[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 53.674432][ T26] audit: type=1800 audit(1572470826.569:25): pid=8440 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 53.695706][ T26] audit: type=1800 audit(1572470826.569:26): pid=8440 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 53.716336][ T26] audit: type=1800 audit(1572470826.569:27): pid=8440 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.142' (ECDSA) to the list of known hosts. 2019/10/30 21:27:17 fuzzer started 2019/10/30 21:27:18 dialing manager at 10.128.0.26:32889 2019/10/30 21:27:18 syscalls: 2541 2019/10/30 21:27:18 code coverage: enabled 2019/10/30 21:27:18 comparison tracing: enabled 2019/10/30 21:27:18 extra coverage: extra coverage is not supported by the kernel 2019/10/30 21:27:18 setuid sandbox: enabled 2019/10/30 21:27:18 namespace sandbox: enabled 2019/10/30 21:27:18 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/30 21:27:18 fault injection: enabled 2019/10/30 21:27:18 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/30 21:27:18 net packet injection: enabled 2019/10/30 21:27:18 net device setup: enabled 2019/10/30 21:27:18 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 21:27:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x100, 0x0) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) getpid() sched_setscheduler(0x0, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000200), 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 21:27:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000100), 0xe7) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000005c0), 0x100e3, 0x0, 0x0, 0xfffffffffffffd94) syzkaller login: [ 102.361828][ T8605] IPVS: ftp: loaded support on port[0] = 21 [ 102.514344][ T8605] chnl_net:caif_netlink_parms(): no params data found [ 102.594495][ T8605] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.616074][ T8605] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.623677][ T8605] device bridge_slave_0 entered promiscuous mode 21:27:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x200000000000004) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000001200)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) listen(r1, 0xfc0001) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000013c0)={0x0, @in={{0x2, 0x0, @dev}}}, 0x7) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 102.639227][ T8605] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.646694][ T8605] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.654622][ T8605] device bridge_slave_1 entered promiscuous mode [ 102.697977][ T8608] IPVS: ftp: loaded support on port[0] = 21 [ 102.743668][ T8605] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 102.762446][ T8605] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 102.789001][ T8605] team0: Port device team_slave_0 added [ 102.812522][ T8605] team0: Port device team_slave_1 added [ 102.845437][ T8610] IPVS: ftp: loaded support on port[0] = 21 [ 102.878294][ T8605] device hsr_slave_0 entered promiscuous mode 21:27:55 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) fadvise64(r0, 0x200000000, 0xfff, 0x4) [ 102.926233][ T8605] device hsr_slave_1 entered promiscuous mode [ 103.115181][ T8613] IPVS: ftp: loaded support on port[0] = 21 [ 103.155343][ T8605] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.162576][ T8605] bridge0: port 2(bridge_slave_1) entered forwarding state [ 103.170231][ T8605] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.177364][ T8605] bridge0: port 1(bridge_slave_0) entered forwarding state [ 103.200858][ T8608] chnl_net:caif_netlink_parms(): no params data found 21:27:56 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') r0 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="34c775ccefbbc44b0a03a9e45afc4ef1be01fa8dff6aa640797ea9ed66a4f8fdeaef0ad9dfbe93fc6bccc58a4569feffffff94342c64dd8165ebea25878b8a8da2560890b8f323579e28943ebc6c05f442ec8ab4712545e6e3d021fdf6b8ff2137a52dc71c80e3c56001709c67a1ec8cb0958dca220c3fc348fea27771afdb52"], 0x80) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) creat(&(0x7f0000000140)='./file0\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) [ 103.408117][ T8608] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.415247][ T8608] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.425605][ T8608] device bridge_slave_0 entered promiscuous mode [ 103.462375][ T8605] 8021q: adding VLAN 0 to HW filter on device bond0 [ 103.480330][ T8610] chnl_net:caif_netlink_parms(): no params data found [ 103.489002][ T8617] IPVS: ftp: loaded support on port[0] = 21 [ 103.510326][ T8608] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.519802][ T8608] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.528634][ T8608] device bridge_slave_1 entered promiscuous mode [ 103.536162][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 103.546795][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.554881][ T12] bridge0: port 2(bridge_slave_1) entered disabled state 21:27:56 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x4) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x400442c8, &(0x7f0000000040)={0x3, 0x0}) [ 103.564385][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 103.617016][ T8605] 8021q: adding VLAN 0 to HW filter on device team0 [ 103.639490][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 103.648715][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 103.657714][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.664814][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 103.710124][ T8608] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 103.720806][ T8608] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 103.747667][ T8610] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.754739][ T8610] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.762556][ T8610] device bridge_slave_0 entered promiscuous mode [ 103.789227][ T8610] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.796407][ T8610] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.803989][ T8610] device bridge_slave_1 entered promiscuous mode [ 103.811126][ T8614] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 103.819822][ T8614] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 103.828348][ T8614] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.835380][ T8614] bridge0: port 2(bridge_slave_1) entered forwarding state [ 103.845078][ T8613] chnl_net:caif_netlink_parms(): no params data found [ 103.871628][ T8614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 103.882582][ T8608] team0: Port device team_slave_0 added [ 103.898631][ T8622] IPVS: ftp: loaded support on port[0] = 21 [ 103.918233][ T8610] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 103.934815][ T8610] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 103.946702][ T8608] team0: Port device team_slave_1 added [ 103.980796][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 103.998359][ T8613] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.005401][ T8613] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.014218][ T8613] device bridge_slave_0 entered promiscuous mode [ 104.021971][ T8613] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.029429][ T8613] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.037472][ T8613] device bridge_slave_1 entered promiscuous mode [ 104.110388][ T8608] device hsr_slave_0 entered promiscuous mode [ 104.178065][ T8608] device hsr_slave_1 entered promiscuous mode [ 104.216208][ T8608] debugfs: Directory 'hsr0' with parent '/' already present! [ 104.225641][ T8610] team0: Port device team_slave_0 added [ 104.233831][ T8610] team0: Port device team_slave_1 added [ 104.283584][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 104.292353][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 104.300750][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 104.370008][ T8610] device hsr_slave_0 entered promiscuous mode [ 104.429002][ T8610] device hsr_slave_1 entered promiscuous mode [ 104.466080][ T8610] debugfs: Directory 'hsr0' with parent '/' already present! [ 104.474918][ T8613] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 104.487955][ T8613] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 104.508015][ T8617] chnl_net:caif_netlink_parms(): no params data found [ 104.538076][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 104.546538][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 104.556725][ T8613] team0: Port device team_slave_0 added [ 104.572338][ T8605] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 104.585465][ T8605] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 104.608463][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 104.617030][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 104.625357][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 104.633821][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 104.642165][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 104.653669][ T8613] team0: Port device team_slave_1 added [ 104.768694][ T8613] device hsr_slave_0 entered promiscuous mode [ 104.816425][ T8613] device hsr_slave_1 entered promiscuous mode [ 104.856189][ T8613] debugfs: Directory 'hsr0' with parent '/' already present! [ 104.881666][ T8605] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 104.889360][ T8617] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.896880][ T8617] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.904748][ T8617] device bridge_slave_0 entered promiscuous mode [ 104.917357][ T8617] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.924393][ T8617] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.933155][ T8617] device bridge_slave_1 entered promiscuous mode [ 104.999451][ T8617] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 105.055522][ T8617] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 105.084431][ T8622] chnl_net:caif_netlink_parms(): no params data found [ 105.154083][ T8608] 8021q: adding VLAN 0 to HW filter on device bond0 [ 105.179016][ T8617] team0: Port device team_slave_0 added [ 105.197330][ T8622] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.204428][ T8622] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.221358][ T8622] device bridge_slave_0 entered promiscuous mode [ 105.233157][ T8622] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.242349][ T8622] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.251756][ T8622] device bridge_slave_1 entered promiscuous mode [ 105.260822][ T8617] team0: Port device team_slave_1 added [ 105.321378][ T8622] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 105.352478][ T8622] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 105.415002][ T8613] 8021q: adding VLAN 0 to HW filter on device bond0 [ 105.462381][ C1] hrtimer: interrupt took 47045 ns [ 105.511108][ T8617] device hsr_slave_0 entered promiscuous mode 21:27:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x100, 0x0) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) getpid() sched_setscheduler(0x0, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000200), 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 105.586777][ T8617] device hsr_slave_1 entered promiscuous mode [ 105.619952][ T8617] debugfs: Directory 'hsr0' with parent '/' already present! [ 105.668067][ T8614] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 105.675836][ T8614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 105.686178][ T8608] 8021q: adding VLAN 0 to HW filter on device team0 [ 105.703811][ T8613] 8021q: adding VLAN 0 to HW filter on device team0 [ 105.738229][ T8613] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 105.748707][ T8613] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 105.774171][ T8613] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 105.827216][ T8622] team0: Port device team_slave_0 added [ 105.833194][ T8614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 105.862936][ T8614] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 105.871892][ T8614] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.878980][ T8614] bridge0: port 1(bridge_slave_0) entered forwarding state [ 105.887958][ T8614] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 105.895714][ T8614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 105.904088][ T8614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 105.919007][ T8614] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 105.932436][ T8614] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.939537][ T8614] bridge0: port 1(bridge_slave_0) entered forwarding state [ 105.953976][ T8614] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 105.962778][ T8614] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 105.977736][ T8614] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.984818][ T8614] bridge0: port 2(bridge_slave_1) entered forwarding state [ 105.998328][ T8614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 106.010613][ T8614] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 106.022644][ T8614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 106.034804][ T8614] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 106.050286][ T8614] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 106.061734][ T8614] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 106.074410][ T8614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 21:27:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x100, 0x0) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) getpid() sched_setscheduler(0x0, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000200), 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 106.085309][ T8614] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 106.100428][ T8614] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 106.111811][ T8614] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 106.151409][ T8622] team0: Port device team_slave_1 added [ 106.179369][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 106.189919][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 106.212307][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 106.229259][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 106.242090][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 106.251064][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 106.264008][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.271116][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.283605][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 106.292513][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 106.306613][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 106.315397][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 106.331711][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 106.344201][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 106.359913][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 106.373773][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 106.388520][ T8610] 8021q: adding VLAN 0 to HW filter on device bond0 [ 106.425881][ T8608] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 106.444304][ T8608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 106.462492][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 106.472094][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 106.492896][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 21:27:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x100, 0x0) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) getpid() sched_setscheduler(0x0, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000200), 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 106.574077][ T8622] device hsr_slave_0 entered promiscuous mode [ 106.622635][ T8622] device hsr_slave_1 entered promiscuous mode [ 106.708062][ T8622] debugfs: Directory 'hsr0' with parent '/' already present! [ 106.743901][ T8610] 8021q: adding VLAN 0 to HW filter on device team0 [ 106.766657][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 106.783235][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 21:27:59 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) fadvise64(r0, 0x200000000, 0xfff, 0x4) [ 106.838322][ T8608] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 106.874259][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 106.895104][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 106.925566][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.932707][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.965120][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 106.988230][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 21:27:59 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) fadvise64(r0, 0x200000000, 0xfff, 0x4) [ 107.009685][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.016813][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state 21:28:00 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) fadvise64(r0, 0x200000000, 0xfff, 0x4) [ 107.083975][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 107.156472][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 107.168606][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 21:28:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x100, 0x0) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) getpid() sched_setscheduler(0x0, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000200), 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 107.201799][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 107.247219][ T8646] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 107.294042][ T8610] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 107.316200][ T8610] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 107.344707][ T8610] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 107.427267][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 107.435765][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 107.467052][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 107.475648][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 107.491185][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 107.502894][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 107.516801][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 107.592515][ T8622] 8021q: adding VLAN 0 to HW filter on device bond0 [ 107.616644][ T8622] 8021q: adding VLAN 0 to HW filter on device team0 [ 107.677508][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 107.702167][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 107.728812][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 107.742849][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 107.755386][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 107.767877][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 21:28:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000100), 0xe7) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000005c0), 0x100e3, 0x0, 0x0, 0xfffffffffffffd94) [ 107.776868][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 107.785252][ T3022] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.792455][ T3022] bridge0: port 1(bridge_slave_0) entered forwarding state [ 107.810879][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 107.819520][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 107.828743][ T3022] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.835797][ T3022] bridge0: port 2(bridge_slave_1) entered forwarding state [ 107.843805][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 107.855576][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 107.864605][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 107.873771][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 107.878973][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 107.882560][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 107.908171][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 107.920810][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 107.934774][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 107.948237][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 107.959537][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 107.973808][ T8622] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 21:28:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x200000000000004) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000001200)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) listen(r1, 0xfc0001) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000013c0)={0x0, @in={{0x2, 0x0, @dev}}}, 0x7) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 21:28:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x6, &(0x7f0000000140), &(0x7f0000000180)=0x4) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) mmap$perf(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) fchdir(r0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000240), 0xc) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000740)) [ 108.011744][ T8614] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 108.020907][ T8614] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 108.069885][ T8617] 8021q: adding VLAN 0 to HW filter on device bond0 [ 108.092093][ T8622] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 108.160581][ T3799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 108.174379][ T3799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 108.234222][ T8617] 8021q: adding VLAN 0 to HW filter on device team0 [ 108.272651][ T3799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 108.284216][ T3799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 108.293752][ T3799] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.300870][ T3799] bridge0: port 1(bridge_slave_0) entered forwarding state [ 108.355288][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 108.364178][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 108.373196][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 