[ 40.224312] audit: type=1800 audit(1549913692.857:26): pid=7773 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 40.246222] audit: type=1800 audit(1549913692.857:27): pid=7773 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 40.281484] audit: type=1800 audit(1549913692.947:28): pid=7773 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 41.178396] audit: type=1800 audit(1549913693.847:29): pid=7773 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.162' (ECDSA) to the list of known hosts. 2019/02/11 19:35:03 fuzzer started 2019/02/11 19:35:05 dialing manager at 10.128.0.26:38733 2019/02/11 19:35:05 syscalls: 1 2019/02/11 19:35:05 code coverage: enabled 2019/02/11 19:35:05 comparison tracing: enabled 2019/02/11 19:35:05 extra coverage: extra coverage is not supported by the kernel 2019/02/11 19:35:05 setuid sandbox: enabled 2019/02/11 19:35:05 namespace sandbox: enabled 2019/02/11 19:35:05 Android sandbox: /sys/fs/selinux/policy does not exist 2019/02/11 19:35:05 fault injection: enabled 2019/02/11 19:35:05 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/02/11 19:35:05 net packet injection: enabled 2019/02/11 19:35:05 net device setup: enabled 19:37:04 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20100, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x228400}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xd0, r1, 0x300, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xbe}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x19f}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8000}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6b}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1000}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x5}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x80}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xfff}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x80000001}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x8000}, 0x10) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000240)={0x0, 0x0, 0x9, 0x0, [], [{0x9, 0x0, 0x6, 0x6, 0x4, 0xfffffffffffffc00}, {0x3, 0x7, 0xff, 0x1f, 0x2, 0x1000}], [[], [], [], [], [], [], [], [], []]}) ioctl$KVM_S390_VCPU_FAULT(r0, 0x4004ae52, &(0x7f0000000540)) ioctl$ASHMEM_SET_SIZE(r0, 0x40047703, 0xd7e7) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f0000000580)={0x1, 0xffff, 0x83e0}) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f00000005c0)=""/131) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000006c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f0000000800)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x3102000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000700)={0x8c, r2, 0x800, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x34, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ffc000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}]}, @TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x100000001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x11}, 0x40000) accept4$vsock_stream(r0, &(0x7f0000000840)={0x28, 0x0, 0x2711}, 0x10, 0x800) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000880)=0xffffffffffffff9c, 0x4) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f00000008c0)={0x7, {0x8, 0x3f, 0x1, 0x84df}}) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40246608, &(0x7f0000000900)={0x9, 0x1, 0x1f, 0x3, 0x7fff, 0x2}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc2c45512, &(0x7f0000000940)={{0x3, 0x0, 0x526, 0x80000001, '\x00', 0x9}, 0x0, [0x4, 0xfbb, 0x7e9c1018, 0x3f, 0x6, 0x6000000000000, 0x1, 0x1, 0x8, 0x2, 0x2, 0x0, 0x2, 0x6, 0x7, 0x40, 0x2, 0x9, 0x80000001, 0x10001, 0x2, 0x1f, 0x8001, 0x20, 0x10001, 0x2c, 0x7ff, 0x5, 0x70, 0xffffffffffffffff, 0x72, 0x7, 0x0, 0x7f, 0x63, 0x100, 0x6, 0x47, 0xfffffffffffffffa, 0x8001, 0x4, 0x9, 0x3, 0x6, 0x8, 0x0, 0x3, 0x3, 0x4, 0x43, 0x40000000000, 0x5, 0xffffffff, 0xff, 0xff, 0x81, 0x0, 0x84a, 0xffffffff, 0x9, 0x1, 0x0, 0x100000001, 0xd3, 0x7fff, 0xfffffffffffffff8, 0x69, 0x2, 0x1d12000, 0x1, 0x9, 0xfff, 0x40, 0x0, 0x1, 0xfffffffffffffffc, 0x4, 0x5, 0x100, 0x8, 0x2, 0x1, 0x100000001, 0xfffffffffffffffd, 0x7f, 0x10000, 0x7, 0x82, 0x7fffffff, 0x3, 0x8000, 0x80000001, 0x4, 0xfffffffffffffff9, 0x401, 0x28798c1d, 0x6, 0x0, 0x9, 0x4, 0x1, 0x4, 0x9, 0x1000, 0xdad8, 0x0, 0x100000001, 0x7ff, 0xf95, 0x8000, 0x0, 0x8ed, 0x40, 0x0, 0x7fff, 0x8001, 0x7f, 0x9, 0x1000, 0x5, 0x14651683, 0x1, 0x100000001, 0x0, 0x833d, 0x9, 0xff, 0x7], {0x77359400}}) setsockopt$inet6_int(r0, 0x29, 0x5b, &(0x7f0000000c40)=0x8001, 0x4) r3 = syz_open_dev$radio(&(0x7f0000000c80)='/dev/radio#\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000cc0)={0x0, 0x2c22e2d5, 0x8000, 0x1}, &(0x7f0000000d00)=0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000d40)={r4, @in6={{0xa, 0x4e22, 0x6, @mcast2, 0xff}}}, &(0x7f0000000e00)=0x84) ioctl$KDENABIO(r3, 0x4b36) mq_open(&(0x7f0000000e40)='\x00', 0x800, 0x100, &(0x7f0000000e80)={0x3ff, 0x3, 0x6d, 0x8, 0x80, 0x8000, 0x1, 0x8}) socket$inet6(0xa, 0x0, 0x8) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000ec0)='highspeed\x00', 0xa) mq_open(&(0x7f0000000f00)='-\x00', 0x2, 0x4, &(0x7f0000000f40)={0x5, 0x7, 0xfff, 0x1, 0x1f, 0x0, 0xfffffffffffffffd, 0x10000}) ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f0000000f80)={0x1, "9c8ce45fdd1566d0424a34435f8ada89dc6b045cb2ce3c589b23a5411a81bbb5", 0x3, 0x6, 0x4, 0xc00000, 0x4}) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000001000)=0x9a2) r5 = msgget$private(0x0, 0x100) msgrcv(r5, &(0x7f0000001040)={0x0, ""/145}, 0x95, 0x1, 0x1000) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000001100)=[@in={0x2, 0x4e21, @empty}, @in6={0xa, 0x4e20, 0x7, @local, 0x7}, @in6={0xa, 0x4e20, 0x8, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfd}, @in6={0xa, 0x4e20, 0x100, @empty, 0x401}, @in={0x2, 0x4e24, @empty}], 0x74) syz_open_dev$mouse(&(0x7f0000001180)='/dev/input/mouse#\x00', 0x3, 0x200) syzkaller login: [ 171.994401] IPVS: ftp: loaded support on port[0] = 21 19:37:04 executing program 1: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f0000000040)={0x9, {0x2, 0x0, 0x6c2, 0x8}}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x50000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f00000000c0)={0x200, 0x1, 0x1, 0x6b6, 0x3, 0x9}) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000140)=""/4096) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000001140)={0x6, 0x9}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000001180), 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000011c0)={0x0, @in6={{0xa, 0x4e21, 0x1, @rand_addr="3ee8c9211aaebcf13c1dcbbf0eec831f", 0x10001}}, 0x7ff, 0x9}, &(0x7f0000001280)=0x88) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000012c0)={r2, 0x100000001, 0x9, 0x3, 0x8, 0xfffffffffffffff8}, 0x14) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000001300)={0x0, 0x6, 0x4, 0x0, 0x0, [{r0, 0x0, 0x1}, {r1, 0x0, 0x2000}, {r1, 0x0, 0x7fff}, {r0, 0x0, 0x1}]}) ioctl$VIDIOC_G_FMT(r1, 0xc0cc5604, &(0x7f00000013c0)={0xc, @sdr={0x32344d59, 0x4921}}) ioctl$VIDIOC_G_FMT(r0, 0xc0cc5604, &(0x7f00000014c0)={0x0, @vbi={0x3, 0x2, 0x80, 0x357f565f, [0x1, 0x4], [0x8, 0x73], 0x108}}) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f00000015c0)=0xfffffffffffffff7) ioctl$SIOCGETLINKNAME(r1, 0x89e0, &(0x7f0000001600)={0x4, 0x1}) pivot_root(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)='./file0\x00') ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x163b, 0x81, 0x0, 0x9, 0x19, 0x19, "6b30b823e3a9de8037ba64e3274641fc73b0ca2a56e24e29616c5d809eb374b522104dcd8dda2d9c8df46c6e5aff39f5a52748cf5f59a5f908e1c3b5e5787550", "00087321014501fac88178a6d1a08ee78196082a9d6c985c497aa6e097a547d057bcbcc2840188a5805be2f06ba1a55c911b008950fdf68bf2deeda0858f9c96", "27ad9bf67c86cf981ae6ef867db42f7b221e1e5b069da0b80a93b96804583d8f", [0x9, 0x65af]}) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000001800)=""/97) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000018c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000001a00)={&(0x7f0000001880)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000019c0)={&(0x7f0000001900)={0x98, r4, 0x100, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffff7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xff}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x101}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000001}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x24004800}, 0x8001) clock_gettime(0x7, &(0x7f0000001a40)) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000001b80)={r0, r3, 0x2, 0xc2, &(0x7f0000001a80)="16ab0ffef8c47331c77b27e95b048152f7475b46836ed1cc6bfe0aa70ddcff7980ec4efc2ff02695f81ea77b9cc9200f9195c841c76f33e9e5bbab19d3e56b4135f1f1a576ba33e1b6d3a1a0238bf68a09952025ed027c8b009a1a43c788e2b639eae4433aa19c8076ed1522c6c731f94939387047bd6b378cbaf8936b45cc56b0dd8202b99fda4f0355e5d91c0593f8f5953690fd9f87a6a4299e90bed7c299c716dcef492308e593f71e155d26435edffe37529c222403686e7ba017b8716a0f56", 0x7, 0xff, 0xfffffffffffffffa, 0x5, 0x3, 0x1, 0x1, 'syz0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000001c80)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001c40)={0xffffffffffffffff}, 0x13f, 0xca272cf08329b58b}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000001cc0)={0xa, 0x4, 0xfa00, {r5}}, 0xc) ioctl$VIDIOC_DECODER_CMD(r1, 0xc0485660, &(0x7f0000001d00)={0x3, 0x1, @stop_pts=0x1}) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000001d80)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000001e00)={0x10, 0x30, 0xfa00, {&(0x7f0000001dc0), 0x3, {0xa, 0x4e20, 0xe0, @rand_addr="f7135a9217b0e0e0692c862ab7dae17f", 0x94c}, r5}}, 0x38) syz_open_dev$video(&(0x7f0000001e40)='/dev/video#\x00', 0x1, 0x40) signalfd4(r3, &(0x7f0000001e80)={0xffffffffffff0000}, 0x8, 0x800) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000001ec0)) [ 172.107834] chnl_net:caif_netlink_parms(): no params data found [ 172.206694] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.213794] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.236486] device bridge_slave_0 entered promiscuous mode [ 172.245072] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.245087] IPVS: ftp: loaded support on port[0] = 21 [ 172.251478] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.265306] device bridge_slave_1 entered promiscuous mode [ 172.309397] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 172.329136] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 172.377789] team0: Port device team_slave_0 added 19:37:05 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) mmap$perf(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x40110, r0, 0x5) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64IPIN\x00', &(0x7f0000000080)='{\x00', 0x2, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000000c0)) r1 = gettid() r2 = getuid() getresgid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)=0x0) r4 = getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000480)=0xe8) r7 = getegid() r8 = getpgrp(0x0) r9 = geteuid() r10 = getgid() sendmsg$unix(r0, &(0x7f0000000540)={&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000180)="c5b98e0cf2984ff6b3d4d93fbcbc0598000deb8530a3e8928718867592f66fc438f2be213e216bcaec4fcabe3d19aed26804378f49ea9ca42b0fa6f2ca68da17acebb346a8a037e8e0c6abf4b8e6dda2c1770ccdff1490896bdae3295b2e1c6dd655eca2935fb3ca4e", 0x69}, {&(0x7f0000000200)="3e85cb27b7cf10d848cb75ff2c5aefc0f78ec25ae353c7a5b54ea521ea7abe0a76fe3abdd1a21e1ee2a08c055e02967280bcd8b0e8b7444636a64293b1fdcef6ba76727957ebf7a32fc82269745d88a334d56a18472175e4012e34d55806f398dce69d9022970e34af9c902f8d955bbc96bc5cd5566dab64085c8edf6677c488", 0x80}], 0x2, &(0x7f00000004c0)=[@rights={0x18, 0x1, 0x1, [r0, r0, r0]}, @cred={0x18, 0x1, 0x2, r1, r2, r3}, @cred={0x18, 0x1, 0x2, r4, r6, r7}, @rights={0x18, 0x1, 0x1, [r0, r0, r0]}, @cred={0x18, 0x1, 0x2, r8, r9, r10}], 0x78, 0x4000}, 0x20004000) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000580), 0x10) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000005c0)={0x101ff, 0x1, 0xf000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000640)={0x0, &(0x7f0000000600)}) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000680), &(0x7f00000006c0)=0x8) r11 = syz_open_dev$admmidi(&(0x7f0000000700)='/dev/admmidi#\x00', 0x8, 0x40) rt_sigqueueinfo(r1, 0x39, &(0x7f0000000740)={0x24, 0x1, 0x9050}) fchmodat(r0, &(0x7f00000007c0)='./file0\x00', 0x84) getsockopt$IPT_SO_GET_INFO(r11, 0x0, 0x40, &(0x7f0000000800)={'nat\x00'}, &(0x7f0000000880)=0x54) sendmsg$can_bcm(r11, &(0x7f00000009c0)={&(0x7f00000008c0)={0x1d, r5}, 0x10, &(0x7f0000000980)={&(0x7f0000000900)={0x6, 0x804, 0x5f2000000000, {0x77359400}, {0x77359400}, {0x1, 0x1, 0x0, 0x5}, 0x1, @canfd={{0x1, 0xa5, 0x401, 0x6fa17e9e0000}, 0x37, 0x3, 0x0, 0x0, "0c0835b8137ac14c8288305f13fd121e462462bd5fc321f86598f1f80f994d5e9f528e56d3f5389e76ddece3b3a24419b8e01a6abf587b34b19b92259cea4cd9"}}, 0x6c}, 0x1, 0x0, 0x0, 0x40}, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000a40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000a00)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r11, &(0x7f0000000a80)={0xf, 0x8, 0xfa00, {r12, 0x6}}, 0x10) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000ac0)) ioctl$TIOCNXCL(r0, 0x540d) ptrace$setsig(0x4203, r1, 0x40, &(0x7f0000000b40)={0x3b, 0x1}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000001100)={0x8, &(0x7f0000000c40)=[{}, {}, {}, {}, {}, {}, {}, {}]}) [ 172.400633] team0: Port device team_slave_1 added [ 172.528510] device hsr_slave_0 entered promiscuous mode [ 172.533667] IPVS: ftp: loaded support on port[0] = 21 [ 172.564808] device hsr_slave_1 entered promiscuous mode 19:37:05 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) getsockname$netlink(r0, &(0x7f0000000040), &(0x7f0000000080)=0xc) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f00000000c0)) r1 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x0, 0x2) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000340)={0x0, 0x7f}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000003c0)={r2, 0x9, 0x7fffffff}, 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000400)="7a0b2e327bab15b043c04fb779697295", 0x10) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000440)=""/118) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000500)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800042}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x3c, r3, 