 202.462161] kobject: 'tx-0' (00000000d1709124): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 202.477757] ldm_validate_privheads(): Disk read failed. [ 202.496774] Dev loop2: unable to read RDB block 1 [ 202.497515] kobject: 'loop3' (00000000e313bff6): kobject_uevent_env [ 202.504167] loop2: unable to read partition table [ 202.519007] loop2: partition table beyond EOD, truncated [ 202.534014] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 202.543838] kobject: 'loop3' (00000000e313bff6): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 202.553441] kobject: 'rx-0' (000000007722f0ac): kobject_cleanup, parent 000000006870d022 [ 202.569340] kobject: 'rx-0' (000000007722f0ac): auto cleanup 'remove' event [ 202.582175] kobject: 'rx-0' (000000007722f0ac): kobject_uevent_env [ 202.582183] kobject: 'loop0' (000000001f64c8ea): kobject_uevent_env [ 202.582210] kobject: 'loop0' (000000001f64c8ea): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 202.593023] kobject: 'rx-0' (000000007722f0ac): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 202.605300] ldm_validate_privheads(): Disk read failed. [ 202.623111] kobject: 'loop4' (000000004400cba0): kobject_uevent_env [ 202.631049] kobject: 'rx-0' (000000007722f0ac): auto cleanup kobject_del [ 202.635337] kobject: 'loop4' (000000004400cba0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 202.641297] kobject: 'rx-0' (000000007722f0ac): calling ktype release [ 202.657355] kobject: 'rx-0': free name [ 202.657740] kobject: 'loop1' (00000000e5d9ebce): kobject_uevent_env [ 202.665719] kobject: 'tx-0' (00000000d1709124): kobject_cleanup, parent 000000006870d022 [ 202.676636] kobject: 'loop1' (00000000e5d9ebce): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 202.682498] kobject: 'tx-0' (00000000d1709124): auto cleanup 'remove' event [ 202.686531] Dev loop3: unable to read RDB block 1 [ 202.698442] kobject: 'loop2' (0000000002dde2ec): kobject_uevent_env [ 202.708183] kobject: 'loop2' (0000000002dde2ec): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 202.712473] kobject: 'tx-0' (00000000d1709124): kobject_uevent_env [ 202.718135] loop3: unable to read partition table [ 202.734081] kobject: 'tx-0' (00000000d1709124): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 202.742142] loop3: partition table beyond EOD, truncated [ 202.757076] kobject: 'tx-0' (00000000d1709124): auto cleanup kobject_del [ 202.761833] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 202.775780] kobject: 'tx-0' (00000000d1709124): calling ktype release [ 202.786039] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 202.793719] kobject: 'tx-0': free name [ 202.794099] kobject: 'loop2' (0000000002dde2ec): kobject_uevent_env [ 202.797863] kobject: 'queues' (000000006870d022): kobject_cleanup, parent (null) [ 202.804598] kobject: 'loop2' (0000000002dde2ec): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 202.831728] kobject: 'queues' (000000006870d022): calling ktype release [ 202.838599] kobject: 'queues' (000000006870d022): kset_release [ 202.851236] kobject: 'queues': free name [ 202.855749] kobject: 'vet' (00000000c7894b6d): kobject_uevent_env [ 202.868331] kobject: 'vet' (00000000c7894b6d): fill_kobj_path: path = '/devices/virtual/net/vet' [ 202.868413] kobject: 'loop3' (00000000e313bff6): kobject_uevent_env [ 202.888355] kobject: 'loop3' (00000000e313bff6): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 202.910992] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 202.927430] kobject: 'vet' (00000000c7894b6d): kobject_cleanup, parent (null) [ 202.932404] kobject: 'loop3' (00000000e313bff6): kobject_uevent_env [ 202.937868] kobject: 'vet' (00000000c7894b6d): calling ktype release [ 202.947429] kobject: 'loop3' (00000000e313bff6): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 202.954141] kobject: 'vet': free name [ 202.991620] kobject: 'loop5' (00000000e258ff7a): kobject_uevent_env [ 203.002573] kobject: 'loop5' (00000000e258ff7a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 203.019214] kobject: 'loop2' (0000000002dde2ec): kobject_uevent_env [ 203.029995] kobject: 'loop2' (0000000002dde2ec): fill_kobj_path: path = '/devices/virtual/block/loop2' 10:48:29 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'\x00', 0x400}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x37, &(0x7f0000000240)}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x43732e5398416f1a}) 10:48:29 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000640)='/dev/audio\x00', 0x200, 0x0) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r2 = dup2(0xffffffffffffffff, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[]}}, 0x44801) sendmsg$FOU_CMD_DEL(r2, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) 10:48:29 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x8, 0x20000) r1 = syz_open_dev$usbmon(&(0x7f00000003c0)='/dev/usbmon#\x00', 0x2, 0x2002) linkat(r0, &(0x7f0000000380)='./file0\x00', r1, &(0x7f0000000400)='./file0/file0\x00', 0x1400) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$trusted_overlay_opaque(r2, 0x0, &(0x7f0000000100)='y\x00', 0x2, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000440)={0x4, {{0xa, 0x4e23, 0x0, @mcast1, 0x3}}}, 0x88) fchmodat(r1, &(0x7f0000000500)='./file0\x00', 