108.382356][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.389480][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 108.397862][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 108.406816][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 108.415258][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 108.423805][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 108.432246][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 108.441314][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 108.449785][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 108.458198][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 108.469675][ T8617] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 108.481248][ T8617] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 108.489334][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 108.498385][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 108.507195][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 108.549022][ T8617] 8021q: adding VLAN 0 to HW filter on device batadv0 21:28:01 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') r0 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="34c775ccefbbc44b0a03a9e45afc4ef1be01fa8dff6aa640797ea9ed66a4f8fdeaef0ad9dfbe93fc6bccc58a4569feffffff94342c64dd8165ebea25878b8a8da2560890b8f323579e28943ebc6c05f442ec8ab4712545e6e3d021fdf6b8ff2137a52dc71c80e3c56001709c67a1ec8cb0958dca220c3fc348fea27771afdb52"], 0x80) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) creat(&(0x7f0000000140)='./file0\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) 21:28:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000100), 0xe7) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000005c0), 0x100e3, 0x0, 0x0, 0xfffffffffffffd94) 21:28:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x100, 0x0) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) getpid() sched_setscheduler(0x0, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000200), 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 21:28:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x6, &(0x7f0000000140), &(0x7f0000000180)=0x4) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) mmap$perf(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) fchdir(r0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000240), 0xc) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000740)) 21:28:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x200000000000004) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000001200)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) listen(r1, 0xfc0001) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000013c0)={0x0, @in={{0x2, 0x0, @dev}}}, 0x7) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 21:28:01 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x4) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x400442c8, &(0x7f0000000040)={0x3, 0x0}) [ 108.838607][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:28:01 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') r0 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="34c775ccefbbc44b0a03a9e45afc4ef1be01fa8dff6aa640797ea9ed66a4f8fdeaef0ad9dfbe93fc6bccc58a4569feffffff94342c64dd8165ebea25878b8a8da2560890b8f323579e28943ebc6c05f442ec8ab4712545e6e3d021fdf6b8ff2137a52dc71c80e3c56001709c67a1ec8cb0958dca220c3fc348fea27771afdb52"], 0x80) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) creat(&(0x7f0000000140)='./file0\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) 21:28:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x6, &(0x7f0000000140), &(0x7f0000000180)=0x4) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) mmap$perf(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) fchdir(r0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000240), 0xc) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000740)) 21:28:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000100), 0xe7) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000005c0), 0x100e3, 0x0, 0x0, 0xfffffffffffffd94) 21:28:01 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x4) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x400442c8, &(0x7f0000000040)={0x3, 0x0}) 21:28:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x200000000000004) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000001200)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) listen(r1, 0xfc0001) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000013c0)={0x0, @in={{0x2, 0x0, @dev}}}, 0x7) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 109.092533][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:28:02 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') r0 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="34c775ccefbbc44b0a03a9e45afc4ef1be01fa8dff6aa640797ea9ed66a4f8fdeaef0ad9dfbe93fc6bccc58a4569feffffff94342c64dd8165ebea25878b8a8da2560890b8f323579e28943ebc6c05f442ec8ab4712545e6e3d021fdf6b8ff2137a52dc71c80e3c56001709c67a1ec8cb0958dca220c3fc348fea27771afdb52"], 0x80) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) creat(&(0x7f0000000140)='./file0\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) 21:28:02 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x4) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x400442c8, &(0x7f0000000040)={0x3, 0x0}) 21:28:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x100, 0x0) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) getpid() sched_setscheduler(0x0, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000200), 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 21:28:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x6, &(0x7f0000000140), &(0x7f0000000180)=0x4) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) mmap$perf(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) fchdir(r0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000240), 0xc) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000740)) 21:28:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x6, &(0x7f0000000140), &(0x7f0000000180)=0x4) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) mmap$perf(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) fchdir(r0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000240), 0xc) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000740)) 21:28:02 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') r0 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="34c775ccefbbc44b0a03a9e45afc4ef1be01fa8dff6aa640797ea9ed66a4f8fdeaef0ad9dfbe93fc6bccc58a4569feffffff94342c64dd8165ebea25878b8a8da2560890b8f323579e28943ebc6c05f442ec8ab4712545e6e3d021fdf6b8ff2137a52dc71c80e3c56001709c67a1ec8cb0958dca220c3fc348fea27771afdb52"], 0x80) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) creat(&(0x7f0000000140)='./file0\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) 21:28:02 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') r0 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="34c775ccefbbc44b0a03a9e45afc4ef1be01fa8dff6aa640797ea9ed66a4f8fdeaef0ad9dfbe93fc6bccc58a4569feffffff94342c64dd8165ebea25878b8a8da2560890b8f323579e28943ebc6c05f442ec8ab4712545e6e3d021fdf6b8ff2137a52dc71c80e3c56001709c67a1ec8cb0958dca220c3fc348fea27771afdb52"], 0x80) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) creat(&(0x7f0000000140)='./file0\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) 21:28:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x6, &(0x7f0000000140), &(0x7f0000000180)=0x4) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) mmap$perf(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) fchdir(r0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000240), 0xc) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000740)) 21:28:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x6, &(0x7f0000000140), &(0x7f0000000180)=0x4) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) mmap$perf(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) fchdir(r0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000240), 0xc) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000740)) 21:28:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x6, &(0x7f0000000140), &(0x7f0000000180)=0x4) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) mmap$perf(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) fchdir(r0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000240), 0xc) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000740)) 21:28:03 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') r0 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="34c775ccefbbc44b0a03a9e45afc4ef1be01fa8dff6aa640797ea9ed66a4f8fdeaef0ad9dfbe93fc6bccc58a4569feffffff94342c64dd8165ebea25878b8a8da2560890b8f323579e28943ebc6c05f442ec8ab4712545e6e3d021fdf6b8ff2137a52dc71c80e3c56001709c67a1ec8cb0958dca220c3fc348fea27771afdb52"], 0x80) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) creat(&(0x7f0000000140)='./file0\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) 21:28:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x6, &(0x7f0000000140), &(0x7f0000000180)=0x4) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) mmap$perf(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) fchdir(r0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000240), 0xc) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000740)) 21:28:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x6, &(0x7f0000000140), &(0x7f0000000180)=0x4) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) mmap$perf(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) fchdir(r0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000240), 0xc) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000740)) 21:28:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x6, &(0x7f0000000140), &(0x7f0000000180)=0x4) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) mmap$perf(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) fchdir(r0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000240), 0xc) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000740)) 21:28:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x200000000000004) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000001200)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) listen(r1, 0xfc0001) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000013c0)={0x0, @in={{0x2, 0x0, @dev}}}, 0x7) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 21:28:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000100), 0xe7) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000005c0), 0x100e3, 0x0, 0x0, 0xfffffffffffffd94) 21:28:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x6, &(0x7f0000000140), &(0x7f0000000180)=0x4) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) mmap$perf(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) fchdir(r0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000240), 0xc) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000740)) [ 110.599054][ T8792] overlayfs: overlapping lowerdir path [ 110.698663][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:28:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x200000000000004) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000001200)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) listen(r1, 0xfc0001) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000013c0)={0x0, @in={{0x2, 0x0, @dev}}}, 0x7) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 21:28:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x6, &(0x7f0000000140), &(0x7f0000000180)=0x4) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) mmap$perf(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) fchdir(r0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000240), 0xc) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000740)) 21:28:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000100), 0xe7) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000005c0), 0x100e3, 0x0, 0x0, 0xfffffffffffffd94) 21:28:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x6, &(0x7f0000000140), &(0x7f0000000180)=0x4) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) mmap$perf(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) fchdir(r0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000240), 0xc) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000740)) 21:28:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000100), 0xe7) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000005c0), 0x100e3, 0x0, 0x0, 0xfffffffffffffd94) [ 110.944503][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:28:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x200000000000004) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) r1 = socket$inet(0xa, 0x801, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000001200)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) listen(r1, 0xfc0001) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000013c0)={0x0, @in={{0x2, 0x0, @dev}}}, 0x7) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 21:28:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000100), 0xe7) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000005c0), 0x100e3, 0x0, 0x0, 0xfffffffffffffd94) [ 110.988523][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:28:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r2) 21:28:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000100), 0xe7) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000005c0), 0x100e3, 0x0, 0x0, 0xfffffffffffffd94) [ 111.103210][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:28:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x6, &(0x7f0000000140), &(0x7f0000000180)=0x4) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) mmap$perf(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) fchdir(r0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000240), 0xc) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000740)) 21:28:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r2) 21:28:04 executing program 0: r0 = socket$inet(0x2, 0x3, 0x800008800000001) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x8, 0x6}, 0x2c) getsockopt$inet_mreqsrc(r0, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f0000000040)=0x2c) 21:28:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000a80)=@ipv4_newroute={0x28, 0x18, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@RTA_MULTIPATH={0xc}]}, 0x28}}, 0x0) [ 111.317233][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:28:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x6, &(0x7f0000000140), &(0x7f0000000180)=0x4) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) mmap$perf(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) fchdir(r0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000240), 0xc) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000740)) 21:28:04 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000006c0)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000840)={0x0, 0xb, 0x0, "8af6dcf251a17147bc811bad12e5c06c61bc310e99b167e2043149bd6c61e0e1"}) 21:28:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000100), 0xe7) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000005c0), 0x100e3, 0x0, 0x0, 0xfffffffffffffd94) 21:28:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000a80)=@ipv4_newroute={0x28, 0x18, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@RTA_MULTIPATH={0xc}]}, 0x28}}, 0x0) 21:28:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r2) 21:28:04 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000006c0)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000840)={0x0, 0xb, 0x0, "8af6dcf251a17147bc811bad12e5c06c61bc310e99b167e2043149bd6c61e0e1"}) 21:28:04 executing program 5: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f000057bff0)={0x2, 0x0, @initdev}, 0xfffffffffffffe88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x400000, 0x3, &(0x7f0000bff000/0x400000)=nil) 21:28:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r2) 21:28:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000a80)=@ipv4_newroute={0x28, 0x18, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@RTA_MULTIPATH={0xc}]}, 0x28}}, 0x0) 21:28:04 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000300)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0xfffffffffffffffa, 0x0, 0x0, 0x20}) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, &(0x7f0000000080)) 21:28:04 executing program 4: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0xfe51) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x40000000000002f, 0x0) 21:28:04 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000240)) 21:28:04 executing program 5: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f000057bff0)={0x2, 0x0, @initdev}, 0xfffffffffffffe88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x400000, 0x3, &(0x7f0000bff000/0x400000)=nil) 21:28:04 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000006c0)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000840)={0x0, 0xb, 0x0, "8af6dcf251a17147bc811bad12e5c06c61bc310e99b167e2043149bd6c61e0e1"}) 21:28:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000a80)=@ipv4_newroute={0x28, 0x18, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@RTA_MULTIPATH={0xc}]}, 0x28}}, 0x0) [ 111.960114][ T8878] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 21:28:05 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000240)) 21:28:05 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000006c0)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000840)={0x0, 0xb, 0x0, "8af6dcf251a17147bc811bad12e5c06c61bc310e99b167e2043149bd6c61e0e1"}) 21:28:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x2, 0x0, 0x4) 21:28:05 executing program 5: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f000057bff0)={0x2, 0x0, @initdev}, 0xfffffffffffffe88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x400000, 0x3, &(0x7f0000bff000/0x400000)=nil) 21:28:05 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a303c6000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) 21:28:05 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) pread64(r0, 0x0, 0x0, 0x0) 21:28:05 executing program 3: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a303c6000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) 21:28:05 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000240)) 21:28:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x2, 0x0, 0x4) 21:28:05 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a303c6000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) 21:28:05 executing program 5: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f000057bff0)={0x2, 0x0, @initdev}, 0xfffffffffffffe88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x400000, 0x3, &(0x7f0000bff000/0x400000)=nil) 21:28:05 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000240)) 21:28:05 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a303c6000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) 21:28:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x2, 0x0, 0x4) 21:28:05 executing program 3: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a303c6000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) 21:28:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000080)=0x6, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_ifreq(r1, 0x8937, &(0x7f0000000100)={'veth0\x00', @ifru_settings={0x10001, 0x0, @fr=0x0}}) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x18, &(0x7f0000000140)={{0x0, @loopback, 0x0, 0x0, 'wlc\x00'}, {@local}}, 0x3) 21:28:05 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a303c6000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) 21:28:05 executing program 2: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0xfffffffffffffea8) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x8, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x967b4bb21dc420bc}, 0xc, 0x0}, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) execve(0x0, 0x0, 0x0) pipe(0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) lsetxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 21:28:05 executing program 3: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a303c6000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) 21:28:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x2, 0x0, 0x4) 21:28:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000080)=0x6, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_ifreq(r1, 0x8937, &(0x7f0000000100)={'veth0\x00', @ifru_settings={0x10001, 0x0, @fr=0x0}}) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x18, &(0x7f0000000140)={{0x0, @loopback, 0x0, 0x0, 'wlc\x00'}, {@local}}, 0x3) 21:28:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000080)=0x6, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_ifreq(r1, 0x8937, &(0x7f0000000100)={'veth0\x00', @ifru_settings={0x10001, 0x0, @fr=0x0}}) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x18, &(0x7f0000000140)={{0x0, @loopback, 0x0, 0x0, 'wlc\x00'}, {@local}}, 0x3) 21:28:05 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) pread64(r0, 0x0, 0x0, 0x0) 21:28:06 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000c80)=ANY=[@ANYBLOB="7008000024000705dffe0f00000000ebff000000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff0000000008000100746266004408020001040000000000006b0001000014dfcfce4dc8e9609705e0378b4000515d734b8070c3f44ebf90cfe6f843a8dcc0f35e0000000000000000040402000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000903316558fabb04e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000edffffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000100000000000000000000000000100001000000000000000000000000000404020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a7514190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fa8de3653590e3b29577afa916c7b38c2cdd3a94e4cb62465545929c8f19d2a0e8857224e48ff3f4d70bcc425e7a116226e43a0fc74ca409871aa83317f4a74a1c4274439daa02ef763c6d712856b94d7c13d6b1e46153d107d7f3e467faeb814d29a1befd32f84858440c421db8ec4e6efbca9c12b2eaffa00252e91334954bc868a691c2fc2ff1365039537a36157841dd25f56833978bb617a8a9d950f757af0d56b012593dff7e0cbb7ccdfd300596657a0b37bbbaaf30ccda2bfa7f9587ded48847eb8024e1d7c1d33220763e02d267e2143d6d2654b8508b8d7cd81af3e2a019b4ac75d201255ea02d313ae1938774e2f7262cabb91f80dcb995d8f13c88a31e3264d50da6d10956721f4313f19f40dbb722ac2e6e12746c177cf96c747b0396c776be5aa04e879dd05db68e51e9b1360ad6f9c9f0568436418fd0c6a96fa388fd93792fe205e63c2b2aaead9f1f5f50c524a9ae21452c00"/2501], 0x870}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) 21:28:06 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000001000009381, 0x0) [ 113.126095][ C1] net_ratelimit: 1 callbacks suppressed [ 113.126108][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 113.137685][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:28:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000080)=0x6, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_ifreq(r1, 0x8937, &(0x7f0000000100)={'veth0\x00', @ifru_settings={0x10001, 0x0, @fr=0x0}}) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x18, &(0x7f0000000140)={{0x0, @loopback, 0x0, 0x0, 'wlc\x00'}, {@local}}, 0x3) 21:28:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000080)=0x6, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_ifreq(r1, 0x8937, &(0x7f0000000100)={'veth0\x00', @ifru_settings={0x10001, 0x0, @fr=0x0}}) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x18, &(0x7f0000000140)={{0x0, @loopback, 0x0, 0x0, 'wlc\x00'}, {@local}}, 0x3) [ 113.206070][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 113.211872][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:28:06 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000001000009381, 0x0) [ 113.303637][ T8978] netlink: 1084 bytes leftover after parsing attributes in process `syz-executor.3'. [ 113.326630][ T8978] netlink: 1084 bytes leftover after parsing attributes in process `syz-executor.3'. 