0x600, 0x70bd29, 0x25dfdbfb, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x2f}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000c0}, 0x4000004) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000600)) statx(r0, &(0x7f0000000640)='./file0\x00', 0x800, 0x180, &(0x7f0000000680)) r4 = geteuid() lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000780)='/dev/loop0\x00', &(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='fuseblk\x00', 0xc18, &(0x7f0000000900)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x4}}, {@default_permissions='default_permissions'}, {@blksize={'blksize'}}, {@max_read={'max_read', 0x3d, 0x8}}, {@allow_other='allow_other'}], [{@fscontext={'fscontext', 0x3d, 'root'}}]}}) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/vsock\x00', 0x0, 0x0) rt_sigpending(&(0x7f0000000a80), 0x8) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/vsock\x00', 0x400000, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000b00)=0x4000, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000cc0)={r6, &(0x7f0000000b40)="aafd402c7ba2f761eef57f0ddcf475a128436f1244a0f81e6ce2a0a44f25cdb278a3a983e3b46e70a4a9daf45e4fea6c220bdac49e30f1f521e5b1e3238ce557cef319dbf0e7e3b703a3eff7abfc40761efe3a57f95bf32cb3c46e494792bdb894478a2593d6f36dde82eb57ab5419352c6a7ff3a2fb8f882f62e12921a72d01c920286344b30d43ccadfb447eca541d51a02e2fa6647ff6f50470b9384840e0c61aa61e3713ecdd443236b591e9bdedda1c4cf00ed6c4f8aa9380767c34fe2b221e986ef87c6cf906789a1688a836e6af17cd33aceb77a130e7f806e0ca3ed8a2f01e4891bfdfd540057b996199b1dfc6acd0e6acdf7e", &(0x7f0000000c40)=""/113}, 0x18) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000d00)={0x106000, 0x2000}) dup3(r6, r7, 0x80000) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000d40)) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) readlink(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)=""/60, 0x3c) ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f0000000e40)={0x56, "6aa3284c6063fc26948605982677525a69601e9281dc9d73103845d24d409020", 0x400, 0x9, 0xffffffff80000001, 0x10, 0x3}) socket$l2tp(0x18, 0x1, 0x1) syz_open_dev$radio(&(0x7f0000000ec0)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000f00)) [ 172.683066] chnl_net:caif_netlink_parms(): no params data found [ 172.792971] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.807403] IPVS: ftp: loaded support on port[0] = 21 [ 172.814432] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.821795] device bridge_slave_0 entered promiscuous mode [ 172.829193] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.835762] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.843083] device bridge_slave_1 entered promiscuous mode [ 172.870548] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 172.897483] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 172.907371] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.913827] bridge0: port 2(bridge_slave_1) entered forwarding state [ 172.920817] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.927209] bridge0: port 1(bridge_slave_0) entered forwarding state 19:37:05 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x800, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040)=0xa97b, 0x4) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e20, 0x8, @empty, 0x6}}, 0x9, 0x100, 0xfffffffffffffff8, 0x0, 0xffffffffffffff81}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e21, 0xe10, @mcast2, 0x4}}, 0x576, 0x8, 0x7fff, 0x3ff, 0xa0}, &(0x7f0000000240)=0x98) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x7) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000002c0), &(0x7f0000000300)=0x4) alarm(0x9) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000340)={0x8, 0x101, 0x0, {0x4822, 0x8000, 0x5, 0x5}}) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x80) r3 = request_key(&(0x7f0000000380)='encrypted\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='$nodevwlan0\'\x00', 0xffffffffffffffff) r4 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$search(0xa, r3, &(0x7f0000000440)='cifs.idmap\x00', &(0x7f0000000480)={'syz', 0x0}, r4) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000540)="dd30b76fd682ae1181dd437689eb905fcb4ae8248214d7c89bfb2e555c3b5e9defd6b3d8c7ade8eb7847f88eb35e408d3387ab23be8d088fce5a28b5aa21860801a069859de1f76e408040d1dc71", 0x4e) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f00000005c0)={@ipv4={[], [], @remote}, 0x0}, &(0x7f0000000600)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00', r5}) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000680)={0xfc, 0x40, 0x1, 0x9, 0xf, 0x28d, 0x2, 0x6, 0x81, 0xffffffffffffff3f}) clock_gettime(0x0, &(0x7f0000000700)={0x0, 0x0}) futimesat(r0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000740)={{0x0, 0x2710}, {r6, r7/1000+10000}}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000007c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000780), 0x2, 0xb}}, 0x20) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000800)='bbr\x00', 0x4) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000840)={r1, 0xfff, 0xa, [0x3ff, 0x9, 0x1, 0x0, 0x0, 0xfff, 0x9, 0xfffffffffffffeb3, 0xfffffffffffffff9, 0x1]}, &(0x7f0000000880)=0x1c) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000008c0), &(0x7f0000000900)=0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000940)=0x0) sched_setparam(r8, &(0x7f0000000980)=0x3) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000009c0)={r2, @in={{0x2, 0x4e22, @multicast1}}, 0x4, 0x8, 0x40, 0x8, 0x80}, 0x98) syz_genetlink_get_family_id$tipc(&(0x7f0000000a80)='TIPC\x00') getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000ac0)={r1, 0x2, 0x0, 0x9, 0x1, 0x1, 0x9, 0x9, {r2, @in={{0x2, 0x4e24, @multicast2}}, 0xfe65, 0x81, 0xfffffffffffffffd, 0x8000, 0x5}}, &(0x7f0000000b80)=0xb0) [ 172.999439] team0: Port device team_slave_0 added [ 173.019433] team0: Port device team_slave_1 added [ 173.184154] IPVS: ftp: loaded support on port[0] = 21 19:37:05 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x800, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000040)={0xffffffffffffffc1, 0x3ff, 0x2, 0x3, 0x9, [{0x3, 0x8, 0x46, 0x0, 0x0, 0x9dec55c0691d344b}, {0x4, 0x7ff, 0x3, 0x0, 0x0, 0x100}, {0x1, 0x6, 0x100000001, 0x0, 0x0, 0x2}, {0x3, 0xffffffffffffffe0, 0x4, 0x0, 0x0, 0x800}, {0x6, 0x3, 0xaa2e, 0x0, 0x0, 0xa}, {0xcf, 0x2, 0x5, 0x0, 0x0, 0x8}, {0x1, 0x0, 0x1000, 0x0, 0x0, 0x100}, {0x80000000, 0x1000, 0x0, 0x0, 0x0, 0x2000}, {0x7fffffff, 0x2, 0x0, 0x0, 0x0, 0x600}]}) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm-control\x00', 0x40001, 0x0) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000380)={0x1, 0x0, [{0x5, 0x0, 0xbc8}]}) ioctl(r1, 0x8000, &(0x7f00000003c0)="8ffd4d99b8260394bda8b7d91f59214b18f52551d8b79db4b558ab9d4b768411c3c025cd03dd9d1b46e8d676bf586efdd24f1e76fbfcbc6e4e66b06f5904500207fe945d8d92cf35172fed080ef96fa217e5fbb7de16a7aac570c7512b197f0a985088ec5f408239be2bc8f710b822b8d563d6e545e28d6a71f5e038ca81d896209b8082f6e8dad30786fc10141c6bc8123a") socket$inet6_udplite(0xa, 0x2, 0x88) r2 = syz_open_dev$dspn(&(0x7f0000000480)='/dev/dsp#\x00', 0x4, 0x1) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000004c0)={'nr0\x00', @link_local}) fcntl$setstatus(r2, 0x4, 0x40000) r3 = socket$inet6(0xa, 0x8000b, 0x6) ioctl$VIDIOC_S_FMT(r1, 0xc0cc5605, &(0x7f0000000500)={0xc, @sdr={0x32314d54, 0x6}}) ioctl$KVM_GET_DEVICE_ATTR(r2, 0x4018aee2, &(0x7f0000000640)={0x0, 0x2, 0x3, &(0x7f0000000600)=0x685}) unshare(0x40000000) openat$ion(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ion\x00', 0x200, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f00000006c0)={0x7b, 0x0, [0x3e8, 0x3, 0x4, 0x582d1643]}) ioctl$CAPI_NCCI_OPENCOUNT(r2, 0x80044326, &(0x7f0000000740)=0x877c) socketpair(0x3, 0x2, 0x101, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/self/attr/current\x00', 0x2, 0x0) lseek(r4, 0x58, 0x2) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000800), &(0x7f0000000840)=0xb) ioctl$sock_ifreq(r3, 0x89ff, &(0x7f00000008c0)={'dummy0\x00', @ifru_settings={0x8000, 0x7fff, @te1=&(0x7f0000000880)={0x0, 0x1, 0x7fffffff, 0x2}}}) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000940)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r2, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x200012}, 0xc, &(0x7f00000009c0)={&(0x7f0000000980)={0x1c, r5, 0x400, 0x70bd2c, 0x25dfdbfd, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x4004000) perf_event_open(&(0x7f0000000a80)={0x4, 0x70, 0x9, 0x7, 0x300000000, 0x1f, 0x0, 0x40, 0x0, 0x3, 0x40, 0x6, 0x3a5, 0x4, 0x4, 0x3bcd3d1d, 0x6, 0x7, 0xdd, 0xff, 0x8, 0x9, 0xc8, 0x5, 0x1f, 0x3, 0x7, 0x81, 0xffffffff, 0x2, 0x8, 0x7, 0x10000, 0xd064, 0x9, 0xfffffffffffffffc, 0x9, 0x5b, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000a40)}, 0x8001, 0x96, 0x80000001, 0x3, 0x1, 0x1, 0x2}, 0xffffffffffffffff, 0x9, r2, 0x2) listxattr(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)=""/205, 0xcd) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000c40)={0x10001}, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f0000000c80)={0x100000000, 'syz1\x00'}) r6 = getpgrp(0xffffffffffffffff) capset(&(0x7f0000000cc0)={0x0, r6}, &(0x7f0000000d00)={0x5, 0x9, 0xfff, 0xbd, 0xe7, 0xffffffffffff0001}) [ 173.286782] device hsr_slave_0 entered promiscuous mode [ 173.334639] device hsr_slave_1 entered promiscuous mode [ 173.342377] IPVS: ftp: loaded support on port[0] = 21 [ 173.377494] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.384887] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.429520] chnl_net:caif_netlink_parms(): no params data found [ 173.438133] chnl_net:caif_netlink_parms(): no params data found [ 173.493842] 8021q: adding VLAN 0 to HW filter on device bond0 [ 173.522934] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.529463] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.536774] device bridge_slave_0 entered promiscuous mode [ 173.553225] 8021q: adding VLAN 0 to HW filter on device team0 [ 173.579667] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.586475] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.593398] device bridge_slave_1 entered promiscuous mode [ 173.600107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 173.609677] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 173.650420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 173.658357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 173.666414] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.672754] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.679625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 173.687545] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 173.695199] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.701523] bridge0: port 2(bridge_slave_1) entered forwarding state [ 173.718948] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.725424] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.732409] device bridge_slave_0 entered promiscuous mode [ 173.739777] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.749107] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.756108] device bridge_slave_1 entered promiscuous mode [ 173.771380] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 173.780453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 173.788854] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 173.803626] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 173.814562] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 173.846863] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 173.855633] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 173.863578] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 173.871511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 173.879323] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 173.887187] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 173.894980] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 173.902615] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 173.910231] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 173.917729] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 173.924956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 173.937627] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 173.972639] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 174.029321] team0: Port device team_slave_0 added [ 174.035357] team0: Port device team_slave_1 added [ 174.085032] team0: Port device team_slave_0 added [ 174.093198] team0: Port device team_slave_1 added [ 174.100451] chnl_net:caif_netlink_parms(): no params data found [ 174.112868] 8021q: adding VLAN 0 to HW filter on device bond0 [ 174.145833] device hsr_slave_0 entered promiscuous mode [ 174.194668] device hsr_slave_1 entered promiscuous mode [ 174.247445] chnl_net:caif_netlink_parms(): no params data found [ 174.327494] device hsr_slave_0 entered promiscuous mode [ 174.365108] device hsr_slave_1 entered promiscuous mode [ 174.441834] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 174.476698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 174.483552] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 174.525940] 8021q: adding VLAN 0 to HW filter on device team0 [ 174.562082] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.568892] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.577785] device bridge_slave_0 entered promiscuous mode [ 174.585780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 174.596217] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 174.603731] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.610117] bridge0: port 1(bridge_slave_0) entered forwarding state [ 174.623901] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.631325] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.639197] device bridge_slave_0 entered promiscuous mode [ 174.649578] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.656525] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.663461] device bridge_slave_1 entered promiscuous mode [ 174.684511] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.692304] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.700736] device bridge_slave_1 entered promiscuous mode [ 174.720734] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 174.739612] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 174.747919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 