0x51) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000540)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000180)={{}, {0x20000000304, @link_local}, 0x4, {0x2, 0x0, @broadcast}, '\x00\x00\x00\x00\x01\x00\x00\x00\xff\xff\xff\xff\xff\xff\xf1\x00'}) 10:48:29 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000640)='/dev/audio\x00', 0x200, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) 10:48:29 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'\x00', 0x400}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x37, &(0x7f0000000240)}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x43732e5398416f1a}) 10:48:29 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x100000003) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0a5c2d023c126285718070") seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x400050000}]}) syz_execute_func(&(0x7f0000000000)="c46181e2b4f6ffa53a20c4427d786d0167f2440f34ffc427cc39f717c4dc75180f5f6500e97726b810ae0010ae00a5a563ad48eb9e9e7fd4be00aa6151ddb52ba38a4d381cb9a2e12226f242d64a59c4026dbfe244b3abe5b86736d1b2") syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="0090000000000000fffffdfc000000000000000000000000e0e51532000002000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) 10:48:29 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000640)='/dev/audio\x00', 0x200, 0x0) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r2 = dup2(0xffffffffffffffff, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[]}}, 0x44801) [ 203.054289] kobject: 'loop3' (00000000e313bff6): kobject_uevent_env [ 203.078830] kobject: 'loop3' (00000000e313bff6): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 203.088727] kobject: 'vet' (00000000173c742b): kobject_add_internal: parent: 'net', set: 'devices' 10:48:29 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) [ 203.118995] kobject: 'loop0' (000000001f64c8ea): kobject_uevent_env [ 203.125624] kobject: 'loop0' (000000001f64c8ea): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 203.137577] kobject: 'vet' (00000000173c742b): kobject_uevent_env [ 203.156668] kobject: 'loop1' (00000000e5d9ebce): kobject_uevent_env 10:48:29 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) 10:48:29 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000640)='/dev/audio\x00', 0x200, 0x0) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) dup2(0xffffffffffffffff, r1) [ 203.166676] kobject: 'vet' (00000000173c742b): fill_kobj_path: path = '/devices/virtual/net/vet' [ 203.179110] kobject: 'loop1' (00000000e5d9ebce): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 203.195360] kobject: 'queues' (00000000c57e99dc): kobject_add_internal: parent: 'vet', set: '' [ 203.205233] kobject: 'loop2' (0000000002dde2ec): kobject_uevent_env 10:48:29 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) [ 203.213541] kobject: 'queues' (00000000c57e99dc): kobject_uevent_env [ 203.220486] kobject: 'loop2' (0000000002dde2ec): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 203.230354] kobject: 'queues' (00000000c57e99dc): kobject_uevent_env: filter function caused the event to drop! [ 203.247852] kobject: 'rx-0' (000000006c471c4c): kobject_add_internal: parent: 'queues', set: 'queues' [ 203.260234] kobject: 'loop0' (000000001f64c8ea): kobject_uevent_env 10:48:29 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000640)='/dev/audio\x00', 0x200, 0x0) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) [ 203.271199] kobject: 'loop0' (000000001f64c8ea): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 203.283173] kobject: 'rx-0' (000000006c471c4c): kobject_uevent_env [ 203.294232] kobject: 'loop1' (00000000e5d9ebce): kobject_uevent_env [ 203.306710] kobject: 'rx-0' (000000006c471c4c): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 203.313778] kobject: 'loop1' (00000000e5d9ebce): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 203.330204] ldm_validate_privheads(): Disk read failed. [ 203.345827] Dev loop2: unable to read RDB block 1 [ 203.351128] kobject: 'tx-0' (00000000ab12c735): kobject_add_internal: parent: 'queues', set: 'queues' [ 203.361575] loop2: unable to read partition table [ 203.373224] kobject: 'tx-0' (00000000ab12c735): kobject_uevent_env [ 203.384768] loop2: partition table beyond EOD, truncated [ 203.392757] kobject: 'tx-0' (00000000ab12c735): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 203.409389] kobject: 'loop0' (000000001f64c8ea): kobject_uevent_env [ 203.410745] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 203.415830] kobject: 'loop0' (000000001f64c8ea): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 203.433557] kobject: 'vet' (0000000058365de8): kobject_add_internal: parent: 'net', set: 'devices' [ 203.451175] kobject: 'vet' (0000000058365de8): kobject_uevent_env [ 203.454430] kobject: 'loop4' (000000004400cba0): kobject_uevent_env [ 203.460102] kobject: 'vet' (0000000058365de8): fill_kobj_path: path = '/devices/virtual/net/vet' [ 203.464229] kobject: 'loop4' (000000004400cba0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 203.486769] kobject: 'queues' (00000000b1eba1f5): kobject_add_internal: parent: 'vet', set: '' [ 203.496678] kobject: 'queues' (00000000b1eba1f5): kobject_uevent_env [ 203.503385] kobject: 