21:28:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000080)=0x6, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_ifreq(r1, 0x8937, &(0x7f0000000100)={'veth0\x00', @ifru_settings={0x10001, 0x0, @fr=0x0}}) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x18, &(0x7f0000000140)={{0x0, @loopback, 0x0, 0x0, 'wlc\x00'}, {@local}}, 0x3) [ 113.366077][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 113.371960][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 113.381164][ T8985] netlink: 1084 bytes leftover after parsing attributes in process `syz-executor.3'. [ 113.419636][ T8985] netlink: 1084 bytes leftover after parsing attributes in process `syz-executor.3'. 21:28:06 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000c80)=ANY=[@ANYBLOB="7008000024000705dffe0f00000000ebff000000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff0000000008000100746266004408020001040000000000006b0001000014dfcfce4dc8e9609705e0378b4000515d734b8070c3f44ebf90cfe6f843a8dcc0f35e0000000000000000040402000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000903316558fabb04e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000edffffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000100000000000000000000000000100001000000000000000000000000000404020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a7514190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fa8de3653590e3b29577afa916c7b38c2cdd3a94e4cb62465545929c8f19d2a0e8857224e48ff3f4d70bcc425e7a116226e43a0fc74ca409871aa83317f4a74a1c4274439daa02ef763c6d712856b94d7c13d6b1e46153d107d7f3e467faeb814d29a1befd32f84858440c421db8ec4e6efbca9c12b2eaffa00252e91334954bc868a691c2fc2ff1365039537a36157841dd25f56833978bb617a8a9d950f757af0d56b012593dff7e0cbb7ccdfd300596657a0b37bbbaaf30ccda2bfa7f9587ded48847eb8024e1d7c1d33220763e02d267e2143d6d2654b8508b8d7cd81af3e2a019b4ac75d201255ea02d313ae1938774e2f7262cabb91f80dcb995d8f13c88a31e3264d50da6d10956721f4313f19f40dbb722ac2e6e12746c177cf96c747b0396c776be5aa04e879dd05db68e51e9b1360ad6f9c9f0568436418fd0c6a96fa388fd93792fe205e63c2b2aaead9f1f5f50c524a9ae21452c00"/2501], 0x870}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) 21:28:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000080)=0x6, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_ifreq(r1, 0x8937, &(0x7f0000000100)={'veth0\x00', @ifru_settings={0x10001, 0x0, @fr=0x0}}) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x18, &(0x7f0000000140)={{0x0, @loopback, 0x0, 0x0, 'wlc\x00'}, {@local}}, 0x3) 21:28:06 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000001000009381, 0x0) 21:28:06 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) pread64(r0, 0x0, 0x0, 0x0) 21:28:06 executing program 5: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000480)) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) 21:28:06 executing program 2: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0xfffffffffffffea8) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x8, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x967b4bb21dc420bc}, 0xc, 0x0}, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) execve(0x0, 0x0, 0x0) pipe(0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) lsetxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 21:28:06 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000001000009381, 0x0) [ 113.970819][ T9002] netlink: 1084 bytes leftover after parsing attributes in process `syz-executor.3'. [ 114.045279][ T9002] netlink: 1084 bytes leftover after parsing attributes in process `syz-executor.3'. 21:28:07 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000c80)=ANY=[@ANYBLOB="7008000024000705dffe0f00000000ebff000000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff0000000008000100746266004408020001040000000000006b0001000014dfcfce4dc8e9609705e0378b4000515d734b8070c3f44ebf90cfe6f843a8dcc0f35e0000000000000000040402000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000903316558fabb04e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000edffffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000100000000000000000000000000100001000000000000000000000000000404020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a7514190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fa8de3653590e3b29577afa916c7b38c2cdd3a94e4cb62465545929c8f19d2a0e8857224e48ff3f4d70bcc425e7a116226e43a0fc74ca409871aa83317f4a74a1c4274439daa02ef763c6d712856b94d7c13d6b1e46153d107d7f3e467faeb814d29a1befd32f84858440c421db8ec4e6efbca9c12b2eaffa00252e91334954bc868a691c2fc2ff1365039537a36157841dd25f56833978bb617a8a9d950f757af0d56b012593dff7e0cbb7ccdfd300596657a0b37bbbaaf30ccda2bfa7f9587ded48847eb8024e1d7c1d33220763e02d267e2143d6d2654b8508b8d7cd81af3e2a019b4ac75d201255ea02d313ae1938774e2f7262cabb91f80dcb995d8f13c88a31e3264d50da6d10956721f4313f19f40dbb722ac2e6e12746c177cf96c747b0396c776be5aa04e879dd05db68e51e9b1360ad6f9c9f0568436418fd0c6a96fa388fd93792fe205e63c2b2aaead9f1f5f50c524a9ae21452c00"/2501], 0x870}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 114.166055][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 114.171919][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:28:07 executing program 4: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0xfffffffffffffea8) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x8, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x967b4bb21dc420bc}, 0xc, 0x0}, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) execve(0x0, 0x0, 0x0) pipe(0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) lsetxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 21:28:07 executing program 1: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0xfffffffffffffea8) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x8, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x967b4bb21dc420bc}, 0xc, 0x0}, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) execve(0x0, 0x0, 0x0) pipe(0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) lsetxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 114.283986][ T9022] netlink: 1084 bytes leftover after parsing attributes in process `syz-executor.3'. [ 114.316546][ T9022] netlink: 1084 bytes leftover after parsing attributes in process `syz-executor.3'. 21:28:07 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) pread64(r0, 0x0, 0x0, 0x0) 21:28:07 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000c80)=ANY=[@ANYBLOB="7008000024000705dffe0f00000000ebff000000", @ANYRES32=r1, @ANYBLOB="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"/2501], 0x870}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 114.520136][ T9034] netlink: 1084 bytes leftover after parsing attributes in process `syz-executor.3'. [ 114.552151][ T9034] netlink: 1084 bytes leftover after parsing attributes in process `syz-executor.3'. 21:28:07 executing program 5: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000480)) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) [ 114.646506][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 114.652668][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:28:07 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000480)) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) 21:28:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040), 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001080)=[{&(0x7f0000000300)="6032145f4a1f58cf7f72201d805504abfa91ae39a1122c44636238b4719a79900b175094a2dfdc460712f58d89", 0x2d}, {&(0x7f0000001000)}, {&(0x7f0000001040)}], 0x3) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x4, @mcast2, 0x6}}, 0x6, 0xfffffffc, 0x0, 0x5}, &(0x7f0000000540)=0x98) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$char_usb(r0, 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) connect$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x2, 0x0, 0x0, 0x4}}, 0x32) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$char_usb(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)={0x30, 0x0, 0xffffff56, 0x0, 0x0, 0xffffffffffffffff, 0x1}, 0x3c) 21:28:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040), 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001080)=[{&(0x7f0000000300)="6032145f4a1f58cf7f72201d805504abfa91ae39a1122c44636238b4719a79900b175094a2dfdc460712f58d89", 0x2d}, {&(0x7f0000001000)}, {&(0x7f0000001040)}], 0x3) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x4, @mcast2, 0x6}}, 0x6, 0xfffffffc, 0x0, 0x5}, &(0x7f0000000540)=0x98) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$char_usb(r0, 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) connect$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x2, 0x0, 0x0, 0x4}}, 0x32) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$char_usb(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)={0x30, 0x0, 0xffffff56, 0x0, 0x0, 0xffffffffffffffff, 0x1}, 0x3c) 21:28:07 executing program 2: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0xfffffffffffffea8) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x8, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x967b4bb21dc420bc}, 0xc, 0x0}, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) execve(0x0, 0x0, 0x0) pipe(0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) lsetxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 21:28:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040), 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001080)=[{&(0x7f0000000300)="6032145f4a1f58cf7f72201d805504abfa91ae39a1122c44636238b4719a79900b175094a2dfdc460712f58d89", 0x2d}, {&(0x7f0000001000)}, {&(0x7f0000001040)}], 0x3) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x4, @mcast2, 0x6}}, 0x6, 0xfffffffc, 0x0, 0x5}, &(0x7f0000000540)=0x98) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$char_usb(r0, 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) connect$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x2, 0x0, 0x0, 0x4}}, 0x32) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$char_usb(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)={0x30, 0x0, 0xffffff56, 0x0, 0x0, 0xffffffffffffffff, 0x1}, 0x3c) 21:28:08 executing program 1: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0xfffffffffffffea8) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x8, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x967b4bb21dc420bc}, 0xc, 0x0}, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) execve(0x0, 0x0, 0x0) pipe(0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) lsetxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 21:28:08 executing program 4: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0xfffffffffffffea8) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x8, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x967b4bb21dc420bc}, 0xc, 0x0}, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) execve(0x0, 0x0, 0x0) pipe(0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) lsetxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 21:28:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040), 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001080)=[{&(0x7f0000000300)="6032145f4a1f58cf7f72201d805504abfa91ae39a1122c44636238b4719a79900b175094a2dfdc460712f58d89", 0x2d}, {&(0x7f0000001000)}, {&(0x7f0000001040)}], 0x3) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x4, @mcast2, 0x6}}, 0x6, 0xfffffffc, 0x0, 0x5}, &(0x7f0000000540)=0x98) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$char_usb(r0, 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) connect$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x2, 0x0, 0x0, 0x4}}, 0x32) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$char_usb(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)={0x30, 0x0, 0xffffff56, 0x0, 0x0, 0xffffffffffffffff, 0x1}, 0x3c) 21:28:08 executing program 5: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000480)) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) 21:28:08 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000480)) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) 21:28:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040), 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001080)=[{&(0x7f0000000300)="6032145f4a1f58cf7f72201d805504abfa91ae39a1122c44636238b4719a79900b175094a2dfdc460712f58d89", 0x2d}, {&(0x7f0000001000)}, {&(0x7f0000001040)}], 0x3) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x4, @mcast2, 0x6}}, 0x6, 0xfffffffc, 0x0, 0x5}, &(0x7f0000000540)=0x98) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$char_usb(r0, 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) connect$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x2, 0x0, 0x0, 0x4}}, 0x32) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$char_usb(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)={0x30, 0x0, 0xffffff56, 0x0, 0x0, 0xffffffffffffffff, 0x1}, 0x3c) 21:28:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040), 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001080)=[{&(0x7f0000000300)="6032145f4a1f58cf7f72201d805504abfa91ae39a1122c44636238b4719a79900b175094a2dfdc460712f58d89", 0x2d}, {&(0x7f0000001000)}, {&(0x7f0000001040)}], 0x3) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x4, @mcast2, 0x6}}, 0x6, 0xfffffffc, 0x0, 0x5}, &(0x7f0000000540)=0x98) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$char_usb(r0, 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) connect$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x2, 0x0, 0x0, 0x4}}, 0x32) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$char_usb(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)={0x30, 0x0, 0xffffff56, 0x0, 0x0, 0xffffffffffffffff, 0x1}, 0x3c) 21:28:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040), 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001080)=[{&(0x7f0000000300)="6032145f4a1f58cf7f72201d805504abfa91ae39a1122c44636238b4719a79900b175094a2dfdc460712f58d89", 0x2d}, {&(0x7f0000001000)}, {&(0x7f0000001040)}], 0x3) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x4, @mcast2, 0x6}}, 0x6, 0xfffffffc, 0x0, 0x5}, &(0x7f0000000540)=0x98) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$char_usb(r0, 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) connect$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x2, 0x0, 0x0, 0x4}}, 0x32) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$char_usb(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)={0x30, 0x0, 0xffffff56, 0x0, 0x0, 0xffffffffffffffff, 0x1}, 0x3c) 21:28:08 executing program 2: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0xfffffffffffffea8) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x8, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x967b4bb21dc420bc}, 0xc, 0x0}, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) execve(0x0, 0x0, 0x0) pipe(0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) lsetxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 21:28:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040), 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001080)=[{&(0x7f0000000300)="6032145f4a1f58cf7f72201d805504abfa91ae39a1122c44636238b4719a79900b175094a2dfdc460712f58d89", 0x2d}, {&(0x7f0000001000)}, {&(0x7f0000001040)}], 0x3) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x4, @mcast2, 0x6}}, 0x6, 0xfffffffc, 0x0, 0x5}, &(0x7f0000000540)=0x98) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$char_usb(r0, 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) connect$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x2, 0x0, 0x0, 0x4}}, 0x32) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$char_usb(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)={0x30, 0x0, 0xffffff56, 0x0, 0x0, 0xffffffffffffffff, 0x1}, 0x3c) 21:28:09 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000480)) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) 21:28:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040), 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001080)=[{&(0x7f0000000300)="6032145f4a1f58cf7f72201d805504abfa91ae39a1122c44636238b4719a79900b175094a2dfdc460712f58d89", 0x2d}, {&(0x7f0000001000)}, {&(0x7f0000001040)}], 0x3) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x4, @mcast2, 0x6}}, 0x6, 0xfffffffc, 0x0, 0x5}, &(0x7f0000000540)=0x98) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$char_usb(r0, 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) connect$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x2, 0x0, 0x0, 0x4}}, 0x32) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$char_usb(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)={0x30, 0x0, 0xffffff56, 0x0, 0x0, 0xffffffffffffffff, 0x1}, 0x3c) 21:28:09 executing program 1: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0xfffffffffffffea8) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x8, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x967b4bb21dc420bc}, 0xc, 0x0}, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) execve(0x0, 0x0, 0x0) pipe(0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) lsetxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 21:28:09 executing program 4: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0xfffffffffffffea8) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x8, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x967b4bb21dc420bc}, 0xc, 0x0}, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) execve(0x0, 0x0, 0x0) pipe(0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) lsetxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 21:28:09 executing program 5: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000480)) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) 21:28:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040), 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001080)=[{&(0x7f0000000300)="6032145f4a1f58cf7f72201d805504abfa91ae39a1122c44636238b4719a79900b175094a2dfdc460712f58d89", 0x2d}, {&(0x7f0000001000)}, {&(0x7f0000001040)}], 0x3) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x4, @mcast2, 0x6}}, 0x6, 0xfffffffc, 0x0, 0x5}, &(0x7f0000000540)=0x98) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$char_usb(r0, 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) connect$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x2, 0x0, 0x0, 0x4}}, 0x32) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$char_usb(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)={0x30, 0x0, 0xffffff56, 0x0, 0x0, 0xffffffffffffffff, 0x1}, 0x3c) 21:28:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040), 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001080)=[{&(0x7f0000000300)="6032145f4a1f58cf7f72201d805504abfa91ae39a1122c44636238b4719a79900b175094a2dfdc460712f58d89", 0x2d}, {&(0x7f0000001000)}, {&(0x7f0000001040)}], 0x3) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x4, @mcast2, 0x6}}, 0x6, 0xfffffffc, 0x0, 0x5}, &(0x7f0000000540)=0x98) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$char_usb(r0, 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) connect$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x2, 0x0, 0x0, 0x4}}, 0x32) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$char_usb(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)={0x30, 0x0, 0xffffff56, 0x0, 0x0, 0xffffffffffffffff, 0x1}, 0x3c) 21:28:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040), 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001080)=[{&(0x7f0000000300)="6032145f4a1f58cf7f72201d805504abfa91ae39a1122c44636238b4719a79900b175094a2dfdc460712f58d89", 0x2d}, {&(0x7f0000001000)}, {&(0x7f0000001040)}], 0x3) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x4, @mcast2, 0x6}}, 0x6, 0xfffffffc, 0x0, 0x5}, &(0x7f0000000540)=0x98) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$char_usb(r0, 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) connect$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x2, 0x0, 0x0, 0x4}}, 0x32) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$char_usb(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)={0x30, 0x0, 0xffffff56, 0x0, 0x0, 0xffffffffffffffff, 0x1}, 0x3c) 21:28:10 executing program 2: r0 = getpgrp(0x0) ioprio_set$pid(0x1, r0, 0x0) 21:28:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)) ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) 21:28:10 executing program 2: r0 = getpgrp(0x0) ioprio_set$pid(0x1, r0, 0x0) 21:28:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040), 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001080)=[{&(0x7f0000000300)="6032145f4a1f58cf7f72201d805504abfa91ae39a1122c44636238b4719a79900b175094a2dfdc460712f58d89", 0x2d}, {&(0x7f0000001000)}, {&(0x7f0000001040)}], 0x3) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x4, @mcast2, 0x6}}, 0x6, 0xfffffffc, 0x0, 0x5}, &(0x7f0000000540)=0x98) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$char_usb(r0, 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) connect$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x2, 0x0, 0x0, 0x4}}, 0x32) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$char_usb(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)={0x30, 0x0, 0xffffff56, 0x0, 0x0, 0xffffffffffffffff, 0x1}, 0x3c) 21:28:10 executing program 5: futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x3, 0x2, &(0x7f0000000240), &(0x7f0000000100), 0x0) 21:28:10 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xce, 0x0, 0x0) 21:28:10 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xce, 0x0, 0x0) 21:28:10 executing program 2: r0 = getpgrp(0x0) ioprio_set$pid(0x1, r0, 0x0) 21:28:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x6, 0x0, 0x0) 21:28:10 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) statfs(0x0, &(0x7f0000000040)=""/30) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) pipe2$9p(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000740)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000040)={0x1d, r1}, 0x10) r2 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r2, r0, 0x0) setsockopt(0xffffffffffffffff, 0x65, 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fspick(0xffffffffffffff9c, 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x0) 21:28:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x8000, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 21:28:10 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xce, 0x0, 0x0) 21:28:10 executing program 2: r0 = getpgrp(0x0) ioprio_set$pid(0x1, r0, 0x0) [ 117.611267][ T9155] raw_sendmsg: syz-executor.0 forgot to set AF_INET. Fix it! 21:28:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x6, 0x0, 0x0) 21:28:10 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') r1 = socket$inet(0x2, 0x4000000000000001, 0x0) dup3(r1, r0, 0x0) 21:28:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x8000, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 21:28:11 executing program 5: futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x3, 0x2, &(0x7f0000000240), &(0x7f0000000100), 0x0) 21:28:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x6, 0x0, 0x0) 21:28:11 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xce, 0x0, 0x0) 21:28:11 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) statfs(0x0, &(0x7f0000000040)=""/30) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) pipe2$9p(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000740)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000040)={0x1d, r1}, 0x10) r2 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r2, r0, 0x0) setsockopt(0xffffffffffffffff, 0x65, 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fspick(0xffffffffffffff9c, 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x0) 21:28:11 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') r1 = socket$inet(0x2, 0x4000000000000001, 0x0) dup3(r1, r0, 0x0) 21:28:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x8000, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 21:28:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x6, 0x0, 0x0) 21:28:11 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) statfs(0x0, &(0x7f0000000040)=""/30) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) pipe2$9p(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000740)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000040)={0x1d, r1}, 0x10) r2 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r2, r0, 0x0) setsockopt(0xffffffffffffffff, 0x65, 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fspick(0xffffffffffffff9c, 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x0) 21:28:11 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') r1 = socket$inet(0x2, 0x4000000000000001, 0x0) dup3(r1, r0, 0x0) 21:28:11 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) statfs(0x0, &(0x7f0000000040)=""/30) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) pipe2$9p(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000740)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000040)={0x1d, r1}, 0x10) r2 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r2, r0, 0x0) setsockopt(0xffffffffffffffff, 0x65, 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fspick(0xffffffffffffff9c, 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x0) 21:28:11 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) statfs(0x0, &(0x7f0000000040)=""/30) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) pipe2$9p(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000740)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000040)={0x1d, r1}, 0x10) r2 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r2, r0, 0x0) setsockopt(0xffffffffffffffff, 0x65, 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fspick(0xffffffffffffff9c, 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x0) 21:28:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x8000, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 21:28:12 executing program 5: futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x3, 0x2, &(0x7f0000000240), &(0x7f0000000100), 0x0) 21:28:12 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') r1 = socket$inet(0x2, 0x4000000000000001, 0x0) dup3(r1, r0, 0x0) 21:28:12 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) statfs(0x0, &(0x7f0000000040)=""/30) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) pipe2$9p(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000740)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000040)={0x1d, r1}, 0x10) r2 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r2, r0, 0x0) setsockopt(0xffffffffffffffff, 0x65, 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fspick(0xffffffffffffff9c, 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x0) 21:28:12 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) statfs(0x0, &(0x7f0000000040)=""/30) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) pipe2$9p(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000740)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000040)={0x1d, r1}, 0x10) r2 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r2, r0, 0x0) setsockopt(0xffffffffffffffff, 0x65, 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fspick(0xffffffffffffff9c, 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x0) 21:28:12 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) statfs(0x0, &(0x7f0000000040)=""/30) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) pipe2$9p(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000740)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000040)={0x1d, r1}, 0x10) r2 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r2, r0, 0x0) setsockopt(0xffffffffffffffff, 0x65, 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fspick(0xffffffffffffff9c, 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x0) 21:28:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x8000, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 21:28:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x8000, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 21:28:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x8000, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 21:28:12 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) statfs(0x0, &(0x7f0000000040)=""/30) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) pipe2$9p(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000740)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000040)={0x1d, r1}, 0x10) r2 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r2, r0, 0x0) setsockopt(0xffffffffffffffff, 0x65, 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fspick(0xffffffffffffff9c, 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x0) 21:28:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x8000, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 21:28:12 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) statfs(0x0, &(0x7f0000000040)=""/30) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) pipe2$9p(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000740)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000040)={0x1d, r1}, 0x10) r2 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r2, r0, 0x0) setsockopt(0xffffffffffffffff, 0x65, 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fspick(0xffffffffffffff9c, 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x0) 21:28:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x8000, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 21:28:12 executing program 5: futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x3, 0x2, &(0x7f0000000240), &(0x7f0000000100), 0x0) 21:28:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x8000, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 21:28:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x8000, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 21:28:12 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000c80)=ANY=[@ANYBLOB="7008000029000705dffe0f00000000ebff000000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff0000000008000100746266004408020008000e00000000006b0001000014dfcfce4dc8e9609705e0378b4000515d734b8070c3f44ebf90cfe6f843a8dcc0f35e0000000000000000040402000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000903316558fabb04e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001e9336fe0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000100000000000000000000000000100001000000000000000000000000000404020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000049000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000017000000000000000000000000002a751419000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fa8de3653590e3b29577afa916c7b38c2cdd3a94e4cb62465545929c8f19d2a0e8857224e48ff3f4d70bcc425e7a116226e43a0fc74ca409871aa83317f4a74a1c4274439daa02ef763c6d712856b94d7c13d6b1e46153d107d7f3e467faeb814d2995befd32f84858440c421db8ec4e6efbca9c12b2eaffa00252e91334954bc868a691c2fc2ff1365039537a36157841dd25f56833978bb617a8a9d950f757af0d56b012593dff7e0cbb7ccdfd300596657a0b37bbbaaf30ccda2bfa7f9587ded48847eb8024e1d7c1d33220763e02d267e2143d6d2654b8508b8d7cd81af3e2a019b4ac75d201255ea02d313ae1938774e2f7262cabb91f80dcb995d8f13c88a31e3264d50da6d10956721f4313f19f40dbb722ac2e6e12746c177cf96c747b0396c776be5aa04e879dd05db68e51e9b1360ad6f9c9f0568436418fd0c6a96fa388fd93792fe205e63c2b2aaead9f1f5f50c524a9ae21452c00"], 0x870}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) 21:28:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x8000, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 21:28:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4004ae8b, 0x0) r3 = dup3(r0, r1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) dup2(r3, r2) 21:28:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="25bca274769e620aa734fa0095e0612687463915e38802a9d8aea872943afd874e2f98b479a7316270146d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 21:28:13 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000c80)=ANY=[@ANYBLOB="7008000029000705dffe0f00000000ebff000000", @ANYRES32=r1, @ANYBLOB="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"], 0x870}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) 21:28:13 executing program 0: r0 = memfd_create(&(0x7f0000000040)='7', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) 21:28:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x8000, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) [ 120.267933][ T9287] EXT4-fs (loop2): quotafile must be on filesystem root 21:28:13 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000c80)=ANY=[@ANYBLOB="7008000029000705dffe0f00000000ebff000000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff0000000008000100746266004408020008000e00000000006b0001000014dfcfce4dc8e9609705e0378b4000515d734b8070c3f44ebf90cfe6f843a8dcc0f35e0000000000000000040402000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000903316558fabb04e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001e9336fe0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000100000000000000000000000000100001000000000000000000000000000404020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000049000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000017000000000000000000000000002a751419000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fa8de3653590e3b29577afa916c7b38c2cdd3a94e4cb62465545929c8f19d2a0e8857224e48ff3f4d70bcc425e7a116226e43a0fc74ca409871aa83317f4a74a1c4274439daa02ef763c6d712856b94d7c13d6b1e46153d107d7f3e467faeb814d2995befd32f84858440c421db8ec4e6efbca9c12b2eaffa00252e91334954bc868a691c2fc2ff1365039537a36157841dd25f56833978bb617a8a9d950f757af0d56b012593dff7e0cbb7ccdfd300596657a0b37bbbaaf30ccda2bfa7f9587ded48847eb8024e1d7c1d33220763e02d267e2143d6d2654b8508b8d7cd81af3e2a019b4ac75d201255ea02d313ae1938774e2f7262cabb91f80dcb995d8f13c88a31e3264d50da6d10956721f4313f19f40dbb722ac2e6e12746c177cf96c747b0396c776be5aa04e879dd05db68e51e9b1360ad6f9c9f0568436418fd0c6a96fa388fd93792fe205e63c2b2aaead9f1f5f50c524a9ae21452c00"], 0x870}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) 21:28:13 executing program 1: r0 = socket$inet6(0xa, 0x4000000080002, 0x88) connect$inet6(r0, &(0x7f0000005d00)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) getsockopt$inet6_mreq(r0, 0x29, 0x1, 0x0, &(0x7f0000000300)) 21:28:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4004ae8b, 0x0) r3 = dup3(r0, r1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) dup2(r3, r2) 21:28:13 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000c80)=ANY=[@ANYBLOB="7008000029000705dffe0f00000000ebff000000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff0000000008000100746266004408020008000e00000000006b0001000014dfcfce4dc8e9609705e0378b4000515d734b8070c3f44ebf90cfe6f843a8dcc0f35e0000000000000000040402000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000903316558fabb04e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001e9336fe0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000100000000000000000000000000100001000000000000000000000000000404020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000049000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000017000000000000000000000000002a751419000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fa8de3653590e3b29577afa916c7b38c2cdd3a94e4cb62465545929c8f19d2a0e8857224e48ff3f4d70bcc425e7a116226e43a0fc74ca409871aa83317f4a74a1c4274439daa02ef763c6d712856b94d7c13d6b1e46153d107d7f3e467faeb814d2995befd32f84858440c421db8ec4e6efbca9c12b2eaffa00252e91334954bc868a691c2fc2ff1365039537a36157841dd25f56833978bb617a8a9d950f757af0d56b012593dff7e0cbb7ccdfd300596657a0b37bbbaaf30ccda2bfa7f9587ded48847eb8024e1d7c1d33220763e02d267e2143d6d2654b8508b8d7cd81af3e2a019b4ac75d201255ea02d313ae1938774e2f7262cabb91f80dcb995d8f13c88a31e3264d50da6d10956721f4313f19f40dbb722ac2e6e12746c177cf96c747b0396c776be5aa04e879dd05db68e51e9b1360ad6f9c9f0568436418fd0c6a96fa388fd93792fe205e63c2b2aaead9f1f5f50c524a9ae21452c00"], 0x870}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) 21:28:13 executing program 1: r0 = socket$inet6(0xa, 0x4000000080002, 0x88) connect$inet6(r0, &(0x7f0000005d00)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) getsockopt$inet6_mreq(r0, 0x29, 0x1, 0x0, &(0x7f0000000300)) 21:28:13 executing program 0: r0 = memfd_create(&(0x7f0000000040)='7', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) 21:28:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="25bca274769e620aa734fa0095e0612687463915e38802a9d8aea872943afd874e2f98b479a7316270146d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 21:28:13 executing program 5: r0 = socket(0x22, 0x2, 0x4) bind$isdn_base(r0, &(0x7f0000000040)={0x2}, 0x6) 21:28:13 executing program 1: r0 = socket$inet6(0xa, 0x4000000080002, 0x88) connect$inet6(r0, &(0x7f0000005d00)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) getsockopt$inet6_mreq(r0, 0x29, 0x1, 0x0, &(0x7f0000000300)) [ 120.964036][ T9317] EXT4-fs (loop2): quotafile must be on filesystem root 21:28:13 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') read$eventfd(r0, &(0x7f0000000080), 0xff97) socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='debugfs\x00', 0x0, &(0x7f00000000c0)) 21:28:13 executing program 0: r0 = memfd_create(&(0x7f0000000040)='7', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) 21:28:14 executing program 5: r0 = socket(0x22, 0x2, 0x4) bind$isdn_base(r0, &(0x7f0000000040)={0x2}, 0x6) 21:28:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="25bca274769e620aa734fa0095e0612687463915e38802a9d8aea872943afd874e2f98b479a7316270146d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 21:28:14 executing program 0: r0 = memfd_create(&(0x7f0000000040)='7', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) 21:28:14 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4004ae8b, 0x0) r3 = dup3(r0, r1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) dup2(r3, r2) 21:28:14 executing program 1: r0 = socket$inet6(0xa, 0x4000000080002, 0x88) connect$inet6(r0, &(0x7f0000005d00)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) getsockopt$inet6_mreq(r0, 0x29, 0x1, 0x0, &(0x7f0000000300)) 21:28:14 executing program 5: r0 = socket(0x22, 0x2, 0x4) bind$isdn_base(r0, &(0x7f0000000040)={0x2}, 0x6) 21:28:14 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x801, 0x0) write$uinput_user_dev(r0, &(0x7f00000006c0)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) [ 121.415669][ T9348] EXT4-fs (loop2): quotafile must be on filesystem root [ 121.443371][ T9360] input: syz0 as /devices/virtual/input/input5 21:28:14 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x801, 0x0) write$uinput_user_dev(r0, &(0x7f00000006c0)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) [ 121.468127][ T9361] input: syz0 as /devices/virtual/input/input6 21:28:14 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') read$eventfd(r0, &(0x7f0000000080), 0xff97) socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='debugfs\x00', 0x0, &(0x7f00000000c0)) 21:28:14 executing program 1: socket(0x10, 0x80002, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="7400000024000705000000000000543708000000", @ANYRES32, @ANYBLOB="00000000ffffffff0000000008000100736671004800020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f3"], 0x74}}, 0x0) 21:28:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="25bca274769e620aa734fa0095e0612687463915e38802a9d8aea872943afd874e2f98b479a7316270146d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 21:28:14 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4004ae8b, 0x0) r3 = dup3(r0, r1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) dup2(r3, r2) [ 121.651355][ T9370] input: syz0 as /devices/virtual/input/input7 21:28:14 executing program 5: r0 = socket(0x22, 0x2, 0x4) bind$isdn_base(r0, &(0x7f0000000040)={0x2}, 0x6) 21:28:14 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x801, 0x0) write$uinput_user_dev(r0, &(0x7f00000006c0)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) [ 121.806504][ T9386] EXT4-fs (loop2): quotafile must be on filesystem root 21:28:14 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') read$eventfd(r0, &(0x7f0000000080), 0xff97) socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='debugfs\x00', 0x0, &(0x7f00000000c0)) [ 121.943143][ T9399] input: syz0 as /devices/virtual/input/input8 21:28:15 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x801, 0x0) write$uinput_user_dev(r0, &(0x7f00000006c0)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) 21:28:15 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5380, 0x0) 21:28:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000003f40)={0x0, 0x0, &(0x7f0000003f00)={&(0x7f00000037c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 21:28:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) fallocate(r2, 0x40, 0x0, 0x9) 21:28:15 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5380, 0x0) 21:28:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000003f40)={0x0, 0x0, &(0x7f0000003f00)={&(0x7f00000037c0)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 122.224391][ T9416] input: syz0 as /devices/virtual/input/input9 21:28:15 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') read$eventfd(r0, &(0x7f0000000080), 0xff97) socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='debugfs\x00', 0x0, &(0x7f00000000c0)) 21:28:15 executing program 1: socket(0x10, 0x80002, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="7400000024000705000000000000543708000000", @ANYRES32, @ANYBLOB="00000000ffffffff0000000008000100736671004800020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f3"], 0x74}}, 0x0) 21:28:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) fallocate(r2, 0x40, 0x0, 0x9) 21:28:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, 0x0) mount$9p_rdma(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001b40)=ANY=[]) getresgid(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) recvmsg(r0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x14, 0x2, [@IFLA_BOND_AD_ACTOR_SYS_PRIO={0x8, 0x18, 0x3f}, @IFLA_BOND_MODE={0x8, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x0, 0x300) 21:28:15 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5380, 0x0) 21:28:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000003f40)={0x0, 0x0, &(0x7f0000003f00)={&(0x7f00000037c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 