174.756681] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.763082] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.781270] 8021q: adding VLAN 0 to HW filter on device bond0 [ 174.809273] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 174.826887] bond0: Enslaving bond_slave_1 as an active interface with an up link 19:37:07 executing program 0: r0 = socket$kcm(0x2, 0x200000000000006, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0xb, &(0x7f0000000740), 0x3) sendmsg(r1, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="a0", 0x1}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000500)=@hci, 0x80, 0x0}, 0x0) r2 = dup3(r0, r0, 0x80000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000180)={0x3, [0x0, 0x0, 0x0]}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000200)={r3, 0x5c, 0x5, 0x7, 0x7f, 0x401}, 0x14) r4 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x2, 0x400100) r5 = semget(0x1, 0x2, 0x245) semctl$SEM_INFO(r5, 0x7, 0x13, &(0x7f0000000780)=""/4096) connect$inet(r4, &(0x7f0000000140)={0x2, 0x4e22, @rand_addr=0xfffffffffffffffc}, 0x10) [ 174.855036] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 174.862936] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 174.872381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 174.929077] 8021q: adding VLAN 0 to HW filter on device team0 [ 174.938974] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 174.957262] 8021q: adding VLAN 0 to HW filter on device bond0 [ 174.963861] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 19:37:07 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x4, 0x40000) ioctl$TCSBRKP(r0, 0x5425, 0x9) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x1, 0x13f, 0x4, 0x3}, 0xfffffffffffffdf9) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r1, &(0x7f0000000080)="8bb69e73532c5f575f35c9115f209b6f8a49ad4a4ead8ad1b71bebb5b93bd4b08d0be037a421899ecf30b9fae94226253755028a895e826000096feded2bc9d6cb96006f54e97588c7959548b42a7400a2b16715d8ef184fe62ce7a861241e1e988308113a67cc3ed6f15450dbc09ac8aef0fcfc91a19d9d2ec07a9c5d1899fd07cfc085b175a4b13ac3a40556b1d8dc0aae713a8493f1df0a28154211d25d2ab5f060abb9b4c667d811a74aa7d35b16d3c804b79260b7a706fa32ca29cf42bf211d01580ef582771e91665e5e705daf3ad59bc4f4f9", &(0x7f0000000180)=""/192}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r1, &(0x7f00000002c0)="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"}, 0x10) [ 174.976435] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 174.984896] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 174.992628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 175.013750] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 19:37:07 executing program 0: clock_gettime(0x0, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x2) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) prctl$PR_SET_UNALIGN(0x6, 0x3) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000080), &(0x7f00000000c0)=0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x20, &(0x7f0000000140)=[@in={0x2, 0x4e23, @loopback=0xac14140b}, @in={0x2, 0x4e23, @local={0xac, 0xc0}}]}, &(0x7f00000001c0)=0x10) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x1, 0x0) ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000040)={0x7, 0xfffffffffffffffd, 0x1ff, 0x1, 0x5, 0x1ff}) [ 175.031057] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 175.039111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 175.053851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 175.061667] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 175.069566] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 175.080491] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 175.103576] team0: Port device team_slave_0 added [ 175.110545] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 175.132494] team0: Port device team_slave_0 added [ 175.139345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 175.147655] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 175.155449] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.161827] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.180228] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 175.207928] team0: Port device team_slave_1 added [ 175.230333] hrtimer: interrupt took 44131 ns [ 175.418235] device hsr_slave_0 entered promiscuous mode [ 175.445398] device hsr_slave_1 entered promiscuous mode [ 175.496021] team0: Port device team_slave_1 added [ 175.596348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 175.605193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 175.613096] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.619564] bridge0: port 2(bridge_slave_1) entered forwarding state [ 175.627873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 175.636332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 19:37:08 executing program 0: clock_gettime(0x0, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x2) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) prctl$PR_SET_UNALIGN(0x6, 0x3) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000080), &(0x7f00000000c0)=0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x20, &(0x7f0000000140)=[@in={0x2, 0x4e23, @loopback=0xac14140b}, @in={0x2, 0x4e23, @local={0xac, 0xc0}}]}, &(0x7f00000001c0)=0x10) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x1, 0x0) ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000040)={0x7, 0xfffffffffffffffd, 0x1ff, 0x1, 0x5, 0x1ff}) [ 175.645651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 175.653912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 175.670694] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 175.729633] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 175.763153] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 175.773649] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 175.789188] 8021q: adding VLAN 0 to HW filter on device team0 [ 175.797657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 175.805886] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 175.813137] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 175.821835] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 175.830431] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 175.838674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 175.847087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 175.856527] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 175.907269] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 175.927593] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 175.935933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 175.943987] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 175.952383] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.958849] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.967579] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 175.977658] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 175.985980] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.992394] bridge0: port 2(bridge_slave_1) entered forwarding state 19:37:08 executing program 0: clock_gettime(0x0, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x2) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) prctl$PR_SET_UNALIGN(0x6, 0x3) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000080), &(0x7f00000000c0)=0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x20, &(0x7f0000000140)=[@in={0x2, 0x4e23, @loopback=0xac14140b}, @in={0x2, 0x4e23, @local={0xac, 0xc0}}]}, &(0x7f00000001c0)=0x10) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x1, 0x0) ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000040)={0x7, 0xfffffffffffffffd, 0x1ff, 0x1, 0x5, 0x1ff}) [ 176.026840] device hsr_slave_0 entered promiscuous mode [ 176.075794] device hsr_slave_1 entered promiscuous mode 19:37:08 executing program 1: r0 = socket(0xa, 0x805, 0x0) bind$inet(r0, &(0x7f00000a9000)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x4) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x40, 0x0) ioctl$VIDIOC_G_EDID(r1, 0xc0245628, &(0x7f0000000180)={0x0, 0xd9e, 0xffffffff, [], &(0x7f0000000140)=0x7fff}) openat(r1, &(0x7f0000000100)='./file0\x00', 0x50000, 0x6) sendmsg$inet_sctp(r0, &(0x7f0000000080)={&(0x7f0000000040)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f00000016c0), 0x0, &(0x7f0000000100)}, 0x4000000) [ 176.341621] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 176.353252] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 19:37:09 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000adf000)={0x2, 0x0, @loopback}, 0x10) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x2a7) [ 176.400526] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 176.409601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 176.425421] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 176.443579] 8021q: adding VLAN 0 to HW filter on device bond0 19:37:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x800000000003e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) lsetxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)=[0x0], 0x0) [ 176.497903] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 176.507953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 176.523112] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 19:37:09 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x82800, 0x0) io_setup(0x800, &(0x7f00000006c0)=0x0) io_submit(r1, 0x1, &(0x7f00000008c0)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) r2 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x80000) getpeername(r2, &(0x7f00000000c0)=@l2, &(0x7f0000000140)=0x80) [ 176.577256] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 176.595509] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 176.603225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 176.629820] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 176.655615] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 176.676151] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 176.683225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 176.696742] 8021q: adding VLAN 0 to HW filter on device team0 [ 176.749881] [ 176.751559] ======================================================== [ 176.758059] WARNING: possible irq lock inversion dependency detected [ 176.764554] 5.0.0-rc6 #67 Not tainted [ 176.766650] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 176.768352] -------------------------------------------------------- [ 176.778109] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 176.784473] ksoftirqd/1/16 just changed the state of lock: [ 176.784480] 00000000fe8e69f1 (&(&ctx->ctx_lock)->rlock){..-.}, at: free_ioctx_users+0x2d/0x4a0 [ 176.784508] but this lock took another, SOFTIRQ-unsafe lock in the past: [ 176.784510] (&fiq->waitq){+.+.} [ 176.784517] [ 176.784517] [ 176.784517] and interrupts could create inverse lock ordering between them. [ 176.784517] [ 176.784520] [ 176.784520] other info that might help us debug this: [ 176.784523] Possible interrupt unsafe locking scenario: [ 176.784523] [ 176.784525] CPU0 CPU1 [ 176.784528] ---- ---- [ 176.784529] lock(&fiq->waitq); [ 176.784535] local_irq_disable(); [ 176.784537] lock(&(&ctx->ctx_lock)->rlock); [ 176.784542] lock(&fiq->waitq); [ 176.784547] [ 176.784549] lock(&(&ctx->ctx_lock)->rlock); [ 176.784555] [ 176.784555] *** DEADLOCK *** [ 176.784555] [ 176.784561] 2 locks held by ksoftirqd/1/16: [ 176.784564] #0: 000000005a96dd96 (rcu_callback){....}, at: rcu_process_callbacks+0xa0d/0x1390 [ 176.784591] #1: 0000000042290c8f (rcu_read_lock_sched){....}, at: percpu_ref_switch_to_atomic_rcu+0x1b8/0x520 [ 176.784620] [ 176.784620] the shortest dependencies between 2nd lock and 1st lock: [ 176.784627] -> (&fiq->waitq){+.+.} { [ 176.784638] HARDIRQ-ON-W at: [ 176.784653] lock_acquire+0x16f/0x3f0 [ 176.784664] _raw_spin_lock+0x2f/0x40 [ 176.784676] flush_bg_queue+0x1f3/0x3c0 [ 176.784689] fuse_request_queue_background+0x2d1/0x580 [ 176.784701] fuse_request_send_background+0x58/0x120 [ 176.784711] cuse_channel_open+0x5ba/0x830 [ 176.784726] misc_open+0x398/0x4c0 [ 176.807515] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 176.808715] chrdev_open+0x247/0x6b0 [ 176.808735] do_dentry_open+0x47d/0x1130 [ 176.815974] kobject: 'vlan0' (000000009bb0afb6): kobject_add_internal: parent: 'mesh', set: '' [ 176.818941] vfs_open+0xa0/0xd0 [ 176.818955] path_openat+0x10d7/0x4690 [ 176.818972] do_filp_open+0x1a1/0x280 [ 177.013231] do_sys_open+0x3fe/0x5d0 [ 177.018784] __ia32_compat_sys_openat+0x98/0xf0 [ 177.025296] do_fast_syscall_32+0x281/0xc98 [ 177.031450] entry_SYSENTER_compat+0x70/0x7f [ 177.037668] SOFTIRQ-ON-W at: [ 177.041025] lock_acquire+0x16f/0x3f0 [ 177.046656] _raw_spin_lock+0x2f/0x40 [ 177.052266] flush_bg_queue+0x1f3/0x3c0 [ 177.058088] fuse_request_queue_background+0x2d1/0x580 [ 177.065177] fuse_request_send_background+0x58/0x120 [ 177.072092] cuse_channel_open+0x5ba/0x830 [ 177.078152] misc_open+0x398/0x4c0 [ 177.083527] chrdev_open+0x247/0x6b0 [ 177.089098] do_dentry_open+0x47d/0x1130 [ 177.094987] vfs_open+0xa0/0xd0 [ 177.100096] path_openat+0x10d7/0x4690 [ 177.105795] do_filp_open+0x1a1/0x280 [ 177.111409] do_sys_open+0x3fe/0x5d0 [ 177.116932] __ia32_compat_sys_openat+0x98/0xf0 [ 177.123413] do_fast_syscall_32+0x281/0xc98 [ 177.129546] entry_SYSENTER_compat+0x70/0x7f [ 177.135789] INITIAL USE at: [ 177.139078] lock_acquire+0x16f/0x3f0 [ 177.144600] _raw_spin_lock+0x2f/0x40 [ 177.150141] flush_bg_queue+0x1f3/0x3c0 [ 177.155851] fuse_request_queue_background+0x2d1/0x580 [ 177.162861] fuse_request_send_background+0x58/0x120 [ 177.169688] cuse_channel_open+0x5ba/0x830 [ 177.175658] misc_open+0x398/0x4c0 [ 177.180933] chrdev_open+0x247/0x6b0 [ 177.186391] do_dentry_open+0x47d/0x1130 [ 177.192176] vfs_open+0xa0/0xd0 [ 177.197178] path_openat+0x10d7/0x4690 [ 177.202785] do_filp_open+0x1a1/0x280 [ 177.208308] do_sys_open+0x3fe/0x5d0 [ 177.213766] __ia32_compat_sys_openat+0x98/0xf0 [ 177.220158] do_fast_syscall_32+0x281/0xc98 [ 177.226207] entry_SYSENTER_compat+0x70/0x7f [ 177.232344] } [ 177.234227] ... key at: [] __key.43075+0x0/0x40 [ 177.241056] ... acquired at: [ 177.244258] _raw_spin_lock+0x2f/0x40 [ 177.248232] io_submit_one+0xedf/0x1cf0 [ 177.252364] __ia32_compat_sys_io_submit+0x1be/0x570 [ 177.257624] do_fast_syscall_32+0x281/0xc98 [ 177.262111] entry_SYSENTER_compat+0x70/0x7f [ 177.266681] [ 177.268292] -> (&(&ctx->ctx_lock)->rlock){..