'queues' (00000000b1eba1f5): kobject_uevent_env: filter function caused the event to drop! [ 203.514502] kobject: 'rx-0' (0000000078ab3ad7): kobject_add_internal: parent: 'queues', set: 'queues' [ 203.525067] kobject: 'loop2' (0000000002dde2ec): kobject_uevent_env [ 203.531796] kobject: 'rx-0' (0000000078ab3ad7): kobject_uevent_env [ 203.538276] kobject: 'loop2' (0000000002dde2ec): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 203.538337] kobject: 'rx-0' (0000000078ab3ad7): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 203.558355] kobject: 'tx-0' (00000000bb9a6ed4): kobject_add_internal: parent: 'queues', set: 'queues' [ 203.571626] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 203.574989] kobject: 'tx-0' (00000000bb9a6ed4): kobject_uevent_env [ 203.585948] kobject: 'tx-0' (00000000bb9a6ed4): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 203.599837] kobject: 'rx-0' (000000006c471c4c): kobject_cleanup, parent 00000000c57e99dc [ 203.612923] kobject: 'rx-0' (000000006c471c4c): auto cleanup 'remove' event [ 203.627894] kobject: 'rx-0' (000000006c471c4c): kobject_uevent_env [ 203.634429] kobject: 'rx-0' (000000006c471c4c): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 203.644729] kobject: 'rx-0' (000000006c471c4c): auto cleanup kobject_del [ 203.651749] kobject: 'rx-0' (000000006c471c4c): calling ktype release [ 203.658510] kobject: 'rx-0': free name [ 203.662620] kobject: 'tx-0' (00000000ab12c735): kobject_cleanup, parent 00000000c57e99dc [ 203.670994] kobject: 'tx-0' (00000000ab12c735): auto cleanup 'remove' event [ 203.678270] kobject: 'tx-0' (00000000ab12c735): kobject_uevent_env [ 203.684823] kobject: 'tx-0' (00000000ab12c735): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 203.695067] kobject: 'tx-0' (00000000ab12c735): auto cleanup kobject_del [ 203.702071] kobject: 'tx-0' (00000000ab12c735): calling ktype release [ 203.708802] kobject: 'tx-0': free name [ 203.712891] kobject: 'queues' (00000000c57e99dc): kobject_cleanup, parent (null) [ 203.721423] kobject: 'queues' (00000000c57e99dc): calling ktype release [ 203.728352] kobject: 'queues' (00000000c57e99dc): kset_release [ 203.734509] kobject: 'queues': free name [ 203.739034] kobject: 'vet' (00000000173c742b): kobject_uevent_env [ 203.745469] kobject: 'vet' (00000000173c742b): fill_kobj_path: path = '/devices/virtual/net/vet' [ 203.756474] kobject: 'rx-0' (0000000078ab3ad7): kobject_cleanup, parent 00000000b1eba1f5 [ 203.764944] kobject: 'rx-0' (0000000078ab3ad7): auto cleanup 'remove' event [ 203.772209] kobject: 'rx-0' (0000000078ab3ad7): kobject_uevent_env [ 203.778899] kobject: 'rx-0' (0000000078ab3ad7): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 203.789479] kobject: 'rx-0' (0000000078ab3ad7): auto cleanup kobject_del [ 203.796507] kobject: 'rx-0' (0000000078ab3ad7): calling ktype release [ 203.803250] kobject: 'rx-0': free name [ 203.807346] kobject: 'tx-0' (00000000bb9a6ed4): kobject_cleanup, parent 00000000b1eba1f5 [ 203.815747] kobject: 'tx-0' (00000000bb9a6ed4): auto cleanup 'remove' event [ 203.823033] kobject: 'tx-0' (00000000bb9a6ed4): kobject_uevent_env [ 203.829667] kobject: 'tx-0' (00000000bb9a6ed4): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 203.839985] kobject: 'tx-0' (00000000bb9a6ed4): auto cleanup kobject_del [ 203.847019] kobject: 'tx-0' (00000000bb9a6ed4): calling ktype release [ 203.853760] kobject: 'tx-0': free name [ 203.857854] kobject: 'queues' (00000000b1eba1f5): kobject_cleanup, parent (null) [ 203.866432] kobject: 'queues' (00000000b1eba1f5): calling ktype release [ 203.873335] kobject: 'queues' (00000000b1eba1f5): kset_release [ 203.879460] kobject: 'queues': free name [ 203.884029] kobject: 'vet' (0000000058365de8): kobject_uevent_env [ 203.890449] kobject: 'vet' (0000000058365de8): fill_kobj_path: path = '/devices/virtual/net/vet' [ 203.899702] kobject: 'vet' (00000000173c742b): kobject_cleanup, parent (null) [ 203.908834] kobject: 'vet' (00000000173c742b): calling ktype release [ 203.915379] kobject: 'vet': free name [ 203.915731] kobject: 'loop2' (0000000002dde2ec): kobject_uevent_env 10:48:30 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'\x00', 0x400}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x37, &(0x7f0000000240)}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x43732e5398416f1a}) 10:48:30 executing program 1: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) 10:48:30 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000640)='/dev/audio\x00', 0x200, 0x0) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) 10:48:30 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x8, 0x20000) r1 = syz_open_dev$usbmon(&(0x7f00000003c0)='/dev/usbmon#\x00', 0x2, 0x2002) linkat(r0, &(0x7f0000000380)='./file0\x00', r1, &(0x7f0000000400)='./file0/file0\x00', 0x1400) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$trusted_overlay_opaque(r2, 0x0, &(0x7f0000000100)='y\x00', 0x2, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000440)={0x4, {{0xa, 0x4e23, 0x0, @mcast1, 0x3}}}, 0x88) fchmodat(r1, &(0x7f0000000500)='./file0\x00', 0x51) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000540)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000180)={{}, {0x20000000304, @link_local}, 0x4, {0x2, 