21:28:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) fallocate(r2, 0x40, 0x0, 0x9) 21:28:15 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5380, 0x0) 21:28:15 executing program 3: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x6) read(r0, &(0x7f0000000080)=""/48, 0x1a) write$evdev(r0, &(0x7f0000000000)=[{{0x0, 0x7530}, 0x0, 0x1}], 0x354) 21:28:15 executing program 2: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='uid_map\x00') r1 = gettid() tkill(r1, 0x3c) write$P9_RSTATFS(r0, 0x0, 0xff0f) [ 122.732655][ T9446] netlink: 'syz-executor.0': attribute type 24 has an invalid length. [ 122.757806][ T9446] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 122.789960][ T9446] INFO: trying to register non-static key. [ 122.795874][ T9446] the code is fine but needs lockdep annotation. [ 122.802214][ T9446] turning off the locking correctness validator. [ 122.803326][ T3919] kobject: 'loop5' (00000000742f9a87): kobject_uevent_env [ 122.808555][ T9446] CPU: 1 PID: 9446 Comm: syz-executor.0 Not tainted 5.4.0-rc5-next-20191030 #0 [ 122.808563][ T9446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 122.808582][ T9446] Call Trace: 21:28:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000003f40)={0x0, 0x0, &(0x7f0000003f00)={&(0x7f00000037c0)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 122.808601][ T9446] dump_stack+0x172/0x1f0 [ 122.808640][ T9446] register_lock_class+0x179e/0x1850 [ 122.818792][ T3919] kobject: 'loop5' (00000000742f9a87): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 122.824661][ T9446] ? __lock_acquire+0x16f2/0x4a00 [ 122.862671][ T9446] ? lock_downgrade+0x920/0x920 [ 122.867526][ T9446] ? is_dynamic_key+0x1c0/0x1c0 [ 122.875857][ T9446] __lock_acquire+0xf4/0x4a00 [ 122.880533][ T9446] ? lockdep_hardirqs_on+0x19e/0x5e0 [ 122.885839][ T9446] ? retint_kernel+0x2b/0x2b 21:28:15 executing program 2: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='uid_map\x00') r1 = gettid() tkill(r1, 0x3c) write$P9_RSTATFS(r0, 0x0, 0xff0f) 21:28:15 executing program 5: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='uid_map\x00') r1 = gettid() tkill(r1, 0x3c) write$P9_RSTATFS(r0, 0x0, 0xff0f) [ 122.890428][ T9446] ? trace_hardirqs_on_caller+0x6a/0x240 [ 122.896060][ T9446] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 122.901526][ T9446] ? mark_held_locks+0xf0/0xf0 [ 122.906292][ T9446] ? __this_cpu_preempt_check+0x35/0x190 [ 122.907629][ T3919] kobject: 'loop2' (000000006bef9592): kobject_uevent_env [ 122.911920][ T9446] ? retint_kernel+0x2b/0x2b [ 122.923577][ T9446] lock_acquire+0x190/0x410 [ 122.928080][ T9446] ? bond_3ad_update_ad_actor_settings+0x37b/0x7b0 [ 122.934586][ T9446] _raw_spin_lock_bh+0x33/0x50 [ 122.939362][ T9446] ? bond_3ad_update_ad_actor_settings+0x37b/0x7b0 [ 122.940357][ T3919] kobject: 'loop2' (000000006bef9592): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 122.945856][ T9446] bond_3ad_update_ad_actor_settings+0x37b/0x7b0 [ 122.945874][ T9446] ? bond_3ad_bind_slave+0x12e0/0x12e0 [ 122.967744][ T9446] ? bond_option_ad_actor_sys_prio_set+0x12/0x80 [ 122.974085][ T9446] bond_option_ad_actor_sys_prio_set+0x67/0x80 [ 122.980238][ T9446] __bond_opt_set+0x2a1/0x540 [ 122.984912][ T9446] bond_changelink+0x14ed/0x1bd0 [ 122.989849][ T9446] ? memset+0x32/0x40 [ 122.993884][ T9446] ? bond_slave_changelink+0x1e0/0x1e0 [ 122.999338][ T9446] bond_newlink+0x2d/0x90 [ 122.999791][ T3919] kobject: 'loop5' (00000000742f9a87): kobject_uevent_env [ 123.003653][ T9446] ? bond_changelink+0x1bd0/0x1bd0 [ 123.003670][ T9446] __rtnl_newlink+0x10a1/0x16e0 [ 123.020705][ T9446] ? rtnl_link_unregister+0x250/0x250 [ 123.024179][ T3919] kobject: 'loop5' (00000000742f9a87): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 123.026070][ T9446] ? is_bpf_text_address+0xce/0x160 [ 123.026084][ T9446] ? kernel_text_address+0x73/0xf0 [ 123.026096][ T9446] ? unwind_get_return_address+0x61/0xa0 [ 123.026113][ T9446] ? profile_setup.cold+0xbb/0xbb [ 123.048579][ T3919] kobject: 'loop5' (00000000742f9a87): kobject_uevent_env [ 123.052144][ T9446] ? arch_stack_walk+0x97/0xf0 [ 123.052164][ T9446] ? stack_trace_save+0xac/0xe0 [ 123.066935][ T3919] kobject: 'loop5' (00000000742f9a87): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 123.069030][ T9446] ? stack_trace_consume_entry+0x190/0x190 [ 123.069047][ T9446] ? __kasan_check_read+0x11/0x20 [ 123.094779][ T9446] ? save_stack+0x5c/0x90 [ 123.099116][ T9446] ? save_stack+0x23/0x90 [ 123.103442][ T9446] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 123.109244][ T9446] ? kasan_kmalloc+0x9/0x10 [ 123.113745][ T9446] ? kmem_cache_alloc_trace+0x158/0x790 [ 123.119304][ T9446] ? rtnl_newlink+0x4b/0xa0 [ 123.123812][ T9446] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 123.129355][ T9446] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 123.135340][ T9446] rtnl_newlink+0x69/0xa0 [ 123.139671][ T9446] ? __rtnl_newlink+0x16e0/0x16e0 [ 123.144685][ T9446] rtnetlink_rcv_msg+0x45e/0xaf0 [ 123.149599][ T9446] ? rtnl_bridge_getlink+0x910/0x910 [ 123.154861][ T9446] ? retint_kernel+0x2b/0x2b [ 123.159439][ T9446] ? rtnl_bridge_getlink+0x910/0x910 [ 123.164703][ T9446] netlink_rcv_skb+0x177/0x450 [ 123.169442][ T9446] ? rtnl_bridge_getlink+0x910/0x910 [ 123.174740][ T9446] ? netlink_ack+0xb50/0xb50 [ 123.179307][ T9446] ? __rcu_read_unlock+0x220/0x6b0 [ 123.184391][ T9446] ? __kasan_check_read+0x11/0x20 [ 123.189404][ T9446] ? netlink_deliver_tap+0x24a/0xbe0 [ 123.194665][ T9446] rtnetlink_rcv+0x1d/0x30 [ 123.199080][ T9446] netlink_unicast+0x531/0x710 [ 123.203820][ T9446] ? netlink_attachskb+0x7c0/0x7c0 [ 123.208912][ T9446] ? _copy_from_iter_full+0x25d/0x8c0 [ 123.214258][ T9446] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 123.219969][ T9446] ? __check_object_size+0x3d/0x437 [ 123.225144][ T9446] netlink_sendmsg+0x8cf/0xda0 [ 123.229884][ T9446] ? netlink_unicast+0x710/0x710 [ 123.234803][ T9446] ? netlink_unicast+0x710/0x710 [ 123.239716][ T9446] sock_sendmsg+0xd7/0x130 [ 123.244106][ T9446] ___sys_sendmsg+0x803/0x920 [ 123.248756][ T9446] ? copy_msghdr_from_user+0x440/0x440 [ 123.254188][ T9446] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 123.259619][ T9446] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 123.265052][ T9446] ? lockdep_hardirqs_on+0x421/0x5e0 [ 123.270311][ T9446] ? retint_kernel+0x2b/0x2b [ 123.274874][ T9446] ? trace_hardirqs_on_caller+0x6a/0x240 [ 123.280482][ T9446] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 123.285915][ T9446] ? __this_cpu_preempt_check+0x35/0x190 [ 123.291523][ T9446] ? retint_kernel+0x2b/0x2b [ 123.296115][ T9446] ? __fget_light+0x1a9/0x230 [ 123.300792][ T9446] ? __fdget+0x1d/0x20 [ 123.304842][ T9446] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 123.311073][ T9446] __sys_sendmsg+0x105/0x1d0 [ 123.315639][ T9446] ? __sys_sendmsg_sock+0xd0/0xd0 [ 123.320651][ T9446] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 123.326128][ T9446] __x64_sys_sendmsg+0x78/0xb0 [ 123.330869][ T9446] ? do_syscall_64+0x5b/0x760 [ 123.335555][ T9446] do_syscall_64+0xfa/0x760 [ 123.340175][ T9446] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 123.346076][ T9446] RIP: 0033:0x459f49 [ 123.349947][ T9446] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 123.369528][ T9446] RSP: 002b:00007fa306470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 123.377936][ T9446] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f49 [ 123.385893][ T9446] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000007 [ 123.393842][ T9446] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 123.401790][ T9446] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa3064716d4 [ 123.409737][ T9446] R13: 00000000004c8338 R14: 00000000004de608 R15: 00000000ffffffff [ 123.433858][ T9446] kobject: 'bond1' (00000000266f2c5c): kobject_add_internal: parent: 'net', set: 'devices' [ 123.444606][ T9446] kobject: 'bond1' (00000000266f2c5c): kobject_uevent_env [ 123.451784][ T9446] kobject: 'bond1' (00000000266f2c5c): fill_kobj_path: path = '/devices/virtual/net/bond1' [ 123.461890][ T9446] kobject: 'queues' (0000000065f80cf0): kobject_add_internal: parent: 'bond1', set: '' [ 123.472167][ T9446] kobject: 'queues' (0000000065f80cf0): kobject_uevent_env [ 123.479612][ T9446] kobject: 'queues' (0000000065f80cf0): kobject_uevent_env: filter function caused the event to drop! [ 123.490955][ T9446] kobject: 'rx-0' (00000000482713b8): kobject_add_internal: parent: 'queues', set: 'queues' [ 123.501246][ T9446] kobject: 'rx-0' (00000000482713b8): kobject_uevent_env [ 123.508437][ T9446] kobject: 'rx-0' (00000000482713b8): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-0' [ 123.519543][ T9446] kobject: 'rx-1' (000000007c4b83ba): kobject_add_internal: parent: 'queues', set: 'queues' [ 123.530520][ T9446] kobject: 'rx-1' (000000007c4b83ba): kobject_uevent_env [ 123.537649][ T9446] kobject: 'rx-1' (000000007c4b83ba): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-1' [ 123.548686][ T9446] kobject: 'rx-2' (000000006623dbe2): kobject_add_internal: parent: 'queues', set: 'queues' [ 123.558806][ T9446] kobject: 'rx-2' (000000006623dbe2): kobject_uevent_env [ 123.565837][ T9446] kobject: 'rx-2' (000000006623dbe2): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-2' [ 123.577138][ T9446] kobject: 'rx-3' (00000000f01528b5): kobject_add_internal: parent: 'queues', set: 'queues' [ 123.587276][ T9446] kobject: 'rx-3' (00000000f01528b5): kobject_uevent_env [ 123.594328][ T9446] kobject: 'rx-3' (00000000f01528b5): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-3' [ 123.605438][ T9446] kobject: 'rx-4' (00000000d155d25a): kobject_add_internal: parent: 'queues', set: 'queues' [ 123.615620][ T9446] kobject: 'rx-4' (00000000d155d25a): kobject_uevent_env [ 123.622744][ T9446] kobject: 'rx-4' (00000000d155d25a): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-4' [ 123.633849][ T9446] kobject: 'rx-5' (00000000a33ef9de): kobject_add_internal: parent: 'queues', set: 'queues' [ 123.644033][ T9446] kobject: 'rx-5' (00000000a33ef9de): kobject_uevent_env [ 123.651103][ T9446] kobject: 'rx-5' (00000000a33ef9de): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-5' [ 123.662082][ T9446] kobject: 'rx-6' (00000000df6f0bc8): kobject_add_internal: parent: 'queues', set: 'queues' [ 123.672513][ T9446] kobject: 'rx-6' (00000000df6f0bc8): kobject_uevent_env [ 123.679584][ T9446] kobject: 'rx-6' (00000000df6f0bc8): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-6' [ 123.690692][ T9446] kobject: 'rx-7' (000000003c9b6d43): kobject_add_internal: parent: 'queues', set: 'queues' [ 123.700804][ T9446] kobject: 'rx-7' (000000003c9b6d43): kobject_uevent_env [ 123.707872][ T9446] kobject: 'rx-7' (000000003c9b6d43): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-7' [ 123.718895][ T9446] kobject: 'rx-8' (000000006628f0a5): kobject_add_internal: parent: 'queues', set: 'queues' [ 123.728987][ T9446] kobject: 'rx-8' (000000006628f0a5): kobject_uevent_env [ 123.736049][ T9446] kobject: 'rx-8' (000000006628f0a5): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-8' [ 123.747142][ T9446] kobject: 'rx-9' (00000000e790efd0): kobject_add_internal: parent: 'queues', set: 'queues' [ 123.757375][ T9446] kobject: 'rx-9' (00000000e790efd0): kobject_uevent_env [ 123.764417][ T9446] kobject: 'rx-9' (00000000e790efd0): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-9' [ 123.775695][ T9446] kobject: 'rx-10' (000000005aab8728): kobject_add_internal: parent: 'queues', set: 'queues' [ 123.785925][ T9446] kobject: 'rx-10' (000000005aab8728): kobject_uevent_env [ 123.793084][ T9446] kobject: 'rx-10' (000000005aab8728): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-10' [ 123.804340][ T9446] kobject: 'rx-11' (000000006a08cc3a): kobject_add_internal: parent: 'queues', set: 'queues' [ 123.814531][ T9446] kobject: 'rx-11' (000000006a08cc3a): kobject_uevent_env [ 123.821688][ T9446] kobject: 'rx-11' (000000006a08cc3a): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-11' [ 123.832866][ T9446] kobject: 'rx-12' (0000000050d5e9a6): kobject_add_internal: parent: 'queues', set: 'queues' [ 123.843080][ T9446] kobject: 'rx-12' (0000000050d5e9a6): kobject_uevent_env [ 123.850236][ T9446] kobject: 'rx-12' (0000000050d5e9a6): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-12' [ 123.861632][ T9446] kobject: 'rx-13' (00000000bf086207): kobject_add_internal: parent: 'queues', set: 'queues' [ 123.871878][ T9446] kobject: 'rx-13' (00000000bf086207): kobject_uevent_env [ 123.879666][ T9446] kobject: 'rx-13' (00000000bf086207): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-13' [ 123.890914][ T9446] kobject: 'rx-14' (0000000003e9c177): kobject_add_internal: parent: 'queues', set: 'queues' [ 123.896316][ T3919] kobject: 'loop3' (000000005e866e2d): kobject_uevent_env [ 123.901135][ T9446] kobject: 'rx-14' (0000000003e9c177): kobject_uevent_env [ 123.911911][ T3919] kobject: 'loop3' (000000005e866e2d): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 123.915300][ T9446] kobject: 'rx-14' (0000000003e9c177): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-14' [ 123.936672][ T9446] kobject: 'rx-15' (0000000021fc1403): kobject_add_internal: parent: 'queues', set: 'queues' [ 123.946892][ T9446] kobject: 'rx-15' (0000000021fc1403): kobject_uevent_env [ 123.954018][ T9446] kobject: 'rx-15' (0000000021fc1403): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-15' [ 123.965209][ T9446] kobject: 'tx-0' (000000003962aec3): kobject_add_internal: parent: 'queues', set: 'queues' [ 123.975396][ T9446] kobject: 'tx-0' (000000003962aec3): kobject_uevent_env [ 123.982481][ T9446] kobject: 'tx-0' (000000003962aec3): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-0' [ 123.993490][ T9446] kobject: 'tx-1' (000000006202f2c1): kobject_add_internal: parent: 'queues', set: 'queues' [ 124.003915][ T9446] kobject: 'tx-1' (000000006202f2c1): kobject_uevent_env [ 124.011032][ T9446] kobject: 'tx-1' (000000006202f2c1): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-1' [ 124.023505][ T9446] kobject: 'tx-2' (000000004c548285): kobject_add_internal: parent: 'queues', set: 'queues' [ 124.033712][ T9446] kobject: 'tx-2' (000000004c548285): kobject_uevent_env [ 124.040761][ T9446] kobject: 'tx-2' (000000004c548285): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-2' [ 124.051773][ T9446] kobject: 'tx-3' (0000000008d2655d): kobject_add_internal: parent: 'queues', set: 'queues' [ 124.062032][ T9446] kobject: 'tx-3' (0000000008d2655d): kobject_uevent_env [ 124.069097][ T9446] kobject: 'tx-3' (0000000008d2655d): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-3' [ 124.080184][ T9446] kobject: 'tx-4' (0000000049613e83): kobject_add_internal: parent: 'queues', set: 'queues' [ 124.090402][ T9446] kobject: 'tx-4' (0000000049613e83): kobject_uevent_env [ 124.097444][ T9446] kobject: 'tx-4' (0000000049613e83): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-4' [ 124.108459][ T9446] kobject: 'tx-5' (00000000c2898d4e): kobject_add_internal: parent: 'queues', set: 'queues' [ 124.118607][ T9446] kobject: 'tx-5' (00000000c2898d4e): kobject_uevent_env [ 124.125637][ T9446] kobject: 'tx-5' (00000000c2898d4e): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-5' [ 124.136944][ T9446] kobject: 'tx-6' (000000001e493a92): kobject_add_internal: parent: 'queues', set: 'queues' [ 124.147176][ T9446] kobject: 'tx-6' (000000001e493a92): kobject_uevent_env [ 124.154297][ T9446] kobject: 'tx-6' (000000001e493a92): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-6' [ 124.165556][ T9446] kobject: 'tx-7' (0000000020161289): kobject_add_internal: parent: 'queues', set: 'queues' [ 124.175835][ T9446] kobject: 'tx-7' (0000000020161289): kobject_uevent_env [ 124.183010][ T9446] kobject: 'tx-7' (0000000020161289): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-7' [ 124.194044][ T9446] kobject: 'tx-8' (00000000054917be): kobject_add_internal: parent: 'queues', set: 'queues' [ 124.204274][ T9446] kobject: 'tx-8' (00000000054917be): kobject_uevent_env [ 124.211322][ T9446] kobject: 'tx-8' (00000000054917be): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-8' [ 124.222352][ T9446] kobject: 'tx-9' (00000000890c3a52): kobject_add_internal: parent: 'queues', set: 'queues' [ 124.232495][ T9446] kobject: 'tx-9' (00000000890c3a52): kobject_uevent_env [ 124.239555][ T9446] kobject: 'tx-9' (00000000890c3a52): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-9' [ 124.250548][ T9446] kobject: 'tx-10' (0000000060a25094): kobject_add_internal: parent: 'queues', set: 'queues' [ 124.260867][ T9446] kobject: 'tx-10' (0000000060a25094): kobject_uevent_env [ 124.268184][ T9446] kobject: 'tx-10' (0000000060a25094): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-10' [ 124.279370][ T9446] kobject: 'tx-11' (00000000265be0df): kobject_add_internal: parent: 'queues', set: 'queues' [ 124.289626][ T9446] kobject: 'tx-11' (00000000265be0df): kobject_uevent_env [ 124.296836][ T9446] kobject: 'tx-11' (00000000265be0df): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-11' [ 124.308045][ T9446] kobject: 'tx-12' (0000000089f58bf5): kobject_add_internal: parent: 'queues', set: 'queues' [ 124.318308][ T9446] kobject: 'tx-12' (0000000089f58bf5): kobject_uevent_env [ 124.325437][ T9446] kobject: 'tx-12' (0000000089f58bf5): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-12' [ 124.336641][ T9446] kobject: 'tx-13' (00000000e2b03e36): kobject_add_internal: parent: 'queues', set: 'queues' [ 124.346954][ T9446] kobject: 'tx-13' (00000000e2b03e36): kobject_uevent_env [ 124.354077][ T9446] kobject: 'tx-13' (00000000e2b03e36): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-13' [ 124.365295][ T9446] kobject: 'tx-14' (000000001c3e0694): kobject_add_internal: parent: 'queues', set: 'queues' [ 124.375563][ T9446] kobject: 'tx-14' (000000001c3e0694): kobject_uevent_env [ 124.382712][ T9446] kobject: 'tx-14' (000000001c3e0694): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-14' [ 124.393867][ T9446] kobject: 'tx-15' (00000000f54aad42): kobject_add_internal: parent: 'queues', set: 'queues' [ 124.404481][ T9446] kobject: 'tx-15' (00000000f54aad42): kobject_uevent_env [ 124.411761][ T9446] kobject: 'tx-15' (00000000f54aad42): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-15' [ 124.423747][ T9446] kobject: 'batman_adv' (00000000a2dc8216): kobject_add_internal: parent: 'bond1', set: '' [ 124.442238][ T9449] netlink: 'syz-executor.0': attribute type 24 has an invalid length. [ 124.451920][ T3919] kobject: 'loop4' (000000002a57236f): kobject_uevent_env [ 124.455907][ T9449] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 124.459360][ T3919] kobject: 'loop4' (000000002a57236f): fill_kobj_path: path = '/devices/virtual/block/loop4' 21:28:17 executing program 1: socket(0x10, 0x80002, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="7400000024000705000000000000543708000000", @ANYRES32, @ANYBLOB="00000000ffffffff0000000008000100736671004800020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f3"], 0x74}}, 0x0) 21:28:17 executing program 2: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='uid_map\x00') r1 = gettid() tkill(r1, 0x3c) write$P9_RSTATFS(r0, 0x0, 0xff0f) 21:28:17 executing program 5: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='uid_map\x00') r1 = gettid() tkill(r1, 0x3c) write$P9_RSTATFS(r0, 0x0, 0xff0f) 21:28:17 executing program 3: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x6) read(r0, &(0x7f0000000080)=""/48, 0x1a) write$evdev(r0, &(0x7f0000000000)=[{{0x0, 0x7530}, 0x0, 0x1}], 0x354) 21:28:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) fallocate(r2, 0x40, 0x0, 0x9) 21:28:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, 0x0) mount$9p_rdma(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001b40)=ANY=[]) getresgid(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) recvmsg(r0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x14, 0x2, [@IFLA_BOND_AD_ACTOR_SYS_PRIO={0x8, 0x18, 0x3f}, @IFLA_BOND_MODE={0x8, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x0, 0x300) [ 124.606089][ T9434] kobject: 'veth4' (0000000042829713): kobject_cleanup, parent 0000000091d7b4c8 [ 124.617542][ T9434] kobject: 'veth4' (0000000042829713): calling ktype release [ 124.626058][ T3919] kobject: 'loop0' (000000007f567c69): kobject_uevent_env [ 124.633177][ T3919] kobject: 'loop0' (000000007f567c69): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 124.636075][ T9434] kobject: 'veth4': free name [ 124.669158][ T3919] kobject: 'loop1' (000000007b9b521b): kobject_uevent_env [ 124.678657][ T9488] kobject: 'veth4' (00000000cad60edb): kobject_add_internal: parent: 'net', set: 'devices' [ 124.689742][ T9488] kobject: 'veth4' (00000000cad60edb): kobject_uevent_env [ 124.697199][ T9488] kobject: 'veth4' (00000000cad60edb): fill_kobj_path: path = '/devices/virtual/net/veth4' [ 124.707872][ T9488] kobject: 'queues' (00000000dfe5e93a): kobject_add_internal: parent: 'veth4', set: '' 21:28:17 executing program 5: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='uid_map\x00') r1 = gettid() tkill(r1, 0x3c) write$P9_RSTATFS(r0, 0x0, 0xff0f) 21:28:17 executing program 2: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='uid_map\x00') r1 = gettid() tkill(r1, 0x3c) write$P9_RSTATFS(r0, 0x0, 0xff0f) [ 124.718323][ T9488] kobject: 'queues' (00000000dfe5e93a): kobject_uevent_env [ 124.726090][ T9488] kobject: 'queues' (00000000dfe5e93a): kobject_uevent_env: filter function caused the event to drop! [ 124.730516][ T3919] kobject: 'loop1' (000000007b9b521b): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 124.737619][ T9488] kobject: 'rx-0' (00000000f47bed8a): kobject_add_internal: parent: 'queues', set: 'queues' [ 124.757865][ T9488] kobject: 'rx-0' (00000000f47bed8a): kobject_uevent_env 21:28:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, 0x0) mount$9p_rdma(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001b40)=ANY=[]) getresgid(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) recvmsg(r0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x14, 