-.} { [ 177.273140] IN-SOFTIRQ-W at: [ 177.276422] lock_acquire+0x16f/0x3f0 [ 177.281855] _raw_spin_lock_irq+0x60/0x80 [ 177.287639] free_ioctx_users+0x2d/0x4a0 [ 177.293335] percpu_ref_switch_to_atomic_rcu+0x3e7/0x520 [ 177.300422] rcu_process_callbacks+0x928/0x1390 [ 177.306755] __do_softirq+0x266/0x95a [ 177.312205] run_ksoftirqd+0x8e/0x110 [ 177.317650] smpboot_thread_fn+0x6ab/0xa10 [ 177.323520] kthread+0x357/0x430 [ 177.328519] ret_from_fork+0x3a/0x50 [ 177.333857] INITIAL USE at: [ 177.337055] lock_acquire+0x16f/0x3f0 [ 177.342419] _raw_spin_lock_irq+0x60/0x80 [ 177.348115] io_submit_one+0xeb6/0x1cf0 [ 177.353635] __ia32_compat_sys_io_submit+0x1be/0x570 [ 177.360315] do_fast_syscall_32+0x281/0xc98 [ 177.366198] entry_SYSENTER_compat+0x70/0x7f [ 177.372159] } [ 177.373944] ... key at: [] __key.51970+0x0/0x40 [ 177.380689] ... acquired at: [ 177.383780] mark_lock+0x427/0x1380 [ 177.387565] __lock_acquire+0x128f/0x4700 [ 177.391868] lock_acquire+0x16f/0x3f0 [ 177.395830] _raw_spin_lock_irq+0x60/0x80 [ 177.400144] free_ioctx_users+0x2d/0x4a0 [ 177.404362] percpu_ref_switch_to_atomic_rcu+0x3e7/0x520 [ 177.410238] rcu_process_callbacks+0x928/0x1390 [ 177.415092] __do_softirq+0x266/0x95a [ 177.419065] run_ksoftirqd+0x8e/0x110 [ 177.423022] smpboot_thread_fn+0x6ab/0xa10 [ 177.427414] kthread+0x357/0x430 [ 177.430939] ret_from_fork+0x3a/0x50 [ 177.434803] [ 177.436415] [ 177.436415] stack backtrace: [ 177.440891] CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.0.0-rc6 #67 [ 177.447535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.456870] Call Trace: [ 177.459443] dump_stack+0x172/0x1f0 [ 177.463062] print_irq_inversion_bug.part.0+0x2c0/0x2cd [ 177.468417] check_usage_forwards.cold+0x20/0x29 [ 177.473170] ? check_usage_backwards+0x340/0x340 [ 177.477910] ? save_stack_trace+0x1a/0x20 [ 177.482056] ? save_trace+0xe0/0x290 [ 177.485752] mark_lock+0x427/0x1380 [ 177.489359] ? __lock_acquire+0x53b/0x4700 [ 177.493587] ? check_usage_backwards+0x340/0x340 [ 177.498326] __lock_acquire+0x128f/0x4700 [ 177.502458] ? mark_held_locks+0x100/0x100 [ 177.506679] ? mark_held_locks+0x100/0x100 [ 177.510898] ? __wake_up_common_lock+0xfe/0x190 [ 177.515561] ? mark_held_locks+0x100/0x100 [ 177.519787] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 177.524879] ? lockdep_hardirqs_on+0x19b/0x5d0 [ 177.529458] ? trace_hardirqs_on+0x67/0x230 [ 177.533770] ? kasan_check_read+0x11/0x20 [ 177.537911] lock_acquire+0x16f/0x3f0 [ 177.541697] ? free_ioctx_users+0x2d/0x4a0 [ 177.545914] _raw_spin_lock_irq+0x60/0x80 [ 177.550044] ? free_ioctx_users+0x2d/0x4a0 [ 177.554278] free_ioctx_users+0x2d/0x4a0 [ 177.558350] ? rcu_dynticks_curr_cpu_in_eqs+0x54/0xb0 [ 177.563539] percpu_ref_switch_to_atomic_rcu+0x3e7/0x520 [ 177.568984] ? percpu_ref_exit+0xd0/0xd0 [ 177.573031] rcu_process_callbacks+0x928/0x1390 [ 177.577688] ? rcu_check_gp_start_stall+0x240/0x240 [ 177.582689] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 177.588123] __do_softirq+0x266/0x95a [ 177.591904] ? pci_mmcfg_check_reserved+0x170/0x170 [ 177.596904] ? takeover_tasklets+0x7b0/0x7b0 [ 177.601297] run_ksoftirqd+0x8e/0x110 [ 177.605079] smpboot_thread_fn+0x6ab/0xa10 [ 177.609344] ? sort_range+0x30/0x30 [ 177.612980] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 177.618526] ? __kthread_parkme+0xfb/0x1b0 [ 177.622780] kthread+0x357/0x430 [ 177.626128] ? sort_range+0x30/0x30 [ 177.629738] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 177.635270] ret_from_fork+0x3a/0x50 [ 177.639704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 177.647495] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 177.655127] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.661473] bridge0: port 1(bridge_slave_0) entered forwarding state [ 177.668348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 177.676090] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 177.683627] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.689994] bridge0: port 2(bridge_slave_1) entered forwarding state [ 177.696813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 177.704744] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 177.712547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 177.720295] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 177.727885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 177.735653] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 177.743262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 177.750768] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 177.758390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 177.765930] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 177.780745] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 177.787803] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 177.796775] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 177.811570] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 177.820162] kobject: 'vlan0' (00000000c0484861): kobject_add_internal: parent: 'mesh', set: '' [ 177.832594] kobject: 'loop5' (00000000627b5503): kobject_uevent_env [ 177.839270] kobject: 'loop5' (00000000627b5503): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 177.850674] 8021q: adding VLAN 0 to HW filter on device bond0 [ 177.853241] IPVS: ftp: loaded support on port[0] = 21 [ 177.885336] kobject: 'loop2' (0000000052e77b2e): kobject_uevent_env [ 177.892456] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 177.909369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 177.915830] kobject: 'loop2' (0000000052e77b2e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 177.921449] kobject: 'lo' (000000003c6c0923): kobject_add_internal: parent: 'net', set: 'devices' [ 177.939640] kobject: 'lo' (000000003c6c0923): kobject_uevent_env [ 177.946147] kobject: 'lo' (000000003c6c0923): fill_kobj_path: path = '/devices/virtual/net/lo' [ 177.955040] kobject: 'queues' (0000000085a0888d): kobject_add_internal: parent: 'lo', set: '' [ 177.964295] kobject: 'queues' (0000000085a0888d): kobject_uevent_env [ 177.970809] kobject: 'queues' (0000000085a0888d): kobject_uevent_env: filter function caused the event to drop! [ 177.981313] kobject: 'rx-0' (000000007204dcaa): kobject_add_internal: parent: 'queues', set: 'queues' [ 177.990717] kobject: 'rx-0' (000000007204dcaa): kobject_uevent_env [ 177.997091] kobject: 'rx-0' (000000007204dcaa): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 178.007130] kobject: 'tx-0' (000000006fc5b7f8): kobject_add_internal: parent: 'queues', set: 'queues' [ 178.016678] kobject: 'tx-0' (000000006fc5b7f8): kobject_uevent_env [ 178.023011] kobject: 'tx-0' (000000006fc5b7f8): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 178.034478] kobject: 'tunl0' (00000000aad7792b): kobject_add_internal: parent: 'net', set: 'devices' [ 178.044803] kobject: 'tunl0' (00000000aad7792b): kobject_uevent_env [ 178.051240] kobject: 'tunl0' (00000000aad7792b): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 178.060677] kobject: 'queues' (00000000036a3c42): kobject_add_internal: parent: 'tunl0', set: '' [ 178.070209] kobject: 'queues' (00000000036a3c42): kobject_uevent_env [ 178.077006] kobject: 'queues' (00000000036a3c42): kobject_uevent_env: filter function caused the event to drop! [ 178.087467] kobject: 'rx-0' (000000004a93452b): kobject_add_internal: parent: 'queues', set: 'queues' [ 178.098797] kobject: 'rx-0' (000000004a93452b): kobject_uevent_env [ 178.105254] kobject: 'rx-0' (000000004a93452b): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 178.115714] kobject: 'tx-0' (000000006ffe28b8): kobject_add_internal: parent: 'queues', set: 'queues' [ 178.125331] kobject: 'tx-0' (000000006ffe28b8): kobject_uevent_env [ 178.131677] kobject: 'tx-0' (000000006ffe28b8): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 178.144614] 8021q: adding VLAN 0 to HW filter on device team0 [ 178.149017] kobject: 'loop3' (0000000091d3e11f): kobject_uevent_env [ 178.157386] kobject: 'gre0' (00000000f505fb85): kobject_add_internal: parent: 'net', set: 'devices' [ 178.168890] kobject: 'loop3' (0000000091d3e11f): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 178.170892] kobject: 'gre0' (00000000f505fb85): kobject_uevent_env [ 178.193096] kobject: 'gre0' (00000000f505fb85): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 178.202651] kobject: 'queues' (000000007a3cb97c): kobject_add_internal: parent: 'gre0', set: '' [ 178.212424] kobject: 'queues' (000000007a3cb97c): kobject_uevent_env [ 178.219171] kobject: 'queues' (000000007a3cb97c): kobject_uevent_env: filter function caused the event to drop! [ 178.229537] kobject: 'rx-0' (0000000043bc840d): kobject_add_internal: parent: 'queues', set: 'queues' 19:37:10 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) getsockname$netlink(r0, &(0x7f0000000040), &(0x7f0000000080)=0xc) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f00000000c0)) r1 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x0, 0x2) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000340)={0x0, 0x7f}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000003c0)={r2, 0x9, 0x7fffffff}, 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000400)="7a0b2e327bab15b043c04fb779697295", 0x10) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000440)=""/118) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000500)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800042}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x3c, r3, 0x600, 0x70bd29, 0x25dfdbfb, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x2f}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000c0}, 0x4000004) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000600)) statx(r0, &(0x7f0000000640)='./file0\x00', 0x800, 0x180, &(0x7f0000000680)) r4 = geteuid() lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000780)='/dev/loop0\x00', &(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='fuseblk\x00', 0xc18, &(0x7f0000000900)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x4}}, {@default_permissions='default_permissions'}, {@blksize={'blksize'}}, {@max_read={'max_read', 0x3d, 0x8}}, {@allow_other='allow_other'}], [{@fscontext={'fscontext', 0x3d, 'root'}}]}}) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/vsock\x00', 0x0, 0x0) rt_sigpending(&(0x7f0000000a80), 0x8) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/vsock\x00', 0x400000, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000b00)=0x4000, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000cc0)={r6, &(0x7f0000000b40)="aafd402c7ba2f761eef57f0ddcf475a128436f1244a0f81e6ce2a0a44f25cdb278a3a983e3b46e70a4a9daf45e4fea6c220bdac49e30f1f521e5b1e3238ce557cef319dbf0e7e3b703a3eff7abfc40761efe3a57f95bf32cb3c46e494792bdb894478a2593d6f36dde82eb57ab5419352c6a7ff3a2fb8f882f62e12921a72d01c920286344b30d43ccadfb447eca541d51a02e2fa6647ff6f50470b9384840e0c61aa61e3713ecdd443236b591e9bdedda1c4cf00ed6c4f8aa9380767c34fe2b221e986ef87c6cf906789a1688a836e6af17cd33aceb77a130e7f806e0ca3ed8a2f01e4891bfdfd540057b996199b1dfc6acd0e6acdf7e", &(0x7f0000000c40)=""/113}, 0x18) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000d00)={0x106000, 0x2000}) dup3(r6, r7, 0x80000) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000d40)) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) readlink(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)=""/60, 0x3c) ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f0000000e40)={0x56, "6aa3284c6063fc26948605982677525a69601e9281dc9d73103845d24d409020", 0x400, 0x9, 0xffffffff80000001, 0x10, 0x3}) socket$l2tp(0x18, 0x1, 0x1) syz_open_dev$radio(&(0x7f0000000ec0)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000f00)) [ 178.239120] kobject: 'rx-0' (0000000043bc840d): kobject_uevent_env [ 178.245566] kobject: 'rx-0' (0000000043bc840d): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 178.256037] kobject: 'tx-0' (0000000029c026a9): kobject_add_internal: parent: 'queues', set: 'queues' [ 178.259762] kobject: 'loop3' (0000000091d3e11f): kobject_uevent_env [ 178.265626] kobject: 'tx-0' (0000000029c026a9): kobject_uevent_env [ 178.265657] kobject: 'tx-0' (0000000029c026a9): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 178.266304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 178.275197] kobject: 'loop3' (0000000091d3e11f): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 178.279094] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 178.313272] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.319673] bridge0: port 1(bridge_slave_0) entered forwarding state [ 178.334400] kobject: 'gretap0' (000000002f0cccb7): kobject_add_internal: parent: 'net', set: 'devices' [ 178.342522] kobject: 'loop3' (0000000091d3e11f): kobject_uevent_env [ 178.344934] kobject: 'gretap0' (000000002f0cccb7): kobject_uevent_env [ 178.353943] kobject: 'loop3' (0000000091d3e11f): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 178.357106] kobject: 'gretap0' (000000002f0cccb7): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 178.357206] kobject: 'queues' (00000000c2f01ec5): kobject_add_internal: parent: 'gretap0', set: '' [ 178.357232] kobject: 'queues' (00000000c2f01ec5): kobject_uevent_env [ 178.357241] kobject: 'queues' (00000000c2f01ec5): kobject_uevent_env: filter function caused the event to drop! [ 178.357266] kobject: 'rx-0' (000000008993e958): kobject_add_internal: parent: 'queues', set: 'queues' [ 178.357335] kobject: 'rx-0' (000000008993e958): kobject_uevent_env [ 178.357382] kobject: 'rx-0' (000000008993e958): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 178.357459] kobject: 'tx-0' (00000000a645831f): kobject_add_internal: parent: 'queues', set: 'queues' [ 178.357621] kobject: 'tx-0' (00000000a645831f): kobject_uevent_env [ 178.445370] kobject: 'tx-0' (00000000a645831f): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 178.456619] kobject: 'batman_adv' (00000000aa025428): kobject_add_internal: parent: 'gretap0', set: '' [ 178.466995] kobject: 'erspan0' (00000000b532d5ba): kobject_add_internal: parent: 'net', set: 'devices' [ 178.477313] kobject: 'erspan0' (00000000b532d5ba): kobject_uevent_env [ 178.483924] kobject: 'erspan0' (00000000b532d5ba): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 178.493698] kobject: 'queues' (0000000043b6277b): kobject_add_internal: parent: 'erspan0', set: '' [ 178.503399] kobject: 