0x0, @broadcast}, '\x00\x00\x00\x00\x01\x00\x00\x00\xff\xff\xff\xff\xff\xff\xf1\x00'}) 10:48:30 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x100000003) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0a5c2d023c126285718070") seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x400050000}]}) syz_execute_func(&(0x7f0000000000)="c46181e2b4f6ffa53a20c4427d786d0167f2440f34ffc427cc39f717c4dc75180f5f6500e97726b810ae0010ae00a5a563ad48eb9e9e7fd4be00aa6151ddb52ba38a4d381cb9a2e12226f242d64a59c4026dbfe244b3abe5b86736d1b2") syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="0090000000000000fffffdfc000000000000000000000000e0e51532000002000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) 10:48:30 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x43732e5398416f1a}) [ 203.925684] kobject: 'loop2' (0000000002dde2ec): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 203.935908] kobject: 'loop5' (00000000e258ff7a): kobject_uevent_env [ 203.939564] kobject: 'vet' (0000000058365de8): kobject_cleanup, parent (null) [ 203.950653] kobject: 'loop5' (00000000e258ff7a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 203.960835] kobject: 'vet' (0000000058365de8): calling ktype release [ 203.968185] kobject: 'vet': free name 10:48:30 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x8, 0x20000) r1 = syz_open_dev$usbmon(&(0x7f00000003c0)='/dev/usbmon#\x00', 0x2, 0x2002) linkat(r0, &(0x7f0000000380)='./file0\x00', r1, &(0x7f0000000400)='./file0/file0\x00', 0x1400) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$trusted_overlay_opaque(r2, 0x0, &(0x7f0000000100)='y\x00', 0x2, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000440)={0x4, {{0xa, 0x4e23, 0x0, @mcast1, 0x3}}}, 0x88) fchmodat(r1, &(0x7f0000000500)='./file0\x00', 0x51) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000540)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000180)={{}, {0x20000000304, @link_local}, 0x4, {0x2, 0x0, @broadcast}, '\x00\x00\x00\x00\x01\x00\x00\x00\xff\xff\xff\xff\xff\xff\xf1\x00'}) 10:48:30 executing program 1: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) [ 204.004972] kobject: 'loop3' (00000000e313bff6): kobject_uevent_env [ 204.008982] kobject: 'vet' (0000000006bc33ad): kobject_add_internal: parent: 'net', set: 'devices' [ 204.028069] kobject: 'vet' (0000000006bc33ad): kobject_uevent_env [ 204.028501] kobject: 'loop3' (00000000e313bff6): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 204.034637] kobject: 'vet' (0000000006bc33ad): fill_kobj_path: path = '/devices/virtual/net/vet' 10:48:30 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000640)='/dev/audio\x00', 0x200, 0x0) [ 204.072414] kobject: 'loop4' (000000004400cba0): kobject_uevent_env [ 204.081448] kobject: 'queues' (000000003dd5d3f7): kobject_add_internal: parent: 'vet', set: '' [ 204.089496] kobject: 'loop4' (000000004400cba0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 204.107472] kobject: 'loop2' (0000000002dde2ec): kobject_uevent_env [ 204.112928] kobject: 'queues' (000000003dd5d3f7): kobject_uevent_env [ 204.115929] kobject: 'loop1' (00000000e5d9ebce): kobject_uevent_env [ 204.133190] kobject: 'queues' (000000003dd5d3f7): kobject_uevent_env: filter function caused the event to drop! [ 204.137399] kobject: 'loop1' (00000000e5d9ebce): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 204.155188] kobject: 'loop2' (0000000002dde2ec): fill_kobj_path: path = '/devices/virtual/block/loop2' 10:48:30 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) 10:48:30 executing program 1: socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) [ 204.163266] kobject: 'rx-0' (0000000037da9497): kobject_add_internal: parent: 'queues', set: 'queues' [ 204.172967] kobject: 'loop0' (000000001f64c8ea): kobject_uevent_env [ 204.188799] kobject: 'rx-0' (0000000037da9497): kobject_uevent_env [ 204.194980] kobject: 'loop0' (000000001f64c8ea): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 204.197218] kobject: 'rx-0' (0000000037da9497): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 204.215234] kobject: 'tx-0' (0000000061269de9): kobject_add_internal: parent: 'queues', set: 'queues' [ 204.234567] ldm_validate_privheads(): Disk read failed. [ 204.250500] kobject: 'tx-0' (0000000061269de9): kobject_uevent_env [ 204.257075] Dev loop2: unable to read RDB block 1 10:48:30 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) [ 204.268286] kobject: 'tx-0' (0000000061269de9): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 204.281255] kobject: 'loop1' (00000000e5d9ebce): kobject_uevent_env [ 204.284936] kobject: 'vet' (00000000369eae21): kobject_add_internal: parent: 'net', set: 'devices' [ 204.290335] kobject: 'loop1' (00000000e5d9ebce): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 204.298098] kobject: 'vet' (00000000369eae21): kobject_uevent_env [ 204.311266] loop2: unable to read partition table [ 204.327845] kobject: 'vet' (00000000369eae21): fill_kobj_path: path = '/devices/virtual/net/vet' [ 204.328531] loop2: partition table beyond EOD, truncated [ 204.342986] kobject: 'queues' (00000000be4d684b): kobject_add_internal: parent: 'vet', set: '' [ 204.346298] kobject: 'loop0' (000000001f64c8ea): kobject_uevent_env [ 204.360104] kobject: 