0x2, [@IFLA_BOND_AD_ACTOR_SYS_PRIO={0x8, 0x18, 0x3f}, @IFLA_BOND_MODE={0x8, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x0, 0x300) 21:28:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, 0x0) mount$9p_rdma(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001b40)=ANY=[]) getresgid(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) recvmsg(r0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x14, 0x2, [@IFLA_BOND_AD_ACTOR_SYS_PRIO={0x8, 0x18, 0x3f}, @IFLA_BOND_MODE={0x8, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x0, 0x300) [ 124.765126][ T9488] kobject: 'rx-0' (00000000f47bed8a): fill_kobj_path: path = '/devices/virtual/net/veth4/queues/rx-0' [ 124.780926][ T9488] kobject: 'tx-0' (000000008d196014): kobject_add_internal: parent: 'queues', set: 'queues' [ 124.803566][ T3919] kobject: 'loop5' (00000000742f9a87): kobject_uevent_env [ 124.812523][ T9488] kobject: 'tx-0' (000000008d196014): kobject_uevent_env [ 124.833458][ T3919] kobject: 'loop5' (00000000742f9a87): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 124.846055][ T9488] kobject: 'tx-0' (000000008d196014): fill_kobj_path: path = '/devices/virtual/net/veth4/queues/tx-0' [ 124.869365][ T3919] kobject: 'loop2' (000000006bef9592): kobject_uevent_env 21:28:17 executing program 3: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x6) read(r0, &(0x7f0000000080)=""/48, 0x1a) write$evdev(r0, &(0x7f0000000000)=[{{0x0, 0x7530}, 0x0, 0x1}], 0x354) [ 124.877483][ T9488] kobject: 'batman_adv' (00000000695c634b): kobject_add_internal: parent: 'veth4', set: '' [ 124.888624][ T3919] kobject: 'loop2' (000000006bef9592): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 124.906515][ T3919] kobject: 'loop2' (000000006bef9592): kobject_uevent_env [ 124.913674][ T3919] kobject: 'loop2' (000000006bef9592): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 124.930206][ T9488] kobject: 'batman_adv' (00000000695c634b): kobject_uevent_env [ 124.939529][ T3919] kobject: 'loop3' (000000005e866e2d): kobject_uevent_env [ 124.949583][ T3919] kobject: 'loop3' (000000005e866e2d): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 124.954082][ T9488] kobject: 'batman_adv' (00000000695c634b): kobject_uevent_env: filter function caused the event to drop! [ 124.988766][ T9488] kobject: 'batman_adv' (00000000695c634b): kobject_cleanup, parent 0000000091d7b4c8 [ 125.000045][ T9488] kobject: 'batman_adv' (00000000695c634b): calling ktype release [ 125.008796][ T9488] kobject: (00000000695c634b): dynamic_kobj_release [ 125.015375][ T9488] kobject: 'batman_adv': free name [ 125.020775][ T9488] kobject: 'rx-0' (00000000f47bed8a): kobject_cleanup, parent 00000000dfe5e93a [ 125.029969][ T9488] kobject: 'rx-0' (00000000f47bed8a): auto cleanup 'remove' event [ 125.037801][ T9488] kobject: 'rx-0' (00000000f47bed8a): kobject_uevent_env [ 125.044857][ T9488] kobject: 'rx-0' (00000000f47bed8a): fill_kobj_path: path = '/devices/virtual/net/veth4/queues/rx-0' [ 125.055935][ T9488] kobject: 'rx-0' (00000000f47bed8a): auto cleanup kobject_del [ 125.063514][ T9488] kobject: 'rx-0' (00000000f47bed8a): calling ktype release [ 125.071115][ T9488] kobject: 'rx-0': free name [ 125.075709][ T9488] kobject: 'tx-0' (000000008d196014): kobject_cleanup, parent 00000000dfe5e93a [ 125.084668][ T9488] kobject: 'tx-0' (000000008d196014): auto cleanup 'remove' event [ 125.092559][ T9488] kobject: 'tx-0' (000000008d196014): kobject_uevent_env [ 125.099643][ T9488] kobject: 'tx-0' (000000008d196014): fill_kobj_path: path = '/devices/virtual/net/veth4/queues/tx-0' [ 125.110636][ T9488] kobject: 'tx-0' (000000008d196014): auto cleanup kobject_del [ 125.118551][ T9488] kobject: 'tx-0' (000000008d196014): calling ktype release [ 125.125852][ T9488] kobject: 'tx-0': free name [ 125.130513][ T9488] kobject: 'queues' (00000000dfe5e93a): kobject_cleanup, parent 0000000091d7b4c8 21:28:18 executing program 3: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x6) read(r0, &(0x7f0000000080)=""/48, 0x1a) write$evdev(r0, &(0x7f0000000000)=[{{0x0, 0x7530}, 0x0, 0x1}], 0x354) [ 125.139973][ T9488] kobject: 'queues' (00000000dfe5e93a): calling ktype release [ 125.147471][ T9488] kobject: 'queues' (00000000dfe5e93a): kset_release [ 125.154324][ T9488] kobject: 'queues': free name [ 125.160323][ T3919] kobject: 'loop3' (000000005e866e2d): kobject_uevent_env [ 125.168152][ T9488] kobject: 'veth4' (00000000cad60edb): kobject_uevent_env [ 125.175277][ T9488] kobject: 'veth4' (00000000cad60edb): fill_kobj_path: path = '/devices/virtual/net/veth4' [ 125.177415][ T3919] kobject: 'loop3' (000000005e866e2d): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 125.382959][ T3919] kobject: 'loop3' (000000005e866e2d): kobject_uevent_env [ 125.390492][ T9511] netlink: 'syz-executor.0': attribute type 24 has an invalid length. [ 125.407381][ T3919] kobject: 'loop3' (000000005e866e2d): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 125.418405][ T9511] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 125.433432][ T3919] kobject: 'loop4' (000000002a57236f): kobject_uevent_env [ 125.440938][ T3919] kobject: 'loop4' (000000002a57236f): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 125.456171][ T9511] kobject: 'bond2' (000000009e52db20): kobject_add_internal: parent: 'net', set: 'devices' [ 125.468108][ T9511] kobject: 'bond2' (000000009e52db20): kobject_uevent_env [ 125.475384][ T9511] kobject: 'bond2' (000000009e52db20): fill_kobj_path: path = '/devices/virtual/net/bond2' [ 125.486075][ T9511] kobject: 'queues' (00000000bf2cdc5f): kobject_add_internal: parent: 'bond2', set: '' [ 125.496532][ T9511] kobject: 'queues' (00000000bf2cdc5f): kobject_uevent_env [ 125.503727][ T9511] kobject: 'queues' (00000000bf2cdc5f): kobject_uevent_env: filter function caused the event to drop! [ 125.515485][ T9511] kobject: 'rx-0' (000000003f85efc6): kobject_add_internal: parent: 'queues', set: 'queues' [ 125.525735][ T9511] kobject: 'rx-0' (000000003f85efc6): kobject_uevent_env [ 125.533042][ T9511] kobject: 'rx-0' (000000003f85efc6): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-0' [ 125.544092][ T9511] kobject: 'rx-1' (00000000f680baf7): kobject_add_internal: parent: 'queues', set: 'queues' [ 125.554270][ T9511] kobject: 'rx-1' (00000000f680baf7): kobject_uevent_env [ 125.561359][ T9511] kobject: 'rx-1' (00000000f680baf7): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-1' [ 125.572355][ T9511] kobject: 'rx-2' (00000000a193d3f4): kobject_add_internal: parent: 'queues', set: 'queues' [ 125.582515][ T9511] kobject: 'rx-2' (00000000a193d3f4): kobject_uevent_env [ 125.589590][ T9511] kobject: 'rx-2' (00000000a193d3f4): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-2' [ 125.600648][ T9511] kobject: 'rx-3' (000000000498662a): kobject_add_internal: parent: 'queues', set: 'queues' [ 125.610755][ T9511] kobject: 'rx-3' (000000000498662a): kobject_uevent_env [ 125.617828][ T9511] kobject: 'rx-3' (000000000498662a): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-3' [ 125.628826][ T9511] kobject: 'rx-4' (000000003ba02958): kobject_add_internal: parent: 'queues', set: 'queues' [ 125.638937][ T9511] kobject: 'rx-4' (000000003ba02958): kobject_uevent_env [ 125.646024][ T9511] kobject: 'rx-4' (000000003ba02958): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-4' [ 125.657054][ T9511] kobject: 'rx-5' (000000009e357f62): kobject_add_internal: parent: 'queues', set: 'queues' [ 125.667159][ T9511] kobject: 'rx-5' (000000009e357f62): kobject_uevent_env [ 125.674176][ T9511] kobject: 'rx-5' (000000009e357f62): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-5' [ 125.685198][ T9511] kobject: 'rx-6' (00000000496a206b): kobject_add_internal: parent: 'queues', set: 'queues' [ 125.695521][ T9511] kobject: 'rx-6' (00000000496a206b): kobject_uevent_env [ 125.702697][ T9511] kobject: 'rx-6' (00000000496a206b): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-6' [ 125.713736][ T9511] kobject: 'rx-7' (0000000079928ab0): kobject_add_internal: parent: 'queues', set: 'queues' [ 125.723868][ T9511] kobject: 'rx-7' (0000000079928ab0): kobject_uevent_env [ 125.730936][ T9511] kobject: 'rx-7' (0000000079928ab0): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-7' [ 125.742016][ T9511] kobject: 'rx-8' (000000009bd2eef3): kobject_add_internal: parent: 'queues', set: 'queues' [ 125.752131][ T9511] kobject: 'rx-8' (000000009bd2eef3): kobject_uevent_env [ 125.759226][ T9511] kobject: 'rx-8' (000000009bd2eef3): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-8' [ 125.770314][ T9511] kobject: 'rx-9' (000000004a55472a): kobject_add_internal: parent: 'queues', set: 'queues' [ 125.780448][ T9511] kobject: 'rx-9' (000000004a55472a): kobject_uevent_env [ 125.787523][ T9511] kobject: 'rx-9' (000000004a55472a): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-9' [ 125.798539][ T9511] kobject: 'rx-10' (00000000865d6ebb): kobject_add_internal: parent: 'queues', set: 'queues' [ 125.808755][ T9511] kobject: 'rx-10' (00000000865d6ebb): kobject_uevent_env [ 125.815870][ T9511] kobject: 'rx-10' (00000000865d6ebb): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-10' [ 125.827067][ T9511] kobject: 'rx-11' (000000008189c051): kobject_add_internal: parent: 'queues', set: 'queues' [ 125.837283][ T9511] kobject: 'rx-11' (000000008189c051): kobject_uevent_env [ 125.844397][ T9511] kobject: 'rx-11' (000000008189c051): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-11' [ 125.855802][ T9511] kobject: 'rx-12' (000000000fdd166b): kobject_add_internal: parent: 'queues', set: 'queues' [ 125.866040][ T9511] kobject: 'rx-12' (000000000fdd166b): kobject_uevent_env [ 125.873168][ T9511] kobject: 'rx-12' (000000000fdd166b): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-12' [ 125.884378][ T9511] kobject: 'rx-13' (000000006bd13d38): kobject_add_internal: parent: 'queues', set: 'queues' [ 125.894566][ T9511] kobject: 'rx-13' (000000006bd13d38): kobject_uevent_env [ 125.901715][ T9511] kobject: 'rx-13' (000000006bd13d38): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-13' [ 125.912936][ T9511] kobject: 'rx-14' (000000001b959653): kobject_add_internal: parent: 'queues', set: 'queues' [ 125.923145][ T9511] kobject: 'rx-14' (000000001b959653): kobject_uevent_env [ 125.930318][ T9511] kobject: 'rx-14' (000000001b959653): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-14' [ 125.941513][ T9511] kobject: 'rx-15' (00000000e24cc0e3): kobject_add_internal: parent: 'queues', set: 'queues' [ 125.951706][ T9511] kobject: 'rx-15' (00000000e24cc0e3): kobject_uevent_env [ 125.958852][ T9511] kobject: 'rx-15' (00000000e24cc0e3): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-15' [ 125.970019][ T9511] kobject: 'tx-0' (00000000e26d0ce5): kobject_add_internal: parent: 'queues', set: 'queues' [ 125.980231][ T9511] kobject: 'tx-0' (00000000e26d0ce5): kobject_uevent_env [ 125.987279][ T9511] kobject: 'tx-0' (00000000e26d0ce5): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-0' [ 125.998309][ T9511] kobject: 'tx-1' (00000000631d05f3): kobject_add_internal: parent: 'queues', set: 'queues' [ 126.008483][ T9511] kobject: 'tx-1' (00000000631d05f3): kobject_uevent_env [ 126.015501][ T9511] kobject: 'tx-1' (00000000631d05f3): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-1' [ 126.026596][ T9511] kobject: 'tx-2' (00000000da07bef2): kobject_add_internal: parent: 'queues', set: 'queues' [ 126.036828][ T9511] kobject: 'tx-2' (00000000da07bef2): kobject_uevent_env [ 126.043857][ T9511] kobject: 'tx-2' (00000000da07bef2): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-2' [ 126.054882][ T9511] kobject: 'tx-3' (000000001cd5744c): kobject_add_internal: parent: 'queues', set: 'queues' [ 126.065087][ T9511] kobject: 'tx-3' (000000001cd5744c): kobject_uevent_env [ 126.072134][ T9511] kobject: 'tx-3' (000000001cd5744c): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-3' [ 126.083248][ T9511] kobject: 'tx-4' (0000000055def70e): kobject_add_internal: parent: 'queues', set: 'queues' [ 126.094086][ T9511] kobject: 'tx-4' (0000000055def70e): kobject_uevent_env [ 126.101154][ T9511] kobject: 'tx-4' (0000000055def70e): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-4' [ 126.112138][ T9511] kobject: 'tx-5' (0000000064921871): kobject_add_internal: parent: 'queues', set: 'queues' [ 126.122354][ T9511] kobject: 'tx-5' (0000000064921871): kobject_uevent_env [ 126.129395][ T9511] kobject: 'tx-5' (0000000064921871): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-5' [ 126.140453][ T9511] kobject: 'tx-6' (00000000dfb42d86): kobject_add_internal: parent: 'queues', set: 'queues' [ 126.150617][ T9511] kobject: 'tx-6' (00000000dfb42d86): kobject_uevent_env [ 126.157674][ T9511] kobject: 'tx-6' (00000000dfb42d86): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-6' [ 126.168679][ T9511] kobject: 'tx-7' (0000000013f75f76): kobject_add_internal: parent: 'queues', set: 'queues' [ 126.178892][ T9511] kobject: 'tx-7' (0000000013f75f76): kobject_uevent_env [ 126.185921][ T9511] kobject: 'tx-7' (0000000013f75f76): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-7' [ 126.196936][ T9511] kobject: 'tx-8' (00000000de6388b3): kobject_add_internal: parent: 'queues', set: 'queues' [ 126.207158][ T9511] kobject: 'tx-8' (00000000de6388b3): kobject_uevent_env [ 126.214229][ T9511] kobject: 'tx-8' (00000000de6388b3): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-8' [ 126.225249][ T9511] kobject: 'tx-9' (000000006298facb): kobject_add_internal: parent: 'queues', set: 'queues' [ 126.235390][ T9511] kobject: 'tx-9' (000000006298facb): kobject_uevent_env [ 126.242447][ T9511] kobject: 'tx-9' (000000006298facb): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-9' [ 126.253568][ T9511] kobject: 'tx-10' (000000007025febf): kobject_add_internal: parent: 'queues', set: 'queues' [ 126.263873][ T9511] kobject: 'tx-10' (000000007025febf): kobject_uevent_env [ 126.271023][ T9511] kobject: 'tx-10' (000000007025febf): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-10' [ 126.282206][ T9511] kobject: 'tx-11' (00000000c5775d2b): kobject_add_internal: parent: 'queues', set: 'queues' [ 126.292436][ T9511] kobject: 'tx-11' (00000000c5775d2b): kobject_uevent_env [ 126.299578][ T9511] kobject: 'tx-11' (00000000c5775d2b): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-11' [ 126.310752][ T9511] kobject: 'tx-12' (000000007129d816): kobject_add_internal: parent: 'queues', set: 'queues' [ 126.321038][ T9511] kobject: 'tx-12' (000000007129d816): kobject_uevent_env [ 126.328187][ T9511] kobject: 'tx-12' (000000007129d816): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-12' [ 126.339373][ T9511] kobject: 'tx-13' (00000000392d23b2): kobject_add_internal: parent: 'queues', set: 'queues' [ 126.349651][ T9511] kobject: 'tx-13' (00000000392d23b2): kobject_uevent_env [ 126.356870][ T9511] kobject: 'tx-13' (00000000392d23b2): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-13' [ 126.368038][ T9511] kobject: 'tx-14' (000000005625696b): kobject_add_internal: parent: 'queues', set: 'queues' [ 126.378323][ T9511] kobject: 'tx-14' (000000005625696b): kobject_uevent_env [ 126.385437][ T9511] kobject: 'tx-14' (000000005625696b): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-14' [ 126.396618][ T9511] kobject: 'tx-15' (0000000023b5580f): kobject_add_internal: parent: 'queues', set: 'queues' [ 126.406927][ T9511] kobject: 'tx-15' (0000000023b5580f): kobject_uevent_env [ 126.414051][ T9511] kobject: 'tx-15' (0000000023b5580f): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-15' [ 126.425776][ T9511] kobject: 'batman_adv' (000000003a1909e5): kobject_add_internal: parent: 'bond2', set: '' [ 126.436595][ T9516] netlink: 'syz-executor.2': attribute type 24 has an invalid length. [ 126.444863][ T9516] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 126.460455][ T3919] kobject: 'loop0' (000000007f567c69): kobject_uevent_env [ 126.467692][ T3919] kobject: 'loop0' (000000007f567c69): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 126.616097][ T9518] netlink: 'syz-executor.5': attribute type 24 has an invalid length. [ 126.624338][ T9518] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 126.635596][ T3919] kobject: 'loop2' (000000006bef9592): kobject_uevent_env [ 126.642752][ T3919] kobject: 'loop2' (000000006bef9592): fill_kobj_path: path = '/devices/virtual/block/loop2' 21:28:19 executing program 1: socket(0x10, 0x80002, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="7400000024000705000000000000543708000000", @ANYRES32, @ANYBLOB="00000000ffffffff0000000008000100736671004800020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f3"], 0x74}}, 0x0) 21:28:19 executing program 3: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x6) read(r0, &(0x7f0000000080)=""/48, 0x1a) write$evdev(r0, &(0x7f0000000000)=[{{0x0, 0x7530}, 0x0, 0x1}], 0x354) 21:28:19 executing program 4: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='uid_map\x00') r1 = gettid() tkill(r1, 0x3c) write$P9_RSTATFS(r0, 0x0, 0xff0f) 21:28:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, 0x0) mount$9p_rdma(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001b40)=ANY=[]) getresgid(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) recvmsg(r0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x14, 0x2, [@IFLA_BOND_AD_ACTOR_SYS_PRIO={0x8, 0x18, 0x3f}, @IFLA_BOND_MODE={0x8, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x0, 0x300) 21:28:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, 0x0) mount$9p_rdma(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001b40)=ANY=[]) getresgid(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) recvmsg(r0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x14, 0x2, [@IFLA_BOND_AD_ACTOR_SYS_PRIO={0x8, 0x18, 0x3f}, @IFLA_BOND_MODE={0x8, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x0, 0x300) 21:28:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, 0x0) mount$9p_rdma(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001b40)=ANY=[]) getresgid(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) recvmsg(r0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x14, 0x2, [@IFLA_BOND_AD_ACTOR_SYS_PRIO={0x8, 0x18, 0x3f}, @IFLA_BOND_MODE={0x8, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x0, 0x300) 21:28:19 executing program 4: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='uid_map\x00') r1 = gettid() tkill(r1, 0x3c) write$P9_RSTATFS(r0, 0x0, 0xff0f) [ 126.808449][ T9488] kobject: 'veth4' (00000000cad60edb): kobject_cleanup, parent 0000000091d7b4c8 [ 126.817529][ T9488] kobject: 'veth4' (00000000cad60edb): calling ktype release [ 126.824901][ T9488] kobject: 'veth4': free name [ 126.825920][ T3919] kobject: 'loop5' (00000000742f9a87): kobject_uevent_env [ 126.839409][ T3919] kobject: 'loop5' (00000000742f9a87): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 126.886652][ T3919] kobject: 'loop1' (000000007b9b521b): kobject_uevent_env [ 126.893808][ T3919] kobject: 'loop1' (000000007b9b521b): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 126.912470][ T9551] kobject: 'veth4' (00000000bf399918): kobject_add_internal: parent: 'net', set: 'devices' 21:28:19 executing program 4: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='uid_map\x00') r1 = gettid() tkill(r1, 0x3c) write$P9_RSTATFS(r0, 0x0, 0xff0f) [ 126.931178][ T3919] kobject: 'loop4' (000000002a57236f): kobject_uevent_env [ 126.943896][ T3919] kobject: 'loop4' (000000002a57236f): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 126.944032][ T9551] kobject: 'veth4' (00000000bf399918): kobject_uevent_env 21:28:19 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={r2}, &(0x7f0000000040)=0x8) [ 126.986756][ T9551] kobject: 'veth4' (00000000bf399918): fill_kobj_path: path = '/devices/virtual/net/veth4' [ 126.997686][ T9551] kobject: 'queues' (00000000245e24f9): kobject_add_internal: parent: 'veth4', set: '' [ 127.014654][ T9551] kobject: 'queues' (00000000245e24f9): kobject_uevent_env [ 127.022974][ T3919] kobject: 'loop4' (000000002a57236f): kobject_uevent_env 21:28:19 executing program 3: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x6) read(r0, &(0x7f0000000080)=""/48, 0x1a) write$evdev(r0, &(0x7f0000000000)=[{{0x0, 0x7530}, 0x0, 0x1}], 0x354) [ 127.027033][ T9551] kobject: 'queues' (00000000245e24f9): kobject_uevent_env: filter function caused the event to drop! [ 127.033931][ T3919] kobject: 'loop4' (000000002a57236f): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 127.045338][ T9551] kobject: 'rx-0' (00000000a1804958): kobject_add_internal: parent: 'queues', set: 'queues' [ 127.073848][ T9551] kobject: 'rx-0' (00000000a1804958): kobject_uevent_env 21:28:20 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={r2}, &(0x7f0000000040)=0x8) [ 127.088175][ T3919] kobject: 'loop3' (000000005e866e2d): kobject_uevent_env [ 127.095321][ T3919] kobject: 'loop3' (000000005e866e2d): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 127.118360][ T3919] kobject: 'loop4' (000000002a57236f): kobject_uevent_env [ 127.125647][ T3919] kobject: 'loop4' (000000002a57236f): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 127.126445][ T9551] kobject: 'rx-0' (00000000a1804958): fill_kobj_path: path = '/devices/virtual/net/veth4/queues/rx-0' [ 127.162672][ T9551] kobject: 'tx-0' (00000000f75a030a): kobject_add_internal: parent: 'queues', set: 'queues' 21:28:20 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={r2}, &(0x7f0000000040)=0x8) [ 127.182217][ T9551] kobject: 'tx-0' (00000000f75a030a): kobject_uevent_env [ 127.190345][ T9551] kobject: 'tx-0' (00000000f75a030a): fill_kobj_path: path = '/devices/virtual/net/veth4/queues/tx-0' [ 127.192109][ T3919] kobject: 'loop4' (000000002a57236f): kobject_uevent_env [ 127.204752][ T9551] kobject: 'batman_adv' (00000000e3a785e8): kobject_add_internal: parent: 'veth4', set: '' [ 127.221791][ T3919] kobject: 'loop4' (000000002a57236f): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 127.233665][ T9551] kobject: 'batman_adv' (00000000e3a785e8): kobject_uevent_env [ 127.243947][ T9551] kobject: 'batman_adv' (00000000e3a785e8): kobject_uevent_env: filter function caused the event to drop! [ 127.255798][ T9551] kobject: 'batman_adv' (00000000e3a785e8): kobject_cleanup, parent 0000000091d7b4c8 [ 127.268216][ T9551] kobject: 'batman_adv' (00000000e3a785e8): calling ktype release [ 127.276389][ T9551] kobject: (00000000e3a785e8): dynamic_kobj_release [ 127.283012][ T9551] kobject: 'batman_adv': free name [ 127.289791][ T9551] kobject: 'rx-0' (00000000a1804958): kobject_cleanup, parent 00000000245e24f9 [ 127.298760][ T9551] kobject: 'rx-0' (00000000a1804958): auto cleanup 'remove' event [ 127.306602][ T9551] kobject: 'rx-0' (00000000a1804958): kobject_uevent_env [ 127.313629][ T9551] kobject: 'rx-0' (00000000a1804958): fill_kobj_path: path = '/devices/virtual/net/veth4/queues/rx-0' [ 127.324827][ T9551] kobject: 'rx-0' (00000000a1804958): auto cleanup kobject_del [ 127.332440][ T9551] kobject: 'rx-0' (00000000a1804958): calling ktype release [ 127.339738][ T9551] kobject: 'rx-0': free name [ 127.344506][ T9551] kobject: 'tx-0' (00000000f75a030a): kobject_cleanup, parent 00000000245e24f9 [ 127.348030][ T3919] kobject: 'loop3' (000000005e866e2d): kobject_uevent_env [ 127.353489][ T9551] kobject: 'tx-0' (00000000f75a030a): auto cleanup 'remove' event [ 127.364776][ T3919] kobject: 'loop3' (000000005e866e2d): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 127.368409][ T9551] kobject: 'tx-0' (00000000f75a030a): kobject_uevent_env [ 127.368451][ T9551] kobject: 'tx-0' (00000000f75a030a): fill_kobj_path: path = '/devices/virtual/net/veth4/queues/tx-0' [ 127.368523][ T9551] kobject: 'tx-0' (00000000f75a030a): auto cleanup kobject_del [ 127.404124][ T9551] kobject: 'tx-0' (00000000f75a030a): calling ktype release [ 127.411443][ T9551] kobject: 'tx-0': free name [ 127.416075][ T9551] kobject: 'queues' (00000000245e24f9): kobject_cleanup, parent 0000000091d7b4c8 [ 127.425164][ T9551] kobject: 'queues' (00000000245e24f9): calling ktype release [ 127.432634][ T9551] kobject: 'queues' (00000000245e24f9): kset_release [ 127.439312][ T9551] kobject: 'queues': free name [ 127.444426][ T9551] kobject: 'veth4' (00000000bf399918): kobject_uevent_env [ 127.451577][ T9551] kobject: 'veth4' (00000000bf399918): fill_kobj_path: path = '/devices/virtual/net/veth4' [ 127.627175][ T9544] kobject: 'bond1' (0000000011530838): kobject_add_internal: parent: 'net', set: 'devices' [ 127.640226][ T9544] kobject: 'bond1' (0000000011530838): kobject_uevent_env [ 127.647471][ T9544] kobject: 'bond1' (0000000011530838): fill_kobj_path: path = '/devices/virtual/net/bond1' [ 127.657947][ T9544] kobject: 'queues' (000000000e67cfe1): kobject_add_internal: parent: 'bond1', set: '' [ 127.668352][ T9544] kobject: 'queues' (000000000e67cfe1): kobject_uevent_env [ 127.675685][ T9544] kobject: 'queues' (000000000e67cfe1): kobject_uevent_env: filter function caused the event to drop! [ 127.686935][ T9544] kobject: 'rx-0' (000000007b50a7f8): kobject_add_internal: parent: 'queues', set: 'queues' [ 127.697199][ T9544] kobject: 'rx-0' (000000007b50a7f8): kobject_uevent_env [ 127.704264][ T9544] kobject: 'rx-0' (000000007b50a7f8): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-0' [ 127.715313][ T9544] kobject: 'rx-1' (000000000e7f6553): kobject_add_internal: parent: 'queues', set: 'queues' [ 127.725440][ T9544] kobject: 'rx-1' (000000000e7f6553): kobject_uevent_env [ 127.732521][ T9544] kobject: 'rx-1' (000000000e7f6553): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-1' [ 127.743530][ T9544] kobject: 'rx-2' (00000000ca7b62d1): kobject_add_internal: parent: 'queues', set: 'queues' [ 127.753647][ T9544] kobject: 'rx-2' (00000000ca7b62d1): kobject_uevent_env [ 127.760693][ T9544] kobject: 'rx-2' (00000000ca7b62d1): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-2' [ 127.771819][ T9544] kobject: 'rx-3' (00000000fc9a54bf): kobject_add_internal: parent: 'queues', set: 'queues' [ 127.781966][ T9544] kobject: 'rx-3' (00000000fc9a54bf): kobject_uevent_env [ 127.789029][ T9544] kobject: 'rx-3' (00000000fc9a54bf): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-3' [ 127.800051][ T9544] kobject: 'rx-4' (00000000aff54181): kobject_add_internal: parent: 'queues', set: 'queues' [ 127.810203][ T9544] kobject: 'rx-4' (00000000aff54181): kobject_uevent_env [ 127.817316][ T9544] kobject: 'rx-4' (00000000aff54181): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-4' [ 127.828334][ T9544] kobject: 'rx-5' (00000000ecce87d7): kobject_add_internal: parent: 'queues', set: 'queues' [ 127.838455][ T9544] kobject: 'rx-5' (00000000ecce87d7): kobject_uevent_env [ 127.845603][ T9544] kobject: 'rx-5' (00000000ecce87d7): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-5' [ 127.856717][ T9544] kobject: 'rx-6' (00000000fcb8be09): kobject_add_internal: parent: 'queues', set: 'queues' [ 127.866867][ T9544] kobject: 'rx-6' (00000000fcb8be09): kobject_uevent_env [ 127.873892][ T9544] kobject: 'rx-6' (00000000fcb8be09): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-6' [ 127.884919][ T9544] kobject: 'rx-7' (000000004e513072): kobject_add_internal: parent: 'queues', set: 'queues' [ 127.895029][ T9544] kobject: 'rx-7' (000000004e513072): kobject_uevent_env [ 127.902092][ T9544] kobject: 'rx-7' (000000004e513072): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-7' [ 127.913071][ T9544] kobject: 'rx-8' (00000000583b5590): kobject_add_internal: parent: 'queues', set: 'queues' [ 127.923248][ T9544] kobject: 'rx-8' (00000000583b5590): kobject_uevent_env [ 127.930447][ T9544] kobject: 'rx-8' (00000000583b5590): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-8' [ 127.941471][ T9544] kobject: 'rx-9' (0000000026280258): kobject_add_internal: parent: 'queues', set: 'queues' [ 127.951621][ T9544] kobject: 'rx-9' (0000000026280258): kobject_uevent_env [ 127.958681][ T9544] kobject: 'rx-9' (0000000026280258): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-9' [ 127.969661][ T9544] kobject: 'rx-10' (000000005f4d2032): kobject_add_internal: parent: 'queues', set: 'queues' [ 127.979845][ T9544] kobject: 'rx-10' (000000005f4d2032): kobject_uevent_env [ 127.986968][ T9544] kobject: 'rx-10' (000000005f4d2032): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-10' [ 127.998165][ T9544] kobject: 'rx-11' (00000000054475c4): kobject_add_internal: parent: 'queues', set: 'queues' [ 128.008371][ T9544] kobject: 'rx-11' (00000000054475c4): kobject_uevent_env [ 128.015486][ T9544] kobject: 'rx-11' (00000000054475c4): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-11' [ 128.026734][ T9544] kobject: 'rx-12' (000000005a71e462): kobject_add_internal: parent: 'queues', set: 'queues' [ 128.036980][ T9544] kobject: 'rx-12' (000000005a71e462): kobject_uevent_env [ 128.044090][ T9544] kobject: 'rx-12' (000000005a71e462): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-12' [ 128.055273][ T9544] kobject: 'rx-13' (00000000cde76d0b): kobject_add_internal: parent: 'queues', set: 'queues' [ 128.065449][ T9544] kobject: 'rx-13' (00000000cde76d0b): kobject_uevent_env [ 128.072584][ T9544] kobject: 'rx-13' (00000000cde76d0b): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-13' [ 128.083735][ T9544] kobject: 'rx-14' (00000000997804e3): kobject_add_internal: parent: 'queues', set: 'queues' [ 128.093971][ T9544] kobject: 'rx-14' (00000000997804e3): kobject_uevent_env [ 128.101116][ T9544] kobject: 'rx-14' (00000000997804e3): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-14' [ 128.112309][ T9544] kobject: 'rx-15' (0000000095b61ff5): kobject_add_internal: parent: 'queues', set: 'queues' [ 128.122500][ T9544] kobject: 'rx-15' (0000000095b61ff5): kobject_uevent_env [ 128.129652][ T9544] kobject: 'rx-15' (0000000095b61ff5): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-15' [ 128.140850][ T9544] kobject: 'tx-0' (00000000ff496ca9): kobject_add_internal: parent: 'queues', set: 'queues' [ 128.151068][ T9544] kobject: 'tx-0' (00000000ff496ca9): kobject_uevent_env [ 128.158134][ T9544] kobject: 'tx-0' (00000000ff496ca9): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-0' [ 128.169299][ T9544] kobject: 'tx-1' (000000008cc1d78d): kobject_add_internal: parent: 'queues', set: 'queues' [ 128.179553][ T9544] kobject: 'tx-1' (000000008cc1d78d): kobject_uevent_env [ 128.186715][ T9544] kobject: 'tx-1' (000000008cc1d78d): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-1' [ 128.197739][ T9544] kobject: 'tx-2' (0000000033f2d51c): kobject_add_internal: parent: 'queues', set: 'queues' [ 128.207884][ T9544] kobject: 'tx-2' (0000000033f2d51c): kobject_uevent_env [ 128.214908][ T9544] kobject: 'tx-2' (0000000033f2d51c): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-2' [ 128.226412][ T9544] kobject: 'tx-3' (00000000e28d9169): kobject_add_internal: parent: 'queues', set: 'queues' [ 128.236628][ T9544] kobject: 'tx-3' (00000000e28d9169): kobject_uevent_env [ 128.243648][ T9544] kobject: 'tx-3' (00000000e28d9169): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-3' [ 128.254694][ T9544] kobject: 'tx-4' (00000000d82ca834): kobject_add_internal: parent: 'queues', set: 'queues' [ 128.264833][ T9544] kobject: 'tx-4' (00000000d82ca834): kobject_uevent_env [ 128.271890][ T9544] kobject: 'tx-4' (00000000d82ca834): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-4' [ 128.282901][ T9544] kobject: 'tx-5' (00000000780ba1d6): kobject_add_internal: parent: 'queues', set: 'queues' [ 128.293108][ T9544] kobject: 'tx-5' (00000000780ba1d6): kobject_uevent_env [ 128.300145][ T9544] kobject: 'tx-5' (00000000780ba1d6): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-5' [ 128.311156][ T9544] kobject: 'tx-6' (000000008604fbee): kobject_add_internal: parent: 'queues', set: 'queues' [ 128.321395][ T9544] kobject: 'tx-6' (000000008604fbee): kobject_uevent_env [ 128.329932][ T9544] kobject: 'tx-6' (000000008604fbee): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-6' [ 128.340937][ T9544] kobject: 'tx-7' (00000000e6bb755f): kobject_add_internal: parent: 'queues', set: 'queues' [ 128.351100][ T9544] kobject: 'tx-7' (00000000e6bb755f): kobject_uevent_env [ 128.358199][ T9544] kobject: 'tx-7' (00000000e6bb755f): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-7' [ 128.369249][ T9544] kobject: 'tx-8' (00000000179a05f4): kobject_add_internal: parent: 'queues', set: 'queues' [ 128.379492][ T9544] kobject: 'tx-8' (00000000179a05f4): kobject_uevent_env [ 128.386531][ T9544] kobject: 'tx-8' (00000000179a05f4): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-8' [ 128.397555][ T9544] kobject: 'tx-9' (00000000fac0a512): kobject_add_internal: parent: 'queues', set: 'queues' [ 128.407831][ T9544] kobject: 'tx-9' (00000000fac0a512): kobject_uevent_env [ 128.414842][ T9544] kobject: 'tx-9' (00000000fac0a512): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-9' [ 128.425848][ T9544] kobject: 'tx-10' (0000000089f480b7): kobject_add_internal: parent: 'queues', set: 'queues' [ 128.436148][ T9544] kobject: 'tx-10' (0000000089f480b7): kobject_uevent_env [ 128.443260][ T9544] kobject: 'tx-10' (0000000089f480b7): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-10' [ 128.454436][ T9544] kobject: 'tx-11' (00000000e29b1abc): kobject_add_internal: parent: 'queues', set: 'queues' [ 128.464708][ T9544] kobject: 'tx-11' (00000000e29b1abc): kobject_uevent_env [ 128.471906][ T9544] kobject: 'tx-11' (00000000e29b1abc): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-11' [ 128.483066][ T9544] kobject: 'tx-12' (00000000b2c4439c): kobject_add_internal: parent: 'queues', set: 'queues' [ 128.493513][ T9544] kobject: 'tx-12' (00000000b2c4439c): kobject_uevent_env [ 128.500646][ T9544] kobject: 'tx-12' (00000000b2c4439c): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-12' [ 128.511836][ T9544] kobject: 'tx-13' (000000003b8736e3): kobject_add_internal: parent: 'queues', set: 'queues' [ 128.522078][ T9544] kobject: 'tx-13' (000000003b8736e3): kobject_uevent_env [ 128.529213][ T9544] kobject: 'tx-13' (000000003b8736e3): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-13' [ 128.540375][ T9544] kobject: 'tx-14' (000000005615f694): kobject_add_internal: parent: 'queues', set: 'queues' [ 128.550669][ T9544] kobject: 'tx-14' (000000005615f694): kobject_uevent_env [ 128.557836][ T9544] kobject: 'tx-14' (000000005615f694): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-14' [ 128.569553][ T9544] kobject: 'tx-15' (000000009bdcb544): kobject_add_internal: parent: 'queues', set: 'queues' [ 128.579885][ T9544] kobject: 'tx-15' (000000009bdcb544): kobject_uevent_env [ 128.587016][ T9544] kobject: 'tx-15' (000000009bdcb544): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-15' [ 128.598793][ T9544] kobject: 'batman_adv' (00000000a09fcdd0): kobject_add_internal: parent: 'bond1', set: '' [ 128.609584][ T9542] validate_nla: 2 callbacks suppressed [ 128.609592][ T9542] netlink: 'syz-executor.5': attribute type 24 has an invalid length. [ 128.625670][ T9542] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 128.630334][ T3919] kobject: 'loop2' (000000006bef9592): kobject_uevent_env [ 128.640898][ T3919] kobject: 'loop2' (000000006bef9592): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 128.766059][ T9549] netlink: 'syz-executor.0': attribute type 24 has an invalid length. [ 128.774335][ T9549] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 128.789133][ T3919] kobject: 'loop5' (00000000742f9a87): kobject_uevent_env [ 128.796272][ T3919] kobject: 'loop5' (00000000742f9a87): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 128.957403][ T9551] kobject: 'veth4' (00000000bf399918): kobject_cleanup, parent 0000000091d7b4c8 [ 128.967965][ T9551] kobject: 'veth4' (00000000bf399918): calling ktype release [ 128.973655][ T3919] kobject: 'loop0' (000000007f567c69): kobject_uevent_env [ 128.975346][ T9551] kobject: 'veth4': free name [ 128.983761][ T3919] kobject: 'loop0' (000000007f567c69): fill_kobj_path: path = '/devices/virtual/block/loop0' 21:28:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, 0x0) mount$9p_rdma(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001b40)=ANY=[]) getresgid(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) recvmsg(r0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x14, 0x2, [@IFLA_BOND_AD_ACTOR_SYS_PRIO={0x8, 0x18, 0x3f}, @IFLA_BOND_MODE={0x8, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x0, 0x300) 21:28:21 executing program 3: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x6) read(r0, &(0x7f0000000080)=""/48, 0x1a) write$evdev(r0, &(0x7f0000000000)=[{{0x0, 0x7530}, 0x0, 0x1}], 0x354) 21:28:21 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={r2}, &(0x7f0000000040)=0x8) 21:28:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, 0x0) mount$9p_rdma(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001b40)=ANY=[]) getresgid(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) recvmsg(r0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x14, 0x2, [@IFLA_BOND_AD_ACTOR_SYS_PRIO={0x8, 0x18, 0x3f}, @IFLA_BOND_MODE={0x8, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x0, 0x300) 21:28:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, 0x0) mount$9p_rdma(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001b40)=ANY=[]) getresgid(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) recvmsg(r0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x14, 0x2, [@IFLA_BOND_AD_ACTOR_SYS_PRIO={0x8, 0x18, 0x3f}, @IFLA_BOND_MODE={0x8, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x0, 0x300) 21:28:21 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={r2}, &(0x7f0000000040)=0x8) [ 129.008122][ T3919] kobject: 'loop1' (000000007b9b521b): kobject_uevent_env [ 129.040701][ T3919] kobject: 'loop1' (000000007b9b521b): fill_kobj_path: path = '/devices/virtual/block/loop1' 21:28:22 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={r2}, &(0x7f0000000040)=0x8) 21:28:22 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={r2}, &(0x7f0000000040)=0x8) [ 129.088275][ T9593] netlink: 'syz-executor.0': attribute type 24 has an invalid length. [ 129.103381][ T9593] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 129.118383][ T3919] kobject: 'loop1' (000000007b9b521b): kobject_uevent_env [ 129.125550][ T3919] kobject: 'loop1' (000000007b9b521b): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 129.134173][ T9593] kobject: 'bond3' (00000000e308e6cf): kobject_add_internal: parent: 'net', set: 'devices' [ 129.154153][ T9593] kobject: 'bond3' (00000000e308e6cf): kobject_uevent_env [ 129.162179][ T9593] kobject: 'bond3' (00000000e308e6cf): fill_kobj_path: path = '/devices/virtual/net/bond3' [ 129.173109][ T9593] kobject: 'queues' (00000000d2be4763): kobject_add_internal: parent: 'bond3', set: '' 21:28:22 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={r2}, &(0x7f0000000040)=0x8) [ 129.177030][ T3919] kobject: 'loop4' (000000002a57236f): kobject_uevent_env [ 129.183693][ T9593] kobject: 'queues' (00000000d2be4763): kobject_uevent_env [ 129.208486][ T9593] kobject: 'queues' (00000000d2be4763): kobject_uevent_env: filter function caused the event to drop! 21:28:22 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={r2}, &(0x7f0000000040)=0x8) 21:28:22 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={r2}, &(0x7f0000000040)=0x8) [ 129.235514][ T9593] kobject: 'rx-0' (00000000bae0ee6f): kobject_add_internal: parent: 'queues', set: 'queues' [ 129.251540][ T3919] kobject: 'loop4' (000000002a57236f): fill_kobj_path: path = '/devices/virtual/block/loop4' 21:28:22 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={r2}, &(0x7f0000000040)=0x8) [ 129.294016][ T3919] kobject: 'loop1' (000000007b9b521b): kobject_uevent_env [ 129.308820][ T9593] kobject: 'rx-0' (00000000bae0ee6f): kobject_uevent_env [ 129.329671][ T3919] kobject: 'loop1' (000000007b9b521b): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 129.349184][ T9593] kobject: 'rx-0' (00000000bae0ee6f): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-0' [ 129.362327][ T9593] kobject: 'rx-1' (00000000c96d51e6): kobject_add_internal: parent: 'queues', set: 'queues' [ 129.373688][ T9593] kobject: 'rx-1' (00000000c96d51e6): kobject_uevent_env [ 129.376219][ T3919] kobject: 'loop3' (000000005e866e2d): kobject_uevent_env [ 129.381248][ T9593] kobject: 'rx-1' (00000000c96d51e6): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-1' [ 129.399585][ T9593] kobject: 'rx-2' (0000000021f5a0ce): kobject_add_internal: parent: 'queues', set: 'queues' [ 129.402909][ T3919] kobject: 'loop3' (000000005e866e2d): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 129.410141][ T9593] kobject: 'rx-2' (0000000021f5a0ce): kobject_uevent_env [ 129.427614][ T9593] kobject: 'rx-2' (0000000021f5a0ce): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-2' [ 129.439205][ T9593] kobject: 'rx-3' (00000000ac3fd43c): kobject_add_internal: parent: 'queues', set: 'queues' [ 129.449613][ T9593] kobject: 'rx-3' (00000000ac3fd43c): kobject_uevent_env [ 129.457000][ T9593] kobject: 'rx-3' (00000000ac3fd43c): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-3' [ 129.468166][ T9593] kobject: 'rx-4' (0000000055462810): kobject_add_internal: parent: 'queues', set: 'queues' [ 129.478537][ T9593] kobject: 'rx-4' (0000000055462810): kobject_uevent_env [ 129.485775][ T9593] kobject: 'rx-4' (0000000055462810): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-4' [ 129.497191][ T9593] kobject: 'rx-5' (00000000472ecb65): kobject_add_internal: parent: 'queues', set: 'queues' [ 129.507544][ T9593] kobject: 'rx-5' (00000000472ecb65): kobject_uevent_env [ 129.514624][ T9593] kobject: 'rx-5' (00000000472ecb65): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-5' [ 129.525830][ T9593] kobject: 'rx-6' (000000001feebe89): kobject_add_internal: parent: 'queues', set: 'queues' [ 129.536415][ T9593] kobject: 'rx-6' (000000001feebe89): kobject_uevent_env [ 129.543511][ T9593] kobject: 'rx-6' (000000001feebe89): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-6' [ 129.554733][ T9593] kobject: 'rx-7' (000000006537c883): kobject_add_internal: parent: 'queues', set: 'queues' [ 129.564923][ T9593] kobject: 'rx-7' (000000006537c883): kobject_uevent_env [ 129.572102][ T9593] kobject: 'rx-7' (000000006537c883): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-7' [ 129.583449][ T9593] kobject: 'rx-8' (000000006345d44e): kobject_add_internal: parent: 'queues', set: 'queues' [ 129.593744][ T9593] kobject: 'rx-8' (000000006345d44e): kobject_uevent_env [ 129.600898][ T9593] kobject: 'rx-8' (000000006345d44e): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-8' [ 129.612258][ T9593] kobject: 'rx-9' (0000000093c69fc3): kobject_add_internal: parent: 'queues', set: 'queues' [ 129.622556][ T9593] kobject: 'rx-9' (0000000093c69fc3): kobject_uevent_env [ 129.629636][ T9593] kobject: 'rx-9' (0000000093c69fc3): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-9' [ 129.640821][ T9593] kobject: 'rx-10' (0000000078524907): kobject_add_internal: parent: 'queues', set: 'queues' [ 129.651071][ T9593] kobject: 'rx-10' (0000000078524907): kobject_uevent_env [ 129.658337][ T9593] kobject: 'rx-10' (0000000078524907): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-10' [ 129.669562][ T9593] kobject: 'rx-11' (00000000db058abe): kobject_add_internal: parent: 'queues', set: 'queues' [ 129.679979][ T9593] kobject: 'rx-11' (00000000db058abe): kobject_uevent_env [ 129.687259][ T9593] kobject: 'rx-11' (00000000db058abe): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-11' [ 129.698860][ T9593] kobject: 'rx-12' (00000000a1311837): kobject_add_internal: parent: 'queues', set: 'queues' [ 129.709147][ T9593] kobject: 'rx-12' (00000000a1311837): kobject_uevent_env [ 129.716519][ T9593] kobject: 'rx-12' (00000000a1311837): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-12' [ 129.727895][ T9593] kobject: 'rx-13' (00000000424e72c8): kobject_add_internal: parent: 'queues', set: 'queues' [ 129.738114][ T9593] kobject: 'rx-13' (00000000424e72c8): kobject_uevent_env [ 129.745266][ T9593] kobject: 'rx-13' (00000000424e72c8): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-13' [ 129.756676][ T9593] kobject: 