'queues' (0000000043b6277b): kobject_uevent_env [ 178.509942] kobject: 'queues' (0000000043b6277b): kobject_uevent_env: filter function caused the event to drop! [ 178.520621] kobject: 'rx-0' (00000000bb3d4590): kobject_add_internal: parent: 'queues', set: 'queues' [ 178.530106] kobject: 'rx-0' (00000000bb3d4590): kobject_uevent_env [ 178.536522] kobject: 'rx-0' (00000000bb3d4590): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 178.547070] kobject: 'tx-0' (00000000cdd25fe3): kobject_add_internal: parent: 'queues', set: 'queues' [ 178.556659] kobject: 'tx-0' (00000000cdd25fe3): kobject_uevent_env [ 178.563033] kobject: 'tx-0' (00000000cdd25fe3): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 178.574327] kobject: 'batman_adv' (000000007de7c455): kobject_add_internal: parent: 'erspan0', set: '' [ 178.585087] kobject: 'ip_vti0' (00000000d2171506): kobject_add_internal: parent: 'net', set: 'devices' [ 178.595257] kobject: 'ip_vti0' (00000000d2171506): kobject_uevent_env [ 178.601878] kobject: 'ip_vti0' (00000000d2171506): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 178.611613] kobject: 'queues' (0000000001626f7d): kobject_add_internal: parent: 'ip_vti0', set: '' [ 178.621300] kobject: 'queues' (0000000001626f7d): kobject_uevent_env [ 178.627817] kobject: 'queues' (0000000001626f7d): kobject_uevent_env: filter function caused the event to drop! [ 178.638074] kobject: 'rx-0' (0000000094a6f4e4): kobject_add_internal: parent: 'queues', set: 'queues' [ 178.647519] kobject: 'rx-0' (0000000094a6f4e4): kobject_uevent_env [ 178.653896] kobject: 'rx-0' (0000000094a6f4e4): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 178.654739] IPVS: ftp: loaded support on port[0] = 21 [ 178.664407] kobject: 'tx-0' (000000004910dc80): kobject_add_internal: parent: 'queues', set: 'queues' [ 178.679337] kobject: 'tx-0' (000000004910dc80): kobject_uevent_env [ 178.685730] kobject: 'tx-0' (000000004910dc80): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 178.697898] kobject: 'ip6_vti0' (00000000abe2fff4): kobject_add_internal: parent: 'net', set: 'devices' [ 178.708103] kobject: 'ip6_vti0' (00000000abe2fff4): kobject_uevent_env [ 178.714856] kobject: 'ip6_vti0' (00000000abe2fff4): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0' [ 178.724779] kobject: 'queues' (000000005116a4fd): kobject_add_internal: parent: 'ip6_vti0', set: '' [ 178.734564] kobject: 'queues' (000000005116a4fd): kobject_uevent_env [ 178.741051] kobject: 'queues' (000000005116a4fd): kobject_uevent_env: filter function caused the event to drop! [ 178.751803] kobject: 'rx-0' (0000000082339923): kobject_add_internal: parent: 'queues', set: 'queues' [ 178.761481] kobject: 'rx-0' (0000000082339923): kobject_uevent_env [ 178.767894] kobject: 'rx-0' (0000000082339923): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/rx-0' [ 178.778448] kobject: 'tx-0' (0000000032864d38): kobject_add_internal: parent: 'queues', set: 'queues' [ 178.788057] kobject: 'tx-0' (0000000032864d38): kobject_uevent_env [ 178.794465] kobject: 'tx-0' (0000000032864d38): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/tx-0' [ 178.805905] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 178.812919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 178.820729] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 178.828225] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.834601] bridge0: port 2(bridge_slave_1) entered forwarding state [ 178.842109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 178.849812] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 178.857430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 178.865197] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 178.872678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 178.880322] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 178.887962] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 178.948775] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 178.958720] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 178.970162] kobject: 'rx-0' (0000000082339923): kobject_cleanup, parent 000000005116a4fd [ 178.981619] kobject: 'rx-0' (0000000082339923): auto cleanup 'remove' event [ 178.989030] kobject: 'rx-0' (0000000082339923): kobject_uevent_env [ 178.998922] kobject: 'rx-0' (0000000082339923): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/rx-0' [ 179.009862] kobject: 'rx-0' (0000000082339923): auto cleanup kobject_del [ 179.019485] kobject: 'rx-0' (0000000082339923): calling ktype release [ 179.026327] kobject: 'rx-0': free name [ 179.030319] kobject: 'tx-0' (0000000032864d38): kobject_cleanup, parent 000000005116a4fd [ 179.041185] kobject: 'tx-0' (0000000032864d38): auto cleanup 'remove' event [ 179.048536] kobject: 'tx-0' (0000000032864d38): kobject_uevent_env [ 179.057646] kobject: 'tx-0' (0000000032864d38): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/tx-0' [ 179.068497] kobject: 'tx-0' (0000000032864d38): auto cleanup kobject_del [ 179.078061] kobject: 'tx-0' (0000000032864d38): calling ktype release [ 179.084849] kobject: 'tx-0': free name [ 179.088813] kobject: 'queues' (000000005116a4fd): kobject_cleanup, parent (null) [ 179.099791] kobject: 'queues' (000000005116a4fd): calling ktype release [ 179.106796] kobject: 'queues' (000000005116a4fd): kset_release [ 179.112823] kobject: 'queues': free name [ 179.119993] kobject: 'ip6_vti0' (00000000abe2fff4): kobject_uevent_env [ 179.127362] kobject: 'ip6_vti0' (00000000abe2fff4): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0' [ 179.140526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 179.148201] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 179.156059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 179.163523] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 179.180797] kobject: 'ip6_vti0' (00000000abe2fff4): kobject_cleanup, parent (null) [ 179.182621] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 179.198000] kobject: 'vlan0' (00000000464c274d): kobject_add_internal: parent: 'mesh', set: '' [ 179.198835] kobject: 'ip6_vti0' (00000000abe2fff4): calling ktype release [ 179.217245] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 179.223851] kobject: 'ip6_vti0': free name [ 179.229063] kobject: 'rx-0' (0000000094a6f4e4): kobject_cleanup, parent 0000000001626f7d [ 179.237882] kobject: 'rx-0' (0000000094a6f4e4): auto cleanup 'remove' event [ 179.246614] kobject: 'rx-0' (0000000094a6f4e4): kobject_uevent_env [ 179.253070] kobject: 'rx-0' (0000000094a6f4e4): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 179.264037] kobject: 'rx-0' (0000000094a6f4e4): auto cleanup kobject_del [ 179.271860] kobject: 'rx-0' (0000000094a6f4e4): calling ktype release [ 179.278839] kobject: 'rx-0': free name [ 179.282855] kobject: 'tx-0' (000000004910dc80): kobject_cleanup, parent 0000000001626f7d [ 179.291194] kobject: 'tx-0' (000000004910dc80): auto cleanup 'remove' event [ 179.298390] kobject: 'tx-0' (000000004910dc80): kobject_uevent_env [ 179.304834] kobject: 'tx-0' (000000004910dc80): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 179.315543] kobject: 'tx-0' (000000004910dc80): auto cleanup kobject_del [ 179.322433] kobject: 'tx-0' (000000004910dc80): calling ktype release [ 179.329081] kobject: 'tx-0': free name [ 179.332983] kobject: 'queues' (0000000001626f7d): kobject_cleanup, parent (null) [ 179.341417] kobject: 'queues' (0000000001626f7d): calling ktype release [ 179.348195] kobject: 'queues' (0000000001626f7d): kset_release [ 179.354159] kobject: 'queues': free name [ 179.358498] kobject: 'ip_vti0' (00000000d2171506): kobject_uevent_env [ 179.365110] kobject: 'ip_vti0' (00000000d2171506): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 179.404317] kobject: 'ip_vti0' (00000000d2171506): kobject_cleanup, parent (null) [ 179.413512] kobject: 'loop4' (00000000b9a48136): kobject_uevent_env [ 179.424131] kobject: 'loop4' (00000000b9a48136): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 179.432594] kobject: 'ip_vti0' (00000000d2171506): calling ktype release [ 179.441651] kobject: 'ip_vti0': free name 19:37:12 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x800, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040)=0xa97b, 0x4) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e20, 0x8, @empty, 0x6}}, 0x9, 0x100, 0xfffffffffffffff8, 0x0, 0xffffffffffffff81}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e21, 0xe10, @mcast2, 0x4}}, 0x576, 0x8, 0x7fff, 0x3ff, 0xa0}, &(0x7f0000000240)=0x98) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x7) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000002c0), &(0x7f0000000300)=0x4) alarm(0x9) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000340)={0x8, 0x101, 0x0, {0x4822, 0x8000, 0x5, 0x5}}) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x80) r3 = request_key(&(0x7f0000000380)='encrypted\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='$nodevwlan0\'\x00', 0xffffffffffffffff) r4 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$search(0xa, r3, &(0x7f0000000440)='cifs.idmap\x00', &(0x7f0000000480)={'syz', 0x0}, r4) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000540)="dd30b76fd682ae1181dd437689eb905fcb4ae8248214d7c89bfb2e555c3b5e9defd6b3d8c7ade8eb7847f88eb35e408d3387ab23be8d088fce5a28b5aa21860801a069859de1f76e408040d1dc71", 0x4e) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f00000005c0)={@ipv4={[], [], @remote}, 0x0}, &(0x7f0000000600)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00', r5}) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000680)={0xfc, 0x40, 0x1, 0x9, 0xf, 0x28d, 0x2, 0x6, 0x81, 0xffffffffffffff3f}) clock_gettime(0x0, &(0x7f0000000700)={0x0, 0x0}) futimesat(r0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000740)={{0x0, 0x2710}, {r6, r7/1000+10000}}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000007c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000780), 0x2, 0xb}}, 0x20) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000800)='bbr\x00', 0x4) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000840)={r1, 0xfff, 0xa, [0x3ff, 0x9, 0x1, 0x0, 0x0, 0xfff, 0x9, 0xfffffffffffffeb3, 0xfffffffffffffff9, 0x1]}, &(0x7f0000000880)=0x1c) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000008c0), &(0x7f0000000900)=0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000940)=0x0) sched_setparam(r8, &(0x7f0000000980)=0x3) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000009c0)={r2, @in={{0x2, 0x4e22, @multicast1}}, 0x4, 0x8, 0x40, 0x8, 0x80}, 0x98) syz_genetlink_get_family_id$tipc(&(0x7f0000000a80)='TIPC\x00') getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000ac0)={r1, 0x2, 0x0, 0x9, 0x1, 0x1, 0x9, 0x9, {r2, @in={{0x2, 0x4e24, @multicast2}}, 0xfe65, 0x81, 0xfffffffffffffffd, 0x8000, 0x5}}, &(0x7f0000000b80)=0xb0) [ 179.450477] kobject: 'batman_adv' (000000007de7c455): kobject_uevent_env [ 179.457630] kobject: 'batman_adv' (000000007de7c455): kobject_uevent_env: filter function caused the event to drop! [ 179.472917] kobject: 'loop4' (00000000b9a48136): kobject_uevent_env [ 179.478578] kobject: 'batman_adv' (000000007de7c455): kobject_cleanup, parent (null) [ 179.486205] kobject: 'loop4' (00000000b9a48136): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 179.491063] kobject: 'batman_adv' (000000007de7c455): calling ktype release [ 179.522354] kobject: (000000007de7c455): dynamic_kobj_release [ 179.535112] kobject: 'batman_adv': free name [ 179.539704] kobject: 'rx-0' (00000000bb3d4590): kobject_cleanup, parent 0000000043b6277b [ 179.548160] kobject: 'rx-0' (00000000bb3d4590): auto cleanup 'remove' event [ 179.555383] kobject: 'rx-0' (00000000bb3d4590): kobject_uevent_env [ 179.561717] kobject: 'rx-0' (00000000bb3d4590): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 179.572473] kobject: 'rx-0' (00000000bb3d4590): auto cleanup kobject_del [ 179.579445] kobject: 'rx-0' (00000000bb3d4590): calling ktype release [ 179.586274] kobject: 'rx-0': free name [ 179.590253] kobject: 'tx-0' (00000000cdd25fe3): kobject_cleanup, parent 0000000043b6277b [ 179.598635] kobject: 'tx-0' (00000000cdd25fe3): auto cleanup 'remove' event [ 179.605911] kobject: 'tx-0' (00000000cdd25fe3): kobject_uevent_env [ 179.612242] kobject: 'tx-0' (00000000cdd25fe3): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 179.622746] kobject: 'tx-0' (00000000cdd25fe3): auto cleanup kobject_del [ 179.629653] kobject: 'tx-0' (00000000cdd25fe3): calling ktype release [ 179.636361] kobject: 'tx-0': free name [ 179.640259] kobject: 'queues' (0000000043b6277b): kobject_cleanup, parent (null) [ 179.648743] kobject: 'queues' (0000000043b6277b): calling ktype release [ 179.655582] kobject: 'queues' (0000000043b6277b): kset_release [ 179.661571] kobject: 'queues': free name [ 179.665983] kobject: 'erspan0' (00000000b532d5ba): kobject_uevent_env [ 179.672596] kobject: 'erspan0' (00000000b532d5ba): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 179.714658] kobject: 'erspan0' (00000000b532d5ba): kobject_cleanup, parent (null) [ 179.723158] kobject: 'erspan0' (00000000b532d5ba): calling ktype release [ 179.732008] kobject: 'erspan0': free name [ 179.737451] kobject: 'batman_adv' (00000000aa025428): kobject_uevent_env [ 179.744610] kobject: 'batman_adv' (00000000aa025428): kobject_uevent_env: filter function caused the event to drop! [ 179.755625] kobject: 'batman_adv' (00000000aa025428): kobject_cleanup, parent (null) [ 179.764436] kobject: 'batman_adv' (00000000aa025428): calling ktype release [ 179.771539] kobject: (00000000aa025428): dynamic_kobj_release [ 179.777514] kobject: 'batman_adv': free name [ 179.782069] kobject: 'rx-0' (000000008993e958): kobject_cleanup, parent 00000000c2f01ec5 [ 179.790359] kobject: 'rx-0' (000000008993e958): auto cleanup 'remove' event [ 179.797533] kobject: 'rx-0' (000000008993e958): kobject_uevent_env [ 179.803872] kobject: 'rx-0' (000000008993e958): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 179.814400] kobject: 'rx-0' (000000008993e958): auto cleanup kobject_del [ 179.821255] kobject: 'rx-0' (000000008993e958): calling ktype release [ 179.828085] kobject: 'rx-0': free name [ 179.832002] kobject: 'tx-0' (00000000a645831f): kobject_cleanup, parent 00000000c2f01ec5 [ 179.840259] kobject: 'tx-0' (00000000a645831f): auto cleanup 'remove' event [ 179.847474] kobject: 'tx-0' (00000000a645831f): kobject_uevent_env [ 