'loop0' (000000001f64c8ea): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 204.363804] kobject: 'queues' (00000000be4d684b): kobject_uevent_env [ 204.376954] kobject: 'queues' (00000000be4d684b): kobject_uevent_env: filter function caused the event to drop! [ 204.388595] kobject: 'rx-0' (00000000fbac59c9): kobject_add_internal: parent: 'queues', set: 'queues' [ 204.388974] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 204.401861] kobject: 'rx-0' (00000000fbac59c9): kobject_uevent_env [ 204.412057] kobject: 'rx-0' (00000000fbac59c9): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 204.422543] kobject: 'tx-0' (00000000ac4fefe1): kobject_add_internal: parent: 'queues', set: 'queues' [ 204.432379] kobject: 'tx-0' (00000000ac4fefe1): kobject_uevent_env [ 204.439177] kobject: 'tx-0' (00000000ac4fefe1): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 204.459561] kobject: 'rx-0' (0000000037da9497): kobject_cleanup, parent 000000003dd5d3f7 [ 204.472934] kobject: 'rx-0' (0000000037da9497): auto cleanup 'remove' event [ 204.480122] kobject: 'loop2' (0000000002dde2ec): kobject_uevent_env [ 204.480791] kobject: 'rx-0' (0000000037da9497): kobject_uevent_env [ 204.491075] kobject: 'loop2' (0000000002dde2ec): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 204.493271] kobject: 'rx-0' (0000000037da9497): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 204.512946] kobject: 'rx-0' (0000000037da9497): auto cleanup kobject_del [ 204.520933] kobject: 'rx-0' (0000000037da9497): calling ktype release [ 204.522587] kobject: 'loop4' (000000004400cba0): kobject_uevent_env [ 204.527814] kobject: 'rx-0': free name [ 204.534099] kobject: 'loop4' (000000004400cba0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 204.538175] kobject: 'tx-0' (0000000061269de9): kobject_cleanup, parent 000000003dd5d3f7 [ 204.547468] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 204.555822] kobject: 'tx-0' (0000000061269de9): auto cleanup 'remove' event [ 204.569715] kobject: 'tx-0' (0000000061269de9): kobject_uevent_env [ 204.576127] kobject: 'tx-0' (0000000061269de9): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 204.587210] kobject: 'tx-0' (0000000061269de9): auto cleanup kobject_del [ 204.594930] kobject: 'loop2' (0000000002dde2ec): kobject_uevent_env [ 204.595012] kobject: 'tx-0' (0000000061269de9): calling ktype release [ 204.603685] kobject: 'loop2' (0000000002dde2ec): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 204.608250] kobject: 'tx-0': free name [ 204.621617] kobject: 'queues' (000000003dd5d3f7): kobject_cleanup, parent (null) [ 204.630301] kobject: 'queues' (000000003dd5d3f7): calling ktype release [ 204.637109] kobject: 'queues' (000000003dd5d3f7): kset_release [ 204.644124] kobject: 'queues': free name [ 204.648739] kobject: 'vet' (0000000006bc33ad): kobject_uevent_env [ 204.655056] kobject: 'vet' (0000000006bc33ad): fill_kobj_path: path = '/devices/virtual/net/vet' [ 204.665945] kobject: 'rx-0' (00000000fbac59c9): kobject_cleanup, parent 00000000be4d684b [ 204.674275] kobject: 'rx-0' (00000000fbac59c9): auto cleanup 'remove' event [ 204.681581] kobject: 'rx-0' (00000000fbac59c9): kobject_uevent_env [ 204.688125] kobject: 'rx-0' (00000000fbac59c9): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 204.698709] kobject: 'rx-0' (00000000fbac59c9): auto cleanup kobject_del [ 204.705567] kobject: 'rx-0' (00000000fbac59c9): calling ktype release [ 204.712343] kobject: 'rx-0': free name [ 204.716280] kobject: 'tx-0' (00000000ac4fefe1): kobject_cleanup, parent 00000000be4d684b [ 204.725074] kobject: 'tx-0' (00000000ac4fefe1): auto cleanup 'remove' event [ 204.732375] kobject: 'tx-0' (00000000ac4fefe1): kobject_uevent_env [ 204.738927] kobject: 'tx-0' (00000000ac4fefe1): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 204.749297] kobject: 'tx-0' (00000000ac4fefe1): auto cleanup kobject_del [ 204.756170] kobject: 'tx-0' (00000000ac4fefe1): calling ktype release [ 204.762961] kobject: 'tx-0': free name [ 204.766868] kobject: 'queues' (00000000be4d684b): kobject_cleanup, parent (null) [ 204.775504] kobject: 'queues' (00000000be4d684b): calling ktype release [ 204.782537] kobject: 'queues' (00000000be4d684b): kset_release [ 204.793532] kobject: 'queues': free name [ 204.798256] kobject: 'vet' (00000000369eae21): kobject_uevent_env [ 204.804522] kobject: 'vet' (00000000369eae21): fill_kobj_path: path = '/devices/virtual/net/vet' [ 204.811519] kobject: 'loop2' (0000000002dde2ec): kobject_uevent_env [ 204.819955] kobject: 'loop2' (0000000002dde2ec): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 204.829711] kobject: 'vet' (0000000006bc33ad): kobject_cleanup, parent (null) [ 204.843565] kobject: 'vet' (0000000006bc33ad): calling ktype release [ 204.851282] kobject: 'vet' (00000000369eae21): kobject_cleanup, parent (null) [ 204.856520] kobject: 'vet': free name [ 204.859602] kobject: 'vet' (00000000369eae21): calling ktype release [ 204.870766] kobject: 'vet': free name 10:48:31 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'\x00', 0x400}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x37, &(0x7f0000000240)}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x43732e5398416f1a}) 10:48:31 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) 10:48:31 