'rx-14' (000000003bf3311d): kobject_add_internal: parent: 'queues', set: 'queues' [ 129.767086][ T9593] kobject: 'rx-14' (000000003bf3311d): kobject_uevent_env [ 129.774253][ T9593] kobject: 'rx-14' (000000003bf3311d): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-14' [ 129.785647][ T9593] kobject: 'rx-15' (00000000380e168e): kobject_add_internal: parent: 'queues', set: 'queues' [ 129.796022][ T9593] kobject: 'rx-15' (00000000380e168e): kobject_uevent_env [ 129.803215][ T9593] kobject: 'rx-15' (00000000380e168e): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-15' [ 129.814584][ T9593] kobject: 'tx-0' (000000000bfee3c6): kobject_add_internal: parent: 'queues', set: 'queues' [ 129.825209][ T9593] kobject: 'tx-0' (000000000bfee3c6): kobject_uevent_env [ 129.832472][ T9593] kobject: 'tx-0' (000000000bfee3c6): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/tx-0' [ 129.843833][ T9593] kobject: 'tx-1' (00000000883c808f): kobject_add_internal: parent: 'queues', set: 'queues' [ 129.854924][ T9593] kobject: 'tx-1' (00000000883c808f): kobject_uevent_env [ 129.862343][ T9593] kobject: 'tx-1' (00000000883c808f): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/tx-1' [ 129.873446][ T9593] kobject: 'tx-2' (0000000043d33045): kobject_add_internal: parent: 'queues', set: 'queues' [ 129.883683][ T9593] kobject: 'tx-2' (0000000043d33045): kobject_uevent_env [ 129.890757][ T9593] kobject: 'tx-2' (0000000043d33045): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/tx-2' [ 129.901790][ T9593] kobject: 'tx-3' (00000000af7ecc05): kobject_add_internal: parent: 'queues', set: 'queues' [ 129.912016][ T9593] kobject: 'tx-3' (00000000af7ecc05): kobject_uevent_env [ 129.919085][ T9593] kobject: 'tx-3' (00000000af7ecc05): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/tx-3' [ 129.930107][ T9593] kobject: 'tx-4' (0000000014d98980): kobject_add_internal: parent: 'queues', set: 'queues' [ 129.940366][ T9593] kobject: 'tx-4' (0000000014d98980): kobject_uevent_env [ 129.947484][ T9593] kobject: 'tx-4' (0000000014d98980): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/tx-4' [ 129.958520][ T9593] kobject: 'tx-5' (00000000c8a20e90): kobject_add_internal: parent: 'queues', set: 'queues' [ 129.968657][ T9593] kobject: 'tx-5' (00000000c8a20e90): kobject_uevent_env [ 129.975687][ T9593] kobject: 'tx-5' (00000000c8a20e90): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/tx-5' [ 129.986699][ T9593] kobject: 'tx-6' (00000000ebca936e): kobject_add_internal: parent: 'queues', set: 'queues' [ 129.996926][ T9593] kobject: 'tx-6' (00000000ebca936e): kobject_uevent_env [ 130.003970][ T9593] kobject: 'tx-6' (00000000ebca936e): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/tx-6' [ 130.015106][ T9593] kobject: 'tx-7' (000000001a369010): kobject_add_internal: parent: 'queues', set: 'queues' [ 130.025313][ T9593] kobject: 'tx-7' (000000001a369010): kobject_uevent_env [ 130.032352][ T9593] kobject: 'tx-7' (000000001a369010): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/tx-7' [ 130.043359][ T9593] kobject: 'tx-8' (0000000012a9ddfa): kobject_add_internal: parent: 'queues', set: 'queues' [ 130.053551][ T9593] kobject: 'tx-8' (0000000012a9ddfa): kobject_uevent_env [ 130.060614][ T9593] kobject: 'tx-8' (0000000012a9ddfa): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/tx-8' [ 130.071619][ T9593] kobject: 'tx-9' (0000000072ae6aa5): kobject_add_internal: parent: 'queues', set: 'queues' [ 130.081866][ T9593] kobject: 'tx-9' (0000000072ae6aa5): kobject_uevent_env [ 130.088930][ T9593] kobject: 'tx-9' (0000000072ae6aa5): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/tx-9' [ 130.099951][ T9593] kobject: 'tx-10' (000000000d9f1efd): kobject_add_internal: parent: 'queues', set: 'queues' [ 130.110180][ T9593] kobject: 'tx-10' (000000000d9f1efd): kobject_uevent_env [ 130.117327][ T9593] kobject: 'tx-10' (000000000d9f1efd): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/tx-10' [ 130.128477][ T9593] kobject: 'tx-11' (000000009c472f12): kobject_add_internal: parent: 'queues', set: 'queues' [ 130.138837][ T9593] kobject: 'tx-11' (000000009c472f12): kobject_uevent_env [ 130.145955][ T9593] kobject: 'tx-11' (000000009c472f12): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/tx-11' [ 130.157172][ T9593] kobject: 'tx-12' (000000006c7dd830): kobject_add_internal: parent: 'queues', set: 'queues' [ 130.167496][ T9593] kobject: 'tx-12' (000000006c7dd830): kobject_uevent_env [ 130.174602][ T9593] kobject: 'tx-12' (000000006c7dd830): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/tx-12' [ 130.185787][ T9593] kobject: 'tx-13' (0000000052745962): kobject_add_internal: parent: 'queues', set: 'queues' [ 130.196096][ T9593] kobject: 'tx-13' (0000000052745962): kobject_uevent_env [ 130.203224][ T9593] kobject: 'tx-13' (0000000052745962): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/tx-13' [ 130.214403][ T9593] kobject: 'tx-14' (00000000f2cb6256): kobject_add_internal: parent: 'queues', set: 'queues' [ 130.224630][ T9593] kobject: 'tx-14' (00000000f2cb6256): kobject_uevent_env [ 130.231785][ T9593] kobject: 'tx-14' (00000000f2cb6256): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/tx-14' [ 130.242935][ T9593] kobject: 'tx-15' (00000000a9b7b315): kobject_add_internal: parent: 'queues', set: 'queues' [ 130.253240][ T9593] kobject: 'tx-15' (00000000a9b7b315): kobject_uevent_env [ 130.260374][ T9593] kobject: 'tx-15' (00000000a9b7b315): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/tx-15' [ 130.272120][ T9593] kobject: 'batman_adv' (00000000cbd52c30): kobject_add_internal: parent: 'bond3', set: '' [ 130.282954][ T9594] netlink: 'syz-executor.2': attribute type 24 has an invalid length. [ 130.293721][ T9594] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 21:28:23 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={r2}, &(0x7f0000000040)=0x8) 21:28:23 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={r2}, &(0x7f0000000040)=0x8) 21:28:23 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={r2}, &(0x7f0000000040)=0x8) [ 130.300918][ T3919] kobject: 'loop0' (000000007f567c69): kobject_uevent_env [ 130.334496][ T3919] kobject: 'loop0' (000000007f567c69): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 130.371426][ T3919] kobject: 'loop4' (000000002a57236f): kobject_uevent_env [ 130.380839][ T3919] kobject: 'loop4' (000000002a57236f): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 130.408172][ T3919] kobject: 'loop1' (000000007b9b521b): kobject_uevent_env [ 130.421037][ T3919] kobject: 'loop1' (000000007b9b521b): fill_kobj_path: path = '/devices/virtual/block/loop1' 21:28:23 executing program 1: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x8}, 0x20) [ 130.433731][ T3919] kobject: 'loop3' (000000005e866e2d): kobject_uevent_env [ 130.440898][ T3919] kobject: 'loop3' (000000005e866e2d): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 130.472268][ T9591] netlink: 'syz-executor.5': attribute type 24 has an invalid length. [ 130.480878][ T3919] kobject: 'loop2' (000000006bef9592): kobject_uevent_env [ 130.482602][ T9591] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 130.496575][ T3919] kobject: 'loop2' (000000006bef9592): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 130.547583][ T9636] BPF:[1] VAR _ [ 130.551155][ T9636] BPF:type_id=2 linkage=0 [ 130.555491][ T9636] BPF: [ 130.558328][ T9636] BPF:Invalid type_id [ 130.562293][ T9636] BPF: [ 130.562293][ T9636] 21:28:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000900)=ANY=[@ANYBLOB="66696c74657200005a0e4b124d72f8b79dcd429f6319b2040000000000000000000000000000000000000000000000000e000000040000002005000000000000f000000000020000f0000000000200005004000050"], 0x1) 21:28:23 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={r2}, &(0x7f0000000040)=0x8) 21:28:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x14, 0x28, 0x829, 0x0, 0x0, {0x3, 0x1000000}}, 0x14}, 0x1, 0xfdffffff00000000}, 0x0) 21:28:23 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={r2}, &(0x7f0000000040)=0x8) 21:28:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) dup3(r3, r2, 0x0) connect$vsock_dgram(r2, &(0x7f0000000000), 0x10) [ 130.649709][ T9636] BPF:[1] VAR _ [ 130.653368][ T9636] BPF:type_id=2 linkage=0 [ 130.676028][ T9636] BPF: [ 130.678877][ T9636] BPF:Invalid type_id [ 130.689629][ T9636] BPF: [ 130.689629][ T9636] 21:28:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x14, 0x28, 0x829, 0x0, 0x0, {0x3, 0x1000000}}, 0x14}, 0x1, 0xfdffffff00000000}, 0x0) 21:28:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000900)=ANY=[@ANYBLOB="66696c74657200005a0e4b124d72f8b79dcd429f6319b2040000000000000000000000000000000000000000000000000e000000040000002005000000000000f000000000020000f0000000000200005004000050"], 0x1) 21:28:23 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={r2}, &(0x7f0000000040)=0x8) 21:28:23 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={r2}, &(0x7f0000000040)=0x8) [ 130.695770][ T3919] kobject: 'loop5' (00000000742f9a87): kobject_uevent_env [ 130.708425][ T3919] kobject: 'loop5' (00000000742f9a87): fill_kobj_path: path = '/devices/virtual/block/loop5' 21:28:23 executing program 1: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x8}, 0x20) 21:28:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) dup3(r3, r2, 0x0) connect$vsock_dgram(r2, &(0x7f0000000000), 0x10) 21:28:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000900)=ANY=[@ANYBLOB="66696c74657200005a0e4b124d72f8b79dcd429f6319b2040000000000000000000000000000000000000000000000000e000000040000002005000000000000f000000000020000f0000000000200005004000050"], 0x1) 21:28:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x14, 0x28, 0x829, 0x0, 0x0, {0x3, 0x1000000}}, 0x14}, 0x1, 0xfdffffff00000000}, 0x0) [ 130.757380][ T3919] kobject: 'loop4' (000000002a57236f): kobject_uevent_env [ 130.789926][ T3919] kobject: 'loop4' (000000002a57236f): fill_kobj_path: path = '/devices/virtual/block/loop4' 21:28:23 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={r2}, &(0x7f0000000040)=0x8) [ 130.841827][ T9658] BPF:[1] VAR _ [ 130.849533][ T3919] kobject: 'loop2' (000000006bef9592): kobject_uevent_env [ 130.850881][ T9658] BPF:type_id=2 linkage=0 [ 130.864797][ T9658] BPF: [ 130.876037][ T9658] BPF:Invalid type_id [ 130.880073][ T9658] BPF: [ 130.880073][ T9658] 21:28:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) dup3(r3, r2, 0x0) connect$vsock_dgram(r2, &(0x7f0000000000), 0x10) [ 130.884587][ T3919] kobject: 'loop2' (000000006bef9592): fill_kobj_path: path = '/devices/virtual/block/loop2' 21:28:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x14, 0x28, 0x829, 0x0, 0x0, {0x3, 0x1000000}}, 0x14}, 0x1, 0xfdffffff00000000}, 0x0) 21:28:23 executing program 1: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x8}, 0x20) 21:28:23 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x8}, 0x20) 21:28:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000900)=ANY=[@ANYBLOB="66696c74657200005a0e4b124d72f8b79dcd429f6319b2040000000000000000000000000000000000000000000000000e000000040000002005000000000000f000000000020000f0000000000200005004000050"], 0x1) 21:28:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) dup3(r3, r2, 0x0) connect$vsock_dgram(r2, &(0x7f0000000000), 0x10) 21:28:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) dup3(r3, r2, 0x0) connect$vsock_dgram(r2, &(0x7f0000000000), 0x10) [ 130.934783][ T3919] kobject: 'loop0' (000000007f567c69): kobject_uevent_env [ 130.974775][ T3919] kobject: 'loop0' (000000007f567c69): fill_kobj_path: path = '/devices/virtual/block/loop0' 21:28:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000900)=ANY=[@ANYBLOB="66696c74657200005a0e4b124d72f8b79dcd429f6319b2040000000000000000000000000000000000000000000000000e000000040000002005000000000000f000000000020000f0000000000200005004000050"], 0x1) 21:28:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) close(r2) openat$cgroup_ro(r1, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/61, 0x3d}}], 0x1, 0x0, 0x0) readv(r2, &(0x7f00000002c0), 0x1a5) 21:28:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) dup3(r3, r2, 0x0) connect$vsock_dgram(r2, &(0x7f0000000000), 0x10) [ 131.038505][ T9676] BPF:[1] VAR _ [ 131.042095][ T9676] BPF:type_id=2 linkage=0 [ 131.065126][ T3919] kobject: 'loop3' (000000005e866e2d): kobject_uevent_env [ 131.067585][ T9679] BPF:[1] VAR _ [ 131.083239][ T9679] BPF:type_id=2 linkage=0 [ 131.090403][ T3919] kobject: 'loop3' (000000005e866e2d): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 131.098598][ T9676] BPF: [ 131.103652][ T9679] BPF: [ 131.106690][ T9676] BPF:Invalid type_id [ 131.116195][ T9679] BPF:Invalid type_id [ 131.126133][ T9676] BPF: [ 131.126133][ T9676] [ 131.130763][ T3919] kobject: 'loop1' (000000007b9b521b): kobject_uevent_env [ 131.133806][ T9679] BPF: 21:28:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000900)=ANY=[@ANYBLOB="66696c74657200005a0e4b124d72f8b79dcd429f6319b2040000000000000000000000000000000000000000000000000e000000040000002005000000000000f000000000020000f0000000000200005004000050"], 0x1) 21:28:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) dup3(r3, r2, 0x0) connect$vsock_dgram(r2, &(0x7f0000000000), 0x10) 21:28:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) close(r2) openat$cgroup_ro(r1, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/61, 0x3d}}], 0x1, 0x0, 0x0) readv(r2, &(0x7f00000002c0), 0x1a5) 21:28:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) close(r2) openat$cgroup_ro(r1, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/61, 0x3d}}], 0x1, 0x0, 0x0) readv(r2, &(0x7f00000002c0), 0x1a5) [ 131.133806][ T9679] [ 131.158306][ T3919] kobject: 'loop1' (000000007b9b521b): fill_kobj_path: path = '/devices/virtual/block/loop1' 21:28:24 executing program 1: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x8}, 0x20) 21:28:24 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x8}, 0x20) 21:28:24 executing program 3: r0 = socket$kcm(0xa, 0x20000000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x3c, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'pids'}]}, 0xa00) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0xb, &(0x7f0000000080)='(#GPL#proc\x00'}, 0x30) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000200)='io.bfq.weight\x00', 0x2, 0x0) r4 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f00000018c0)={&(0x7f0000000280)=@ipx={0x4, 0x1223, 0x5, "cd6aa8e7f671", 0x2}, 0x80, &(0x7f0000001780)=[{&(0x7f0000000440)="0d7f56f0d026ebcf93bfafa2bff30df7c45050feeb15067c5d49f91a2e12bbf7374438de07dccd624087fb4d4d32ec54c64735641642ec67c7de672ecef73798bae10b708c992da81a72d11f7c4887a17b23bdb5ad628b3c425c63035114b0897bc985ecea556788aecf62ca638204a7951ba8cf61f7da68321438f7b893a1a28aab0bad719b1b8e5d5bb2f1710a12360c431556de56416e022d329a34daced028c4d96a32f90d867f9a5a58ce1f50adcbf87d406ec9ac5c16a167595be61fcdc0ff2896dba5bd4b5518c6aa9fd5f6ca7392b2", 0xd3}, {&(0x7f0000000300)="620b26a498dc669bd7aa3fca73851d25ab41afea3bea2ef866d1f383d5f38c4b5b8814ccf0b4695f25ea051920ebe62a2835c239ca9db9db68910de5c735f1cb110032bd4677cc60e5be2bd904c9c772bd385e2763dda05845d46672106bc552254d334e21a6c4beda51299ed35a873b96e23f8f1ad0d2934f5be16dbe34061ed9bb475b251fabe8344264e78a8a3518986a4bf457ca7e15ccfc2da5486d48783af47dee43e78eb3f03f568d41f519d4acee094051f39d906a3ca0b128", 0xbd}, {&(0x7f0000000540)="4e7b50f1ad49bdcac44e9fe1d560900e8213399656a9b3677ce3ddd99bcc80cddae16024fd9ce95c8ddd40d422ec6cda2165d16d365c6993375f24ff89d504dd211c7461313360369719723f95dac38eea2fa8532b028a1ae7c2568e3036414c975f6d30a562e45d96865d27db478a3708c3d3de7990929ee17822ce11a1cd8d756c509de287430775dcc8ab319a2cf9ff428c6f291f0b1f884d482f71ea9d158144be6fcac23442032e34f4f00ae3c30226cfb0dfdd979f90f61f9447ba50f826f4496c5ffb373c675cda385d8e5af2ed6d7af7fde413b8dff893b5e6759f3b94f6b4450e85dd390d034165844f49", 0xef}, {&(0x7f0000000640)="7b793c90197b07b7868cf15737053b74cc716f1febd429251dab21b4dae89768ed21102a91456c3f715c9782c31b4ac46f9d9aa7bd64f0f8ac62c68622e85689b0c2ee601fee0323f8e9a383e4474354790a64eeef0b35c10b2facfa71206b7f782752a33d736ca35c8896733005fdec5cdbee60dd58eb0f8730", 0x7a}, {&(0x7f00000006c0)="4fd217f9c8897382340a627eda674a1037931e643a38d476b16ca2784a64ed478bd8cb841648825c39d1e86f7aa56a", 0x2f}, {&(0x7f0000000700)="25e6244c", 0x4}, {&(0x7f0000000740)="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", 0x1000}, {&(0x7f0000001740)="4fac9cb6c0", 0x5}], 0x8, &(0x7f0000001800)=ANY=[@ANYBLOB="880000000000000004010000a1f1ffff479251a6efe7422ce733c2695ea21d5cdc0b13862c8e6d8a7198c2f3a8b08579a369d472d76d896105000000db080736b745f29357776c07f27038716570747d71b28d452db17aee594b5f3f2f3e517ee9dbf490b369"], 0x66}, 0x40000) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r7, 0x400454dc, &(0x7f0000000100)=0x1) r8 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f0000000180)='\\securityvboxnet0\x00') openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r9 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x1003e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001900)='./cgroup.net/syz1\x00', 0x1ff) close(r9) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x8941, &(0x7f0000000240)=0x1) ioctl$PERF_EVENT_IOC_RESET(r9, 0x2403, 0x13be000) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x3) write$cgroup_subtree(r6, &(0x7f0000000000)={[{0x2b, 'pids'}]}, 0x6) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x3, 0x3f, 0x2, 0x0, 0x8, 0x0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x8eca232af7c92b7c, @perf_config_ext={0x1, 0x8}, 0x800, 0x5, 0x5, 0x9, 0x4, 0x5, 0x7}, r2, 0x2, 0xffffffffffffffff, 0x8) 21:28:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000900)=ANY=[@ANYBLOB="66696c74657200005a0e4b124d72f8b79dcd429f6319b2040000000000000000000000000000000000000000000000000e000000040000002005000000000000f000000000020000f0000000000200005004000050"], 0x1) 21:28:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) close(r2) openat$cgroup_ro(r1, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/61, 0x3d}}], 0x1, 0x0, 0x0) readv(r2, &(0x7f00000002c0), 0x1a5) [ 131.201582][ T3919] kobject: 'loop5' (00000000742f9a87): kobject_uevent_env [ 131.234060][ T3919] kobject: 'loop5' (00000000742f9a87): fill_kobj_path: path = '/devices/virtual/block/loop5' 21:28:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) close(r2) openat$cgroup_ro(r1, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/61, 0x3d}}], 0x1, 0x0, 0x0) readv(r2, &(0x7f00000002c0), 0x1a5) [ 131.287213][ T3919] kobject: 'loop2' (000000006bef9592): kobject_uevent_env [ 131.291095][ T9703] BPF:[1] VAR _ [ 131.294359][ T3919] kobject: 'loop2' (000000006bef9592): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 131.313070][ T9700] BPF:[1] VAR _ [ 131.314398][ T9703] BPF:type_id=2 linkage=0 [ 131.321205][ T9700] BPF:type_id=2 linkage=0 [ 131.324416][ T9703] BPF: [ 131.332709][ T9703] BPF:Invalid type_id 21:28:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000011ff0)={0x2, 0x4e20, @dev}, 0x10) listen(r0, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @multicast2}, 0x10) listen(r1, 0x0) 21:28:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) close(r2) openat$cgroup_ro(r1, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/61, 0x3d}}], 0x1, 0x0, 0x0) readv(r2, &(0x7f00000002c0), 0x1a5) [ 131.344701][ T9700] BPF: [ 131.348433][ T9700] BPF:Invalid type_id [ 131.349992][ T9703] BPF: [ 131.349992][ T9703] [ 131.356417][ T9700] BPF: [ 131.356417][ T9700] 21:28:24 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000000000000001739f486a0ef063f58e57c4f3c167972fc5489a4ef75c6020d447d9d007970d52bafd9c4365dde7f3bbfcb8129a6ef0ba516b4f002e9e67ef97a9029fd336949c2aba9c74e66b880084c49dc9d0654d6538094d26a9eacb2ae39233f0494a84bee05438afb2c0c710cdaee6d1639c8a46f7f20161953d412002048bf8f117b054e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x2}], 0x1, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x8d7fa}], 0x1}}], 0xfffffdef, 0x240) 21:28:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) close(r2) openat$cgroup_ro(r1, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/61, 0x3d}}], 0x1, 0x0, 0x0) readv(r2, &(0x7f00000002c0), 0x1a5) [ 131.396673][ T3919] kobject: 'loop0' (000000007f567c69): kobject_uevent_env [ 131.403816][ T3919] kobject: 'loop0' (000000007f567c69): fill_kobj_path: path = '/devices/virtual/block/loop0' 21:28:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000011ff0)={0x2, 0x4e20, @dev}, 0x10) listen(r0, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @multicast2}, 0x10) listen(r1, 0x0) 21:28:24 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x2b, 0xed, 0x8}, 0x20) [ 131.491919][ T3919] kobject: 'loop3' (000000005e866e2d): kobject_uevent_env [ 131.500957][ T9717] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 131.507902][ T3919] kobject: 'loop3' (000000005e866e2d): fill_kobj_path: path = '/devices/virtual/block/loop3' 21:28:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000011ff0)={0x2, 0x4e20, @dev}, 0x10) listen(r0, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @multicast2}, 0x10) listen(r1, 0x0) 21:28:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000011ff0)={0x2, 0x4e20, @dev}, 0x10) listen(r0, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @multicast2}, 0x10) listen(r1, 0x0) [ 131.542845][ T9721] BPF:[1] VAR _ [ 131.546944][ T9721] BPF:type_id=2 linkage=0 [ 131.564448][ T9723] BPF:hdr_len not found [ 131.564786][ T9721] BPF: [ 131.590623][ T9721] BPF:Invalid type_id [ 131.598212][ T3919] kobject: 'loop1' (000000007b9b521b): kobject_uevent_env [ 131.607588][ T9721] BPF: [ 131.607588][ T9721] [ 131.619183][ T3919] kobject: 'loop1' (000000007b9b521b): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 131.681990][ T3919] kobject: 'loop5' (00000000742f9a87): kobject_uevent_env [ 131.694502][ T3919] kobject: 'loop5' (00000000742f9a87): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 131.706239][ T3919] kobject: 'loop3' (000000005e866e2d): kobject_uevent_env [ 131.714524][ T3919] kobject: 'loop3' (000000005e866e2d): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 131.725765][ T3919] kobject: 'loop0' (000000007f567c69):