179.853809] kobject: 'tx-0' (00000000a645831f): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 179.864699] kobject: 'tx-0' (00000000a645831f): auto cleanup kobject_del [ 179.871578] kobject: 'tx-0' (00000000a645831f): calling ktype release [ 179.878398] kobject: 'tx-0': free name [ 179.882316] kobject: 'queues' (00000000c2f01ec5): kobject_cleanup, parent (null) [ 179.890783] kobject: 'queues' (00000000c2f01ec5): calling ktype release [ 179.897751] kobject: 'queues' (00000000c2f01ec5): kset_release [ 179.903713] kobject: 'queues': free name [ 179.908130] kobject: 'gretap0' (000000002f0cccb7): kobject_uevent_env [ 179.914860] kobject: 'gretap0' (000000002f0cccb7): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 179.974399] kobject: 'gretap0' (000000002f0cccb7): kobject_cleanup, parent (null) [ 179.982953] kobject: 'gretap0' (000000002f0cccb7): calling ktype release [ 179.990207] kobject: 'gretap0': free name [ 179.995234] kobject: 'rx-0' (0000000043bc840d): kobject_cleanup, parent 000000007a3cb97c [ 180.003458] kobject: 'rx-0' (0000000043bc840d): auto cleanup 'remove' event [ 180.010657] kobject: 'rx-0' (0000000043bc840d): kobject_uevent_env [ 180.017084] kobject: 'rx-0' (0000000043bc840d): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 180.027313] kobject: 'rx-0' (0000000043bc840d): auto cleanup kobject_del [ 180.034155] kobject: 'rx-0' (0000000043bc840d): calling ktype release [ 180.041369] kobject: 'rx-0': free name [ 180.045365] kobject: 'tx-0' (0000000029c026a9): kobject_cleanup, parent 000000007a3cb97c [ 180.053594] kobject: 'tx-0' (0000000029c026a9): auto cleanup 'remove' event [ 180.060797] kobject: 'tx-0' (0000000029c026a9): kobject_uevent_env [ 180.067275] kobject: 'tx-0' (0000000029c026a9): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 180.077523] kobject: 'tx-0' (0000000029c026a9): auto cleanup kobject_del [ 180.084427] kobject: 'tx-0' (0000000029c026a9): calling ktype release [ 180.091012] kobject: 'tx-0': free name [ 180.094947] kobject: 'queues' (000000007a3cb97c): kobject_cleanup, parent (null) [ 180.103351] kobject: 'queues' (000000007a3cb97c): calling ktype release [ 180.110134] kobject: 'queues' (000000007a3cb97c): kset_release [ 180.116654] kobject: 'queues': free name [ 180.120925] kobject: 'gre0' (00000000f505fb85): kobject_uevent_env [ 180.127316] kobject: 'gre0' (00000000f505fb85): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 180.174410] kobject: 'gre0' (00000000f505fb85): kobject_cleanup, parent (null) [ 180.182685] kobject: 'gre0' (00000000f505fb85): calling ktype release [ 180.189517] kobject: 'gre0': free name [ 180.193981] kobject: 'rx-0' (000000004a93452b): kobject_cleanup, parent 00000000036a3c42 [ 180.204120] kobject: 'rx-0' (000000004a93452b): auto cleanup 'remove' event [ 180.211441] kobject: 'rx-0' (000000004a93452b): kobject_uevent_env [ 180.217913] kobject: 'rx-0' (000000004a93452b): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 180.228267] kobject: 'rx-0' (000000004a93452b): auto cleanup kobject_del [ 180.235362] kobject: 'rx-0' (000000004a93452b): calling ktype release [ 180.241933] kobject: 'rx-0': free name [ 180.246130] kobject: 'tx-0' (000000006ffe28b8): kobject_cleanup, parent 00000000036a3c42 [ 180.254376] kobject: 'tx-0' (000000006ffe28b8): auto cleanup 'remove' event [ 180.261456] kobject: 'tx-0' (000000006ffe28b8): kobject_uevent_env [ 180.267833] kobject: 'tx-0' (000000006ffe28b8): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 180.278397] kobject: 'tx-0' (000000006ffe28b8): auto cleanup kobject_del [ 180.285348] kobject: 'tx-0' (000000006ffe28b8): calling ktype release [ 180.291918] kobject: 'tx-0': free name [ 180.295838] kobject: 'queues' (00000000036a3c42): kobject_cleanup, parent (null) [ 180.304274] kobject: 'queues' (00000000036a3c42): calling ktype release [ 180.311025] kobject: 'queues' (00000000036a3c42): kset_release [ 180.317007] kobject: 'queues': free name [ 180.321264] kobject: 'tunl0' (00000000aad7792b): kobject_uevent_env [ 180.327761] kobject: 'tunl0' (00000000aad7792b): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 180.404970] kobject: 'tunl0' (00000000aad7792b): kobject_cleanup, parent (null) [ 180.413364] kobject: 'tunl0' (00000000aad7792b): calling ktype release [ 180.420110] kobject: 'tunl0': free name [ 180.425346] kobject: 'rx-0' (000000007204dcaa): kobject_cleanup, parent 0000000085a0888d [ 180.433577] kobject: 'rx-0' (000000007204dcaa): auto cleanup 'remove' event [ 180.441785] kobject: 'rx-0' (000000007204dcaa): kobject_uevent_env [ 180.448187] kobject: 'rx-0' (000000007204dcaa): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 180.458239] kobject: 'rx-0' (000000007204dcaa): auto cleanup kobject_del [ 180.465151] kobject: 'rx-0' (000000007204dcaa): calling ktype release [ 180.471724] kobject: 'rx-0': free name [ 180.475676] kobject: 'tx-0' (000000006fc5b7f8): kobject_cleanup, parent 0000000085a0888d [ 180.483908] kobject: 'tx-0' (000000006fc5b7f8): auto cleanup 'remove' event [ 180.491055] kobject: 'tx-0' (000000006fc5b7f8): kobject_uevent_env [ 180.497434] kobject: 'tx-0' (000000006fc5b7f8): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 180.507742] kobject: 'tx-0' (000000006fc5b7f8): auto cleanup kobject_del [ 180.515151] kobject: 'tx-0' (000000006fc5b7f8): calling ktype release [ 180.521726] kobject: 'tx-0': free name [ 180.525881] kobject: 'queues' (0000000085a0888d): kobject_cleanup, parent (null) [ 180.534584] kobject: 'queues' (0000000085a0888d): calling ktype release [ 180.541325] kobject: 'queues' (0000000085a0888d): kset_release [ 180.547339] kobject: 'queues': free name [ 180.551596] kobject: 'lo' (000000003c6c0923): kobject_uevent_env [ 180.557792] kobject: 'lo' (000000003c6c0923): fill_kobj_path: path = '/devices/virtual/net/lo' [ 180.604377] kobject: 'lo' (000000003c6c0923): kobject_cleanup, parent (null) [ 180.612522] kobject: 'lo' (000000003c6c0923): calling ktype release [ 180.619276] kobject: 'lo': free name 19:37:13 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x800, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000040)={0xffffffffffffffc1, 0x3ff, 0x2, 0x3, 0x9, [{0x3, 0x8, 0x46, 0x0, 0x0, 0x9dec55c0691d344b}, {0x4, 0x7ff, 0x3, 0x0, 0x0, 0x100}, {0x1, 0x6, 0x100000001, 0x0, 0x0, 0x2}, {0x3, 0xffffffffffffffe0, 0x4, 0x0, 0x0, 0x800}, {0x6, 0x3, 0xaa2e, 0x0, 0x0, 0xa}, {0xcf, 0x2, 0x5, 0x0, 0x0, 0x8}, {0x1, 0x0, 0x1000, 0x0, 0x0, 0x100}, {0x80000000, 0x1000, 0x0, 0x0, 0x0, 0x2000}, {0x7fffffff, 0x2, 0x0, 0x0, 0x0, 0x600}]}) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm-control\x00', 0x40001, 0x0) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000380)={0x1, 0x0, [{0x5, 0x0, 0xbc8}]}) ioctl(r1, 0x8000, &(0x7f00000003c0)="8ffd4d99b8260394bda8b7d91f59214b18f52551d8b79db4b558ab9d4b768411c3c025cd03dd9d1b46e8d676bf586efdd24f1e76fbfcbc6e4e66b06f5904500207fe945d8d92cf35172fed080ef96fa217e5fbb7de16a7aac570c7512b197f0a985088ec5f408239be2bc8f710b822b8d563d6e545e28d6a71f5e038ca81d896209b8082f6e8dad30786fc10141c6bc8123a") socket$inet6_udplite(0xa, 0x2, 0x88) r2 = syz_open_dev$dspn(&(0x7f0000000480)='/dev/dsp#\x00', 0x4, 0x1) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000004c0)={'nr0\x00', @link_local}) fcntl$setstatus(r2, 0x4, 0x40000) r3 = socket$inet6(0xa, 0x8000b, 0x6) ioctl$VIDIOC_S_FMT(r1, 0xc0cc5605, &(0x7f0000000500)={0xc, @sdr={0x32314d54, 0x6}}) ioctl$KVM_GET_DEVICE_ATTR(r2, 0x4018aee2, &(0x7f0000000640)={0x0, 0x2, 0x3, &(0x7f0000000600)=0x685}) unshare(0x40000000) openat$ion(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ion\x00', 0x200, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f00000006c0)={0x7b, 0x0, [0x3e8, 0x3, 0x4, 0x582d1643]}) ioctl$CAPI_NCCI_OPENCOUNT(r2, 0x80044326, &(0x7f0000000740)=0x877c) socketpair(0x3, 0x2, 0x101, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/self/attr/current\x00', 0x2, 0x0) lseek(r4, 0x58, 0x2) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000800), &(0x7f0000000840)=0xb) ioctl$sock_ifreq(r3, 0x89ff, &(0x7f00000008c0)={'dummy0\x00', @ifru_settings={0x8000, 0x7fff, @te1=&(0x7f0000000880)={0x0, 0x1, 0x7fffffff, 0x2}}}) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000940)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r2, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x200012}, 0xc, &(0x7f00000009c0)={&(0x7f0000000980)={0x1c, r5, 0x400, 0x70bd2c, 0x25dfdbfd, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x4004000) perf_event_open(&(0x7f0000000a80)={0x4, 0x70, 0x9, 0x7, 0x300000000, 0x1f, 0x0, 0x40, 0x0, 0x3, 0x40, 0x6, 0x3a5, 0x4, 0x4, 0x3bcd3d1d, 0x6, 0x7, 0xdd, 0xff, 0x8, 0x9, 0xc8, 0x5, 0x1f, 0x3, 0x7, 0x81, 0xffffffff, 0x2, 0x8, 0x7, 0x10000, 0xd064, 0x9, 0xfffffffffffffffc, 0x9, 0x5b, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000a40)}, 0x8001, 0x96, 0x80000001, 0x3, 0x1, 0x1, 0x2}, 0xffffffffffffffff, 0x9, r2, 0x2) listxattr(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)=""/205, 0xcd) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000c40)={0x10001}, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f0000000c80)={0x100000000, 'syz1\x00'}) r6 = getpgrp(0xffffffffffffffff) capset(&(0x7f0000000cc0)={0x0, r6}, &(0x7f0000000d00)={0x5, 0x9, 0xfff, 0xbd, 0xe7, 0xffffffffffff0001}) 19:37:13 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x800, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040)=0xa97b, 0x4) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e20, 0x8, @empty, 0x6}}, 0x9, 0x100, 0xfffffffffffffff8, 0x0, 0xffffffffffffff81}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e21, 0xe10, @mcast2, 0x4}}, 0x576, 0x8, 0x7fff, 0x3ff, 0xa0}, &(0x7f0000000240)=0x98) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x7) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000002c0), &(0x7f0000000300)=0x4) alarm(0x9) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000340)={0x8, 0x101, 0x0, {0x4822, 0x8000, 0x5, 0x5}}) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x80) r3 = request_key(&(0x7f0000000380)='encrypted\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='$nodevwlan0\'\x00', 0xffffffffffffffff) r4 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$search(0xa, r3, &(0x7f0000000440)='cifs.idmap\x00', &(0x7f0000000480)={'syz', 0x0}, r4) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000540)="dd30b76fd682ae1181dd437689eb905fcb4ae8248214d7c89bfb2e555c3b5e9defd6b3d8c7ade8eb7847f88eb35e408d3387ab23be8d088fce5a28b5aa21860801a069859de1f76e408040d1dc71", 0x4e) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f00000005c0)={@ipv4={[], [], @remote}, 0x0}, &(0x7f0000000600)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00', r5}) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000680)={0xfc, 0x40, 0x1, 0x9, 0xf, 0x28d, 0x2, 0x6, 0x81, 0xffffffffffffff3f}) clock_gettime(0x0, &(0x7f0000000700)={0x0, 0x0}) futimesat(r0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000740)={{0x0, 0x2710}, {r6, r7/1000+10000}}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000007c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000780), 0x2, 0xb}}, 0x20) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000800)='bbr\x00', 0x4) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000840)={r1, 0xfff, 0xa, [0x3ff, 0x9, 0x1, 0x0, 0x0, 0xfff, 0x9, 0xfffffffffffffeb3, 0xfffffffffffffff9, 0x1]}, &(0x7f0000000880)=0x1c) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000008c0), &(0x7f0000000900)=0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000940)=0x0) sched_setparam(r8, &(0x7f0000000980)=0x3) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000009c0)={r2, @in={{0x2, 0x4e22, @multicast1}}, 0x4, 0x8, 0x40, 0x8, 0x80}, 0x98) syz_genetlink_get_family_id$tipc(&(0x7f0000000a80)='TIPC\x00') getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000ac0)={r1, 0x2, 0x0, 0x9, 0x1, 0x1, 0x9, 0x9, {r2, @in={{0x2, 0x4e24, @multicast2}}, 0xfe65, 0x81, 0xfffffffffffffffd, 0x8000, 0x5}}, &(0x7f0000000b80)=0xb0) 19:37:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = accept4(r0, &(0x7f00000001c0)=@x25, &(0x7f00000000c0)=0x80, 0x800) ioctl$VIDIOC_G_JPEGCOMP(r0, 0x808c563d, &(0x7f0000000240)) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) set_tid_address(&(0x7f0000000000)) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000040)=0x5, 0x4) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x2d, &(0x7f0000000340)={0x7, {{0x2, 0x4e22, @multicast2}}}, 0x84) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000004c0)=@filter={'filter\x00', 0xe, 0x4, 0x348, 0x0, 0x104, 0x2b4, 0x104, 0x1c0, 0x2b4, 0x2b4, 0x2b4, 0x2b4, 0x2b4, 0x4, &(0x7f0000000140), {[{{@ip={@multicast1, @multicast2, 0x0, 0xff000000, 'veth1\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x27, 0x2, 0x10}, 0x0, 0x98, 0x104}, @common=@unspec=@NFLOG={0x6c, 'NFLOG\x00', 0x0, {0x6f31, 0x1f, 0x2, 0x1, 0x0, "cc0167286c4bd2e8e615d4447bf5fd00d810cfddf03d3a83a19060bfec1fc6bf9dc01df94eb62309353a5f01794ffb2d280f60e25c7232257ad89e52ee842905"}}}, {{@uncond, 0x0, 0x98, 0xbc}, @REJECT={0x24, 'REJECT\x00', 0x0, {0x3}}}, {{@uncond, 0x0, 0x98, 0xf4}, @common=@CLUSTERIP={0x5c, 'CLUSTERIP\x00', 0x0, {0x1, @random="6fc40e52b7f1", 0x3, 0x9, [0x27, 0x2e, 0x2c, 0x3b, 0x4, 0x26, 0x25, 0x14, 0x36, 0x3d, 0x1c, 0x38, 0x22, 0xf, 0x18, 0xd], 0x1, 0x0, 0x400}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x3a4) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000480)={0x69}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 19:37:13 executing program 0: r0 = userfaultfd(0x0) prctl$PR_GET_SECUREBITS(0x1b) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e53fe8)) ioctl$UFFDIO_UNREGISTER(r0, 0xc020aa04, &(0x7f0000007ffc)={&(0x7f0000000000/0x2000)=nil, 0x7fffdffff000}) 19:37:13 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000240)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x17}}}, {{0x2, 0x4e22, @multicast2}}}, 0x104) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r2, 0x0, 0x10005, 0x0) 19:37:13 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) getsockname$netlink(r0, &(0x7f0000000040), &(0x7f0000000080)=0xc) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f00000000c0)) r1 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x0, 0x2) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000340)={0x0, 0x7f}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000003c0)={r2, 0x9, 0x7fffffff}, 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000400)="7a0b2e327bab15b043c04fb779697295", 