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) 10:48:31 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x8, 0x20000) r1 = syz_open_dev$usbmon(&(0x7f00000003c0)='/dev/usbmon#\x00', 0x2, 0x2002) linkat(r0, &(0x7f0000000380)='./file0\x00', r1, &(0x7f0000000400)='./file0/file0\x00', 0x1400) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$trusted_overlay_opaque(r2, 0x0, &(0x7f0000000100)='y\x00', 0x2, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000440)={0x4, {{0xa, 0x4e23, 0x0, @mcast1, 0x3}}}, 0x88) fchmodat(r1, &(0x7f0000000500)='./file0\x00', 0x51) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000540)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000180)={{}, {0x20000000304, @link_local}, 0x4, {0x2, 0x0, @broadcast}, '\x00\x00\x00\x00\x01\x00\x00\x00\xff\xff\xff\xff\xff\xff\xf1\x00'}) 10:48:31 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x100000003) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0a5c2d023c126285718070") seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x400050000}]}) syz_execute_func(&(0x7f0000000000)="c46181e2b4f6ffa53a20c4427d786d0167f2440f34ffc427cc39f717c4dc75180f5f6500e97726b810ae0010ae00a5a563ad48eb9e9e7fd4be00aa6151ddb52ba38a4d381cb9a2e12226f242d64a59c4026dbfe244b3abe5b86736d1b2") 10:48:31 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x43732e5398416f1a}) [ 204.881120] kobject: 'loop5' (00000000e258ff7a): kobject_uevent_env [ 204.889176] kobject: 'loop5' (00000000e258ff7a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 204.921295] kobject: 'vet' (000000002bfe8023): kobject_add_internal: parent: 'net', set: 'devices' 10:48:31 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) 10:48:31 executing program 0: bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) [ 204.930826] kobject: 'loop3' (00000000e313bff6): kobject_uevent_env [ 204.937268] kobject: 'loop3' (00000000e313bff6): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 204.955941] kobject: 'vet' (000000002bfe8023): kobject_uevent_env [ 204.969898] kobject: 'vet' (000000002bfe8023): fill_kobj_path: path = '/devices/virtual/net/vet' 10:48:31 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) [ 204.983225] kobject: 'loop1' (00000000e5d9ebce): kobject_uevent_env [ 204.988060] kobject: 'queues' (00000000aed83440): kobject_add_internal: parent: 'vet', set: '' [ 204.999405] kobject: 'loop1' (00000000e5d9ebce): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 205.017491] kobject: 'loop0' (000000001f64c8ea): kobject_uevent_env 10:48:31 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'\x00', 0x400}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x37, &(0x7f0000000240)}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x43732e5398416f1a}) [ 205.027574] kobject: 'loop0' (000000001f64c8ea): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 205.028183] kobject: 'queues' (00000000aed83440): kobject_uevent_env [ 205.048634] kobject: 'loop0' (000000001f64c8ea): kobject_uevent_env [ 205.065553] kobject: 'queues' (00000000aed83440): kobject_uevent_env: filter function caused the event to drop! [ 205.071168] kobject: 'loop0' (000000001f64c8ea): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 205.088270] kobject: 'rx-0' (000000002cd67050): kobject_add_internal: parent: 'queues', set: 'queues' [ 205.116777] kobject: 'rx-0' (000000002cd67050): kobject_uevent_env 10:48:31 executing program 0: socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) [ 205.125153] kobject: 'rx-0' (000000002cd67050): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 205.136772] kobject: 'tx-0' (000000008582ff3f): kobject_add_internal: parent: 'queues', set: 'queues' [ 205.151925] kobject: 'tx-0' (000000008582ff3f): kobject_uevent_env [ 205.162927] kobject: 'tx-0' (000000008582ff3f): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' 10:48:31 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x8, 0x20000) r1 = syz_open_dev$usbmon(&(0x7f00000003c0)='/dev/usbmon#\x00', 0x2, 0x2002) linkat(r0, &(0x7f0000000380)='./file0\x00', r1, &(0x7f0000000400)='./file0/file0\x00', 0x1400) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$trusted_overlay_opaque(r2, 0x0, &(0x7f0000000100)='y\x00', 0x2, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000440)={0x4, {{0xa, 0x4e23, 0x0, @mcast1, 0x3}}}, 0x88) fchmodat(r1, &(0x7f0000000500)='./file0\x00', 0x51) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000540)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000180)={{}, {0x20000000304, @link_local}, 0x4, {0x2, 0x0, @broadcast}, '\x00\x00\x00\x00\x01\x00\x00\x00\xff\xff\xff\xff\xff\xff\xf1\x00'}) [ 205.175590] kobject: 'vet' (000000007c33c8e0): kobject_add_internal: parent: 'net', set: 'devices' [ 205.201995] kobject: 'loop4' (000000004400cba0): kobject_uevent_env [ 205.210239] kobject: 'loop4' (000000004400cba0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 205.215279] kobject: 'vet' (000000007c33c8e0): kobject_uevent_env [ 205.226434] kobject: 'vet' (000000007c33c8e0): fill_kobj_path: path = '/devices/virtual/net/vet' [ 205.231335] kobject: 'loop0' (000000001f64c8ea): kobject_uevent_env [ 205.245741] kobject: 'queues' (00000000ed99cb1e): kobject_add_internal: parent: 'vet', set: '' [ 205.250792] kobject: 