0x10) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000440)=""/118) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000500)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800042}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x3c, r3, 0x600, 0x70bd29, 0x25dfdbfb, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x2f}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000c0}, 0x4000004) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000600)) statx(r0, &(0x7f0000000640)='./file0\x00', 0x800, 0x180, &(0x7f0000000680)) r4 = geteuid() lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000780)='/dev/loop0\x00', &(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='fuseblk\x00', 0xc18, &(0x7f0000000900)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x4}}, {@default_permissions='default_permissions'}, {@blksize={'blksize'}}, {@max_read={'max_read', 0x3d, 0x8}}, {@allow_other='allow_other'}], [{@fscontext={'fscontext', 0x3d, 'root'}}]}}) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/vsock\x00', 0x0, 0x0) rt_sigpending(&(0x7f0000000a80), 0x8) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/vsock\x00', 0x400000, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000b00)=0x4000, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000cc0)={r6, &(0x7f0000000b40)="aafd402c7ba2f761eef57f0ddcf475a128436f1244a0f81e6ce2a0a44f25cdb278a3a983e3b46e70a4a9daf45e4fea6c220bdac49e30f1f521e5b1e3238ce557cef319dbf0e7e3b703a3eff7abfc40761efe3a57f95bf32cb3c46e494792bdb894478a2593d6f36dde82eb57ab5419352c6a7ff3a2fb8f882f62e12921a72d01c920286344b30d43ccadfb447eca541d51a02e2fa6647ff6f50470b9384840e0c61aa61e3713ecdd443236b591e9bdedda1c4cf00ed6c4f8aa9380767c34fe2b221e986ef87c6cf906789a1688a836e6af17cd33aceb77a130e7f806e0ca3ed8a2f01e4891bfdfd540057b996199b1dfc6acd0e6acdf7e", &(0x7f0000000c40)=""/113}, 0x18) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000d00)={0x106000, 0x2000}) dup3(r6, r7, 0x80000) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000d40)) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) readlink(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)=""/60, 0x3c) ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f0000000e40)={0x56, "6aa3284c6063fc26948605982677525a69601e9281dc9d73103845d24d409020", 0x400, 0x9, 0xffffffff80000001, 0x10, 0x3}) socket$l2tp(0x18, 0x1, 0x1) syz_open_dev$radio(&(0x7f0000000ec0)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000f00)) 19:37:14 executing program 0: r0 = userfaultfd(0x0) prctl$PR_GET_SECUREBITS(0x1b) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e53fe8)) ioctl$UFFDIO_UNREGISTER(r0, 0xc020aa04, &(0x7f0000007ffc)={&(0x7f0000000000/0x2000)=nil, 0x7fffdffff000}) [ 181.264933] kobject: 'loop5' (00000000627b5503): kobject_uevent_env [ 181.293263] kobject: 'loop5' (00000000627b5503): fill_kobj_path: path = '/devices/virtual/block/loop5' 19:37:14 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x800, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040)=0xa97b, 0x4) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e20, 0x8, @empty, 0x6}}, 0x9, 0x100, 0xfffffffffffffff8, 0x0, 0xffffffffffffff81}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e21, 0xe10, @mcast2, 0x4}}, 0x576, 0x8, 0x7fff, 0x3ff, 0xa0}, &(0x7f0000000240)=0x98) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x7) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000002c0), &(0x7f0000000300)=0x4) alarm(0x9) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000340)={0x8, 0x101, 0x0, {0x4822, 0x8000, 0x5, 0x5}}) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x80) r3 = request_key(&(0x7f0000000380)='encrypted\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='$nodevwlan0\'\x00', 0xffffffffffffffff) r4 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$search(0xa, r3, &(0x7f0000000440)='cifs.idmap\x00', &(0x7f0000000480)={'syz', 0x0}, r4) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000540)="dd30b76fd682ae1181dd437689eb905fcb4ae8248214d7c89bfb2e555c3b5e9defd6b3d8c7ade8eb7847f88eb35e408d3387ab23be8d088fce5a28b5aa21860801a069859de1f76e408040d1dc71", 0x4e) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f00000005c0)={@ipv4={[], [], @remote}, 0x0}, &(0x7f0000000600)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00', r5}) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000680)={0xfc, 0x40, 0x1, 0x9, 0xf, 0x28d, 0x2, 0x6, 0x81, 0xffffffffffffff3f}) clock_gettime(0x0, &(0x7f0000000700)={0x0, 0x0}) futimesat(r0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000740)={{0x0, 0x2710}, {r6, r7/1000+10000}}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000007c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000780), 0x2, 0xb}}, 0x20) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000800)='bbr\x00', 0x4) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000840)={r1, 0xfff, 0xa, [0x3ff, 0x9, 0x1, 0x0, 0x0, 0xfff, 0x9, 0xfffffffffffffeb3, 0xfffffffffffffff9, 0x1]}, &(0x7f0000000880)=0x1c) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000008c0), &(0x7f0000000900)=0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000940)=0x0) sched_setparam(r8, &(0x7f0000000980)=0x3) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000009c0)={r2, @in={{0x2, 0x4e22, @multicast1}}, 0x4, 0x8, 0x40, 0x8, 0x80}, 0x98) syz_genetlink_get_family_id$tipc(&(0x7f0000000a80)='TIPC\x00') getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000ac0)={r1, 0x2, 0x0, 0x9, 0x1, 0x1, 0x9, 0x9, {r2, @in={{0x2, 0x4e24, @multicast2}}, 0xfe65, 0x81, 0xfffffffffffffffd, 0x8000, 0x5}}, &(0x7f0000000b80)=0xb0) [ 181.333316] kobject: 'loop0' (00000000139a86aa): kobject_uevent_env [ 181.343350] kobject: 'loop0' (00000000139a86aa): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 181.348875] IPVS: ftp: loaded support on port[0] = 21 19:37:14 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) getsockname$netlink(r0, &(0x7f0000000040), &(0x7f0000000080)=0xc) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f00000000c0)) r1 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x0, 0x2) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000340)={0x0, 0x7f}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000003c0)={r2, 0x9, 0x7fffffff}, 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000400)="7a0b2e327bab15b043c04fb779697295", 0x10) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000440)=""/118) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000500)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800042}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x3c, r3, 0x600, 0x70bd29, 0x25dfdbfb, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x2f}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000c0}, 0x4000004) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000600)) statx(r0, &(0x7f0000000640)='./file0\x00', 0x800, 0x180, &(0x7f0000000680)) r4 = geteuid() lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000780)='/dev/loop0\x00', &(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='fuseblk\x00', 0xc18, &(0x7f0000000900)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x4}}, {@default_permissions='default_permissions'}, {@blksize={'blksize'}}, {@max_read={'max_read', 0x3d, 0x8}}, {@allow_other='allow_other'}], [{@fscontext={'fscontext', 0x3d, 'root'}}]}}) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/vsock\x00', 0x0, 0x0) rt_sigpending(&(0x7f0000000a80), 0x8) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/vsock\x00', 0x400000, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000b00)=0x4000, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000cc0)={r6, &(0x7f0000000b40)="aafd402c7ba2f761eef57f0ddcf475a128436f1244a0f81e6ce2a0a44f25cdb278a3a983e3b46e70a4a9daf45e4fea6c220bdac49e30f1f521e5b1e3238ce557cef319dbf0e7e3b703a3eff7abfc40761efe3a57f95bf32cb3c46e494792bdb894478a2593d6f36dde82eb57ab5419352c6a7ff3a2fb8f882f62e12921a72d01c920286344b30d43ccadfb447eca541d51a02e2fa6647ff6f50470b9384840e0c61aa61e3713ecdd443236b591e9bdedda1c4cf00ed6c4f8aa9380767c34fe2b221e986ef87c6cf906789a1688a836e6af17cd33aceb77a130e7f806e0ca3ed8a2f01e4891bfdfd540057b996199b1dfc6acd0e6acdf7e", &(0x7f0000000c40)=""/113}, 0x18) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000d00)={0x106000, 0x2000}) dup3(r6, r7, 0x80000) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000d40)) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) readlink(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)=""/60, 0x3c) ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f0000000e40)={0x56, "6aa3284c6063fc26948605982677525a69601e9281dc9d73103845d24d409020", 0x400, 0x9, 0xffffffff80000001, 0x10, 0x3}) socket$l2tp(0x18, 0x1, 0x1) syz_open_dev$radio(&(0x7f0000000ec0)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000f00)) [ 181.376189] kobject: 'loop4' (00000000b9a48136): kobject_uevent_env [ 181.397436] kobject: 'lo' (0000000074bfff63): kobject_add_internal: parent: 'net', set: 'devices' [ 181.402415] kobject: 'loop4' (00000000b9a48136): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 181.414806] kobject: 'lo' (0000000074bfff63): kobject_uevent_env 19:37:14 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x800, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000040)={0xffffffffffffffc1, 0x3ff, 0x2, 0x3, 0x9, [{0x3, 0x8, 0x46, 0x0, 0x0, 0x9dec55c0691d344b}, {0x4, 0x7ff, 0x3, 0x0, 0x0, 0x100}, {0x1, 0x6, 0x100000001, 0x0, 0x0, 0x2}, {0x3, 0xffffffffffffffe0, 0x4, 0x0, 0x0, 0x800}, {0x6, 0x3, 0xaa2e, 0x0, 0x0, 0xa}, {0xcf, 0x2, 0x5, 0x0, 0x0, 0x8}, {0x1, 0x0, 0x1000, 0x0, 0x0, 0x100}, {0x80000000, 0x1000, 0x0, 0x0, 0x0, 0x2000}, {0x7fffffff, 0x2, 0x0, 0x0, 0x0, 0x600}]}) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm-control\x00', 0x40001, 0x0) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000380)={0x1, 0x0, [{0x5, 0x0, 0xbc8}]}) ioctl(r1, 0x8000, &(0x7f00000003c0)="8ffd4d99b8260394bda8b7d91f59214b18f52551d8b79db4b558ab9d4b768411c3c025cd03dd9d1b46e8d676bf586efdd24f1e76fbfcbc6e4e66b06f5904500207fe945d8d92cf35172fed080ef96fa217e5fbb7de16a7aac570c7512b197f0a985088ec5f408239be2bc8f710b822b8d563d6e545e28d6a71f5e038ca81d896209b8082f6e8dad30786fc10141c6bc8123a") socket$inet6_udplite(0xa, 0x2, 0x88) r2 = syz_open_dev$dspn(&(0x7f0000000480)='/dev/dsp#\x00', 0x4, 0x1) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000004c0)={'nr0\x00', @link_local}) fcntl$setstatus(r2, 0x4, 0x40000) r3 = socket$inet6(0xa, 0x8000b, 0x6) ioctl$VIDIOC_S_FMT(r1, 0xc0cc5605, &(0x7f0000000500)={0xc, @sdr={0x32314d54, 0x6}}) ioctl$KVM_GET_DEVICE_ATTR(r2, 0x4018aee2, &(0x7f0000000640)={0x0, 0x2, 0x3, &(0x7f0000000600)=0x685}) unshare(0x40000000) openat$ion(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ion\x00', 0x200, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f00000006c0)={0x7b, 0x0, [0x3e8, 0x3, 0x4, 0x582d1643]}) ioctl$CAPI_NCCI_OPENCOUNT(r2, 0x80044326, &(0x7f0000000740)=0x877c) socketpair(0x3, 0x2, 0x101, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/self/attr/current\x00', 0x2, 0x0) lseek(r4, 0x58, 0x2) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000800), &(0x7f0000000840)=0xb) ioctl$sock_ifreq(r3, 0x89ff, &(0x7f00000008c0)={'dummy0\x00', @ifru_settings={0x8000, 0x7fff, @te1=&(0x7f0000000880)={0x0, 0x1, 0x7fffffff, 0x2}}}) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000940)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r2, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x200012}, 0xc, &(0x7f00000009c0)={&(0x7f0000000980)={0x1c, r5, 0x400, 0x70bd2c, 0x25dfdbfd, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x4004000) perf_event_open(&(0x7f0000000a80)={0x4, 0x70, 0x9, 0x7, 0x300000000, 0x1f, 0x0, 0x40, 0x0, 0x3, 0x40, 0x6, 0x3a5, 0x4, 0x4, 0x3bcd3d1d, 0x6, 0x7, 0xdd, 0xff, 0x8, 0x9, 0xc8, 0x5, 0x1f, 0x3, 0x7, 0x81, 0xffffffff, 0x2, 0x8, 0x7, 0x10000, 0xd064, 0x9, 0xfffffffffffffffc, 0x9, 0x5b, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000a40)}, 0x8001, 0x96, 0x80000001, 0x3, 0x1, 0x1, 0x2}, 0xffffffffffffffff, 0x9, r2, 0x2) listxattr(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)=""/205, 0xcd) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000c40)={0x10001}, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f0000000c80)={0x100000000, 'syz1\x00'}) r6 = getpgrp(0xffffffffffffffff) capset(&(0x7f0000000cc0)={0x0, r6}, &(0x7f0000000d00)={0x5, 0x9, 0xfff, 0xbd, 0xe7, 0xffffffffffff0001}) [ 181.424894] kobject: 'lo' (0000000074bfff63): fill_kobj_path: path = '/devices/virtual/net/lo' [ 181.437585] kobject: 'queues' (000000006f49a888): kobject_add_internal: parent: 'lo', set: '' [ 181.448103] kobject: 'loop3' (0000000091d3e11f): kobject_uevent_env [ 181.450690] kobject: 'queues' (000000006f49a888): kobject_uevent_env [ 181.462056] kobject: 'queues' (000000006f49a888): kobject_uevent_env: filter function caused the event to drop! 19:37:14 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) getsockname$netlink(r0, &(0x7f0000000040), &(0x7f0000000080)=0xc) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f00000000c0)) r1 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x0, 0x2) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000340)={0x0, 0x7f}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000003c0)={r2, 0x9, 0x7fffffff}, 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000400)="7a0b2e327bab15b043c04fb779697295", 0x10) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000440)=""/118) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000500)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800042}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x3c, r3, 0x600, 0x70bd29, 0x25dfdbfb, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x2f}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000c0}, 0x4000004) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000600)) statx(r0, &(0x7f0000000640)='./file0\x00', 0x800, 0x180, &(0x7f0000000680)) r4 = geteuid() lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000780)='/dev/loop0\x00', &(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='fuseblk\x00', 0xc18, &(0x7f0000000900)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x4}}, {@default_permissions='default_permissions'}, {@blksize={'blksize'}}, {@max_read={'max_read', 0x3d, 0x8}}, {@allow_other='allow_other'}], [{@fscontext={'fscontext', 0x3d, 'root'}}]}}) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/vsock\x00', 0x0, 0x0) rt_sigpending(&(0x7f0000000a80), 0x8) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/vsock\x00', 0x400000, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000b00)=0x4000, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000cc0)={r6, &(0x7f0000000b40)="aafd402c7ba2f761eef57f0ddcf475a128436f1244a0f81e6ce2a0a44f25cdb278a3a983e3b46e70a4a9daf45e4fea6c220bdac49e30f1f521e5b1e3238ce557cef319dbf0e7e3b703a3eff7abfc40761efe3a57f95bf32cb3c46e494792bdb894478a2593d6f36dde82eb57ab5419352c6a7ff3a2fb8f882f62e12921a72d01c920286344b30d43ccadfb447eca541d51a02e2fa6647ff6f50470b9384840e0c61aa61e3713ecdd443236b591e9bdedda1c4cf00ed6c4f8aa9380767c34fe2b221e986ef87c6cf906789a1688a836e6af17cd33aceb77a130e7f806e0ca3ed8a2f01e4891bfdfd540057b996199b1dfc6acd0e6acdf7e", &(0x7f0000000c40)=""/113}, 0x18) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000d00)={0x106000, 0x2000}) dup3(r6, r7, 0x80000) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000d40)) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) readlink(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)=""/60, 0x3c) ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f0000000e40)={0x56, "6aa3284c6063fc26948605982677525a69601e9281dc9d73103845d24d409020", 0x400, 0x9, 0xffffffff80000001, 0x10, 0x3}) socket$l2tp(0x18, 0x1, 0x1) syz_open_dev$radio(&(0x7f0000000ec0)='/dev/radio#\x00', 0x1, 0x2) 19:37:14 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x800, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040)=0xa97b, 0x4) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e20, 0x8, @empty, 0x6}}, 0x9, 0x100, 0xfffffffffffffff8, 0x0, 0xffffffffffffff81}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e21, 0xe10, @mcast2, 0x4}}, 0x576, 0x8, 0x7fff, 0x3ff, 0xa0}, &(0x7f0000000240)=0x98) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x7) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000002c0), &(0x7f0000000300)=0x4) alarm(0x9) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000340)={0x8, 0x101, 0x0, {0x4822, 0x8000, 0x5, 0x5}}) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x80) r3 = request_key(&(0x7f0000000380)='encrypted\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='$nodevwlan0\'\x00', 0xffffffffffffffff) r4 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$search(0xa, r3, &(0x7f0000000440)='cifs.idmap\x00', &(0x7f0000000480)={'syz', 0x0}, r4) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000540)="dd30b76fd682ae1181dd437689eb905fcb4ae8248214d7c89bfb2e555c3b5e9defd6b3d8c7ade8eb7847f88eb35e408d3387ab23be8d088fce5a28b5aa21860801a069859de1f76e408040d1dc71", 0x4e) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f00000005c0)={@ipv4={[], [], @remote}, 0x0}, &(0x7f0000000600)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00', r5}) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000680)={0xfc, 0x40, 0x1, 0x9, 0xf, 0x28d, 0x2, 0x6, 0x81, 0xffffffffffffff3f}) clock_gettime(0x0, &(0x7f0000000700)={0x0, 0x0}) futimesat(r0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000740)={{0x0, 0x2710}, {r6, r7/1000+10000}}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000007c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000780), 0x2, 0xb}}, 0x20) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000800)='bbr\x00', 0x4) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000840)={r1, 0xfff, 0xa, [0x3ff, 0x9, 0x1, 0x0, 0x0, 0xfff, 0x9, 0xfffffffffffffeb3, 0xfffffffffffffff9, 0x1]}, &(0x7f0000000880)=0x1c) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000008c0), &(0x7f0000000900)=0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000940)=0x0) sched_setparam(r8, &(0x7f0000000980)=0x3) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000009c0)={r2, @in={{0x2, 0x4e22, @multicast1}}, 0x4, 0x8, 0x40, 0x8, 0x80}, 0x98) syz_genetlink_get_family_id$tipc(&(0x7f0000000a80)='TIPC\x00') [ 181.471020] kobject: 'loop3' (0000000091d3e11f): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 181.472490] kobject: 'rx-0' (0000000022140203): kobject_add_internal: parent: 'queues', set: 'queues' [ 181.492039] kobject: 'rx-0' (0000000022140203): kobject_uevent_env [ 181.498566] kobject: 'rx-0' (0000000022140203): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 181.511217] kobject: 'tx-0' (00000000be4c0843): kobject_add_internal: parent: 'queues', set: 'queues' [ 181.532684] kobject: 'loop0' (00000000139a86aa): kobject_uevent_env [ 181.547162] kobject: 'loop0' (00000000139a86aa): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 181.551269] IPVS: ftp: loaded support on port[0] = 21 [ 181.563221] kobject: 'tx-0' (00000000be4c0843): kobject_uevent_env [ 181.567703] kobject: 'loop4' (00000000b9a48136): kobject_uevent_env [ 181.584384] kobject: 'tx-0' (00000000be4c0843): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 181.599142] kobject: 'loop4' (00000000b9a48136): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 181.605374] kobject: 'lo' (000000009a0b662d): kobject_add_internal: parent: 'net', set: 'devices' [ 181.612593] kobject: 'loop1' (000000009589fe1e): kobject_uevent_env [ 181.620588] kobject: 'lo' (000000009a0b662d): kobject_uevent_env [ 181.630599] kobject: 'lo' (000000009a0b662d): fill_kobj_path: path = '/devices/virtual/net/lo' [ 181.635121] kobject: 'loop1' (000000009589fe1e): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 181.640484] kobject: 'queues' (000000007ffb584f): kobject_add_internal: parent: 'lo', set: '' [ 181.662432] kobject: 'queues' (000000007ffb584f): kobject_uevent_env [ 181.663851] kobject: 'loop4' (00000000b9a48136): kobject_uevent_env [ 181.678912] kobject: 'queues' (000000007ffb584f): kobject_uevent_env: filter function caused the event to drop! [ 181.682712] kobject: 'loop4' (00000000b9a48136): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 181.692023] kobject: 'rx-0' (0000000084965675): kobject_add_internal: parent: 'queues', set: 'queues' [ 181.717936] kobject: 'rx-0' (0000000084965675): kobject_uevent_env [ 181.724441] kobject: 'rx-0' (0000000084965675): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 181.736344] kobject: 'tx-0' (00000000ddaf1339): kobject_add_internal: parent: 'queues', set: 'queues' [ 181.745902] kobject: 'tx-0' (00000000ddaf1339): kobject_uevent_env [ 181.752237] kobject: 'tx-0' (00000000ddaf1339): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 181.763170] kobject: 'tunl0' (000000003cc5409f): kobject_add_internal: parent: 'net', set: 'devices' [ 181.773660] kobject: 'tunl0' (000000003cc5409f): kobject_uevent_env [ 181.780144] kobject: 'tunl0' (000000003cc5409f): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 181.789528] kobject: 'queues' (000000007b6750cd): kobject_add_internal: parent: 'tunl0', set: '' [ 181.799519] kobject: 'queues' (000000007b6750cd): kobject_uevent_env [ 181.806060] kobject: 'queues' (000000007b6750cd): kobject_uevent_env: filter function caused the event to drop! [ 181.816343] kobject: 'rx-0' (0000000029a31029): kobject_add_internal: parent: 'queues', set: 'queues' [ 181.825783] kobject: 'rx-0' (0000000029a31029): kobject_uevent_env [ 181.832119] kobject: 'rx-0' (0000000029a31029): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 181.842452] kobject: 'tx-0' (00000000a0b24438): kobject_add_internal: parent: 'queues', set: 'queues' [ 181.851955] kobject: 'tx-0' (00000000a0b24438): kobject_uevent_env [ 181.858329] kobject: 'tx-0' (00000000a0b24438): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 181.869204] kobject: 'gre0' (000000006a491228): kobject_add_internal: parent: 'net', set: 'devices' [ 181.879305] kobject: 'gre0' (000000006a491228): kobject_uevent_env [ 181.885725] kobject: 'gre0' (000000006a491228): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 181.894941] kobject: 'queues' (00000000914aa216): kobject_add_internal: parent: 'gre0', set: '' [ 181.904379] kobject: 'queues' (00000000914aa216): kobject_uevent_env [ 181.910875] kobject: 'queues' (00000000914aa216): kobject_uevent_env: filter function caused the event to drop! [ 181.921172] kobject: 'rx-0' (000000001d2bc571): kobject_add_internal: parent: 'queues', set: 'queues' [ 181.930614] kobject: 'rx-0' (000000001d2bc571): kobject_uevent_env [ 181.937017] kobject: 'rx-0' (000000001d2bc571): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 181.947264] kobject: 'tx-0' (00000000163122fe): kobject_add_internal: parent: 'queues', set: 'queues' [ 181.957122] kobject: 'tx-0' (00000000163122fe): kobject_uevent_env [ 181.963476] kobject: 'tx-0' (00000000163122fe): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 181.974640] kobject: 'tunl0' (00000000c3881282): kobject_add_internal: parent: 'net', set: 'devices' [ 181.984776] kobject: 'tunl0' (00000000c3881282): kobject_uevent_env [ 181.991292] kobject: 'tunl0' (00000000c3881282): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 182.000940] kobject: 'queues' (00000000e5417493): kobject_add_internal: parent: 'tunl0', set: '' [ 182.010536] kobject: 'queues' (00000000e5417493): kobject_uevent_env [ 182.017089] kobject: 'queues' (00000000e5417493): kobject_uevent_env: filter function caused the event to drop! [ 182.027387] kobject: 'rx-0' (000000003e9ec48b): kobject_add_internal: parent: 'queues', set: 'queues' [ 182.036811] kobject: 'rx-0' (000000003e9ec48b): kobject_uevent_env [ 182.043144] kobject: 'rx-0' (000000003e9ec48b): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 182.053465] kobject: 'tx-0' (0000000005d6acb4): kobject_add_internal: parent: 'queues', set: 'queues' [ 182.063010] kobject: 'tx-0' (0000000005d6acb4): kobject_uevent_env [ 182.069382] kobject: 'tx-0' (0000000005d6acb4): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 182.080143] kobject: 'gretap0' (00000000e748916f): kobject_add_internal: parent: 'net', set: 'devices' [ 182.090296] kobject: 'gretap0' (00000000e748916f): kobject_uevent_env [ 182.096918] kobject: 'gretap0' (00000000e748916f): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 182.106661] kobject: 'queues' (000000009831e531): kobject_add_internal: parent: 'gretap0', set: '' [ 182.116775] kobject: 'queues' (000000009831e531): kobject_uevent_env [ 182.123268] kobject: 'queues' (000000009831e531): kobject_uevent_env: filter function caused the event to drop! [ 182.133538] kobject: 'rx-0' (0000000082e304c9): kobject_add_internal: parent: 'queues', set: 'queues' [ 182.143016] kobject: 'rx-0' (0000000082e304c9): kobject_uevent_env [ 182.149407] kobject: 'rx-0' (0000000082e304c9): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 182.159201] kobject: 'loop2' (0000000052e77b2e): kobject_uevent_env [ 182.159928] kobject: 'tx-0' (0000000053ea7b42): kobject_add_internal: parent: 'queues', set: 'queues' [ 182.171221] kobject: 'loop2' (0000000052e77b2e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 182.175833] kobject: 'tx-0' (0000000053ea7b42): kobject_uevent_env [ 182.193271] kobject: 'tx-0' (0000000053ea7b42): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 182.204598] kobject: 'batman_adv' (000000009dfd949f): kobject_add_internal: parent: 'gretap0', set: '' [ 182.214965] kobject: 'erspan0' (0000000083ef0e2b): kobject_add_internal: parent: 'net', set: 'devices' [ 182.225257] kobject: 'erspan0' (0000000083ef0e2b): kobject_uevent_env [ 182.231872] kobject: 'erspan0' (0000000083ef0e2b): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 182.241678] kobject: 'queues' (00000000c71499b5): kobject_add_internal: parent: 'erspan0', set: '' [ 182.251349] kobject: 'queues' (00000000c71499b5): kobject_uevent_env [ 182.257895] kobject: 'queues' (00000000c71499b5): kobject_uevent_env: filter function caused the event to drop! [ 182.268473] kobject: 'rx-0' (0000000091b0d01e): kobject_add_internal: parent: 'queues', set: 'queues' [ 182.277987] kobject: 'rx-0' (0000000091b0d01e): kobject_uevent_env [ 182.284387] kobject: 'rx-0' (0000000091b0d01e): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 182.294856] kobject: 'tx-0' (00000000b2b60956): kobject_add_internal: parent: 'queues', set: 'queues' [ 182.304423] kobject: 'tx-0' (00000000b2b60956): kobject_uevent_env [ 182.310759] kobject: 'tx-0' (00000000b2b60956): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 182.321736] kobject: 'batman_adv' (0000000066b940b7): kobject_add_internal: parent: 'erspan0', set: '' [ 182.332278] kobject: 'gre0' (0000000095559220): kobject_add_internal: parent: 'net', set: 'devices' [ 182.345472] kobject: 'gre0' (0000000095559220): kobject_uevent_env [ 182.351923] kobject: 'gre0' (0000000095559220): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 182.362333] kobject: 'queues' (0000000040c7f79f): kobject_add_internal: parent: 'gre0', set: '' [ 182.371903] kobject: 'queues' (0000000040c7f79f): kobject_uevent_env [ 182.378508] kobject: 'queues' (0000000040c7f79f): kobject_uevent_env: filter function caused the event to drop! [ 182.388802] kobject: 'rx-0' (0000000043431d22): kobject_add_internal: parent: 'queues', set: 'queues' [ 182.398252] kobject: 'rx-0' (0000000043431d22): kobject_uevent_env [ 182.404643] kobject: 'rx-0' (0000000043431d22): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 182.414841] kobject: 'tx-0' (00000000fd364081): kobject_add_internal: parent: 'queues', set: 'queues' [ 182.424417] kobject: 'tx-0' (00000000fd364081): kobject_uevent_env [ 182.430762] kobject: 'tx-0' (00000000fd364081): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 182.441562] kobject: 'gretap0' (0000000039b69937): kobject_add_internal: parent: 'net', set: 'devices' [ 182.451917] kobject: 'gretap0' (0000000039b69937): kobject_uevent_env [ 182.458575] kobject: 'gretap0' (0000000039b69937): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 182.468321] kobject: 'queues' (0000000064e3cf41): kobject_add_internal: parent: 'gretap0', set: '' [ 182.477987] kobject: 'queues' (0000000064e3cf41): kobject_uevent_env [ 182.484535] kobject: 'queues' (0000000064e3cf41): kobject_uevent_env: filter function caused the event to drop! [ 182.494838] kobject: 'rx-0' (000000001894688d): kobject_add_internal: parent: 'queues', set: 'queues' [ 182.504274] kobject: 'rx-0' (000000001894688d): kobject_uevent_env [ 182.510630] kobject: 'rx-0' (000000001894688d): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 182.521138] kobject: 'tx-0' (000000008054d975): kobject_add_internal: parent: 'queues', set: 'queues' [ 182.530720] kobject