'loop0' (000000001f64c8ea): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 205.257335] kobject: 'queues' (00000000ed99cb1e): kobject_uevent_env [ 205.271216] kobject: 'queues' (00000000ed99cb1e): kobject_uevent_env: filter function caused the event to drop! [ 205.285677] kobject: 'rx-0' (0000000090021335): kobject_add_internal: parent: 'queues', set: 'queues' [ 205.304385] kobject: 'rx-0' (0000000090021335): kobject_uevent_env [ 205.311017] kobject: 'rx-0' (0000000090021335): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 205.321444] kobject: 'tx-0' (00000000fb07943e): kobject_add_internal: parent: 'queues', set: 'queues' [ 205.331321] kobject: 'tx-0' (00000000fb07943e): kobject_uevent_env [ 205.338106] kobject: 'tx-0' (00000000fb07943e): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 205.350273] kobject: 'vet' (00000000b2e37d15): kobject_add_internal: parent: 'net', set: 'devices' [ 205.367248] kobject: 'vet' (00000000b2e37d15): kobject_uevent_env [ 205.373777] kobject: 'vet' (00000000b2e37d15): fill_kobj_path: path = '/devices/virtual/net/vet' [ 205.382957] kobject: 'queues' (0000000054854f82): kobject_add_internal: parent: 'vet', set: '' [ 205.392801] kobject: 'queues' (0000000054854f82): kobject_uevent_env [ 205.399476] kobject: 'queues' (0000000054854f82): kobject_uevent_env: filter function caused the event to drop! [ 205.409824] kobject: 'rx-0' (0000000015ad6802): kobject_add_internal: parent: 'queues', set: 'queues' [ 205.419395] kobject: 'rx-0' (0000000015ad6802): kobject_uevent_env [ 205.425788] kobject: 'rx-0' (0000000015ad6802): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 205.436890] kobject: 'tx-0' (000000007e2e981b): kobject_add_internal: parent: 'queues', set: 'queues' [ 205.446568] kobject: 'tx-0' (000000007e2e981b): kobject_uevent_env [ 205.453112] kobject: 'tx-0' (000000007e2e981b): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 205.469104] kobject: 'rx-0' (000000002cd67050): kobject_cleanup, parent 00000000aed83440 [ 205.485309] kobject: 'rx-0' (000000002cd67050): auto cleanup 'remove' event [ 205.487616] kobject: 'loop4' (000000004400cba0): kobject_uevent_env [ 205.492599] kobject: 'rx-0' (000000002cd67050): kobject_uevent_env [ 205.506814] kobject: 'loop4' (000000004400cba0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 205.506832] kobject: 'rx-0' (000000002cd67050): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 205.530295] kobject: 'rx-0' (000000002cd67050): auto cleanup kobject_del [ 205.542764] kobject: 'rx-0' (000000002cd67050): calling ktype release [ 205.552515] kobject: 'rx-0': free name [ 205.556540] kobject: 'tx-0' (000000008582ff3f): kobject_cleanup, parent 00000000aed83440 [ 205.564959] kobject: 'tx-0' (000000008582ff3f): auto cleanup 'remove' event [ 205.572216] kobject: 'tx-0' (000000008582ff3f): kobject_uevent_env [ 205.578745] kobject: 'tx-0' (000000008582ff3f): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 205.589032] kobject: 'tx-0' (000000008582ff3f): auto cleanup kobject_del [ 205.595952] kobject: 'tx-0' (000000008582ff3f): calling ktype release [ 205.602857] kobject: 'tx-0': free name [ 205.606810] kobject: 'queues' (00000000aed83440): kobject_cleanup, parent (null) [ 205.615427] kobject: 'queues' (00000000aed83440): calling ktype release [ 205.622318] kobject: 'queues' (00000000aed83440): kset_release [ 205.628441] kobject: 'queues': free name [ 205.632880] kobject: 'vet' (000000002bfe8023): kobject_uevent_env [ 205.639319] kobject: 'vet' (000000002bfe8023): fill_kobj_path: path = '/devices/virtual/net/vet' [ 205.650315] kobject: 'rx-0' (0000000090021335): kobject_cleanup, parent 00000000ed99cb1e [ 205.658751] kobject: 'rx-0' (0000000090021335): auto cleanup 'remove' event [ 205.665934] kobject: 'rx-0' (0000000090021335): kobject_uevent_env [ 205.672444] kobject: 'rx-0' (0000000090021335): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 205.682742] kobject: 'rx-0' (0000000090021335): auto cleanup kobject_del [ 205.690055] kobject: 'rx-0' (0000000090021335): calling ktype release [ 205.696745] kobject: 'rx-0': free name [ 205.701554] kobject: 'tx-0' (00000000fb07943e): kobject_cleanup, parent 00000000ed99cb1e [ 205.709937] kobject: 'tx-0' (00000000fb07943e): auto cleanup 'remove' event [ 205.717102] kobject: 'tx-0' (00000000fb07943e): kobject_uevent_env [ 205.723634] kobject: 'tx-0' (00000000fb07943e): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 205.733932] kobject: 'tx-0' (00000000fb07943e): auto cleanup kobject_del [ 205.736929] kobject: 'loop2' (0000000002dde2ec): kobject_uevent_env [ 205.740953] kobject: 'tx-0' (00000000fb07943e): calling ktype release [ 205.754036] kobject: 'tx-0': free name [ 205.758086] kobject: 'queues' (00000000ed99cb1e): kobject_cleanup, parent (null) [ 205.766616] kobject: 'queues' (00000000ed99cb1e): calling ktype release [ 205.773534] kobject: 'queues' (00000000ed99cb1e): kset_release [ 205.773626] kobject: 'loop2' (0000000002dde2ec): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 205.779667] kobject: 'queues': free name [ 205.780022] kobject: 'vet' (000000007c33c8e0): kobject_uevent_env [ 205.799528] kobject: 'vet' (000000007c33c8e0): fill_kobj_path: path = '/devices/virtual/net/vet' [ 205.808851] kobject: 'vet' (000000002bfe8023): kobject_cleanup, parent (null) [ 205.817017] kobject: 'vet' (000000002bfe8023): calling ktype release [ 205.823595] kobject: 'vet': free name [ 205.829297] kobject: 'rx-0' (0000000015ad6802): kobject_cleanup, parent 0000000054854f82 [ 205.838040] kobject: 'rx-0' (0000000015ad6802): auto cleanup 'remove' event [ 205.845253] kobject: 'rx-0' (0000000015ad6802): kobject_uevent_env [ 205.849959] kobject: 'loop5' (00000000e258ff7a): kobject_uevent_env [ 205.851955] kobject: 'rx-0' (0000000015ad6802): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 205.867368] kobject: 'loop5' (00000000e258ff7a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 205.868507] kobject: 'rx-0' (0000000015ad6802): auto cleanup kobject_del [ 205.884830] kobject: 'rx-0' (0000000015ad6802): calling ktype release [ 205.891466] kobject: 'rx-0': free name [ 205.895383] kobject: 'tx-0' (000000007e2e981b): kobject_cleanup, parent 0000000054854f82 [ 205.903652] kobject: 'tx-0' (000000007e2e981b): auto cleanup 'remove' event [ 205.910792] kobject: 'tx-0' (000000007e2e981b): kobject_uevent_env [ 205.917112] kobject: 'tx-0' (000000007e2e981b): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 205.927570] kobject: 'tx-0' (000000007e2e981b): auto cleanup kobject_del [ 205.934417] kobject: 'tx-0' (000000007e2e981b): calling ktype release [ 205.941045] kobject: 'tx-0': free name [ 205.944950] kobject: 'queues' (0000000054854f82): kobject_cleanup, parent (null) [ 205.953386] kobject: 'queues' (0000000054854f82): calling ktype release [ 205.960164] kobject: 'queues' (0000000054854f82): kset_release [ 205.966132] kobject: 'queues': free name [ 205.970526] kobject: 'vet' (00000000b2e37d15): kobject_uevent_env [ 205.976766] kobject: 'vet' (00000000b2e37d15): fill_kobj_path: path = '/devices/virtual/net/vet' [ 205.985977] kobject: 'vet' (000000007c33c8e0): kobject_cleanup, parent (null) 10:48:32 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'\x00', 0x400}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x37, &(0x7f0000000240)}) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) 10:48:32 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, 0x0, 0x0) 10:48:32 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x8, 0x20000) r1 = syz_open_dev$usbmon(&(0x7f00000003c0)='/dev/usbmon#\x00', 0x2, 0x2002) linkat(r0, &(0x7f0000000380)='./file0\x00', r1, &(0x7f0000000400)='./file0/file0\x00', 0x1400) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$trusted_overlay_opaque(r2, 0x0, &(0x7f0000000100)='y\x00', 0x2, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000440)={0x4, {{0xa, 0x4e23, 0x0, @mcast1, 0x3}}}, 0x88) fchmodat(r1, &(0x7f0000000500)='./file0\x00', 0x51) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000540)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000180)={{}, {0x20000000304, @link_local}, 0x4, {0x2, 0x0, @broadcast}, '\x00\x00\x00\x00\x01\x00\x00\x00\xff\xff\xff\xff\xff\xff\xf1\x00'}) 10:48:32 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x100000003) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0a5c2d023c126285718070") syz_execute_func(&(0x7f0000000000)="c46181e2b4f6ffa53a20c4427d786d0167f2440f34ffc427cc39f717c4dc75180f5f6500e97726b810ae0010ae00a5a563ad48eb9e9e7fd4be00aa6151ddb52ba38a4d381cb9a2e12226f242d64a59c4026dbfe244b3abe5b86736d1b2") 10:48:32 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x43732e5398416f1a}) [ 205.994139] kobject: 'vet' (000000007c33c8e0): calling ktype release [ 206.000685] kobject: 'vet': free name [ 206.022272] kobject: 'loop3' (00000000e313bff6): kobject_uevent_env 10:48:32 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) [ 206.037504] kobject: 'vet' (00000000b2e37d15): kobject_cleanup, parent (null) [ 206.038689] kobject: 'loop3' (00000000e313bff6): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 206.055831] kobject: 'vet' (000000008a628674): kobject_add_internal: parent: 'net', set: 'devices' [ 206.059482] kobject: 'vet' (00000000b2e37d15): calling ktype release [ 206.066430] kobject: 'vet' (000000008a628674): kobject_uevent_env [ 206.084246] kobject: 'loop0' (000000001f64c8ea): kobject_uevent_env 10:48:32 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x100000003) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0a5c2d023c126285718070") syz_execute_func(&(0x7f0000000000)="c46181e2b4f6ffa53a20c4427d786d0167f2440f34ffc427cc39f717c4dc75180f5f6500e97726b810ae0010ae00a5a563ad48eb9e9e7fd4be00aa6151ddb52ba38a4d381cb9a2e12226f242d64a59c4026dbfe244b3abe5b86736d1b2") [ 206.091370] kobject: 'vet' (000000008a628674): fill_kobj_path: path = '/devices/virtual/net/vet' [ 206.102769] kobject: 'loop0' (000000001f64c8ea): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 206.108603] kobject: 'vet': free name [ 206.127576] kobject: 'loop2' (0000000002dde2ec): kobject_uevent_env [ 206.129687] kobject: 'queues' (00000000da67d95e): kobject_add_internal: parent: 'vet', set: '' 10:48:32 executing program 0: socket(0x40000000015, 0x5, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r2, 0x2) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = accept(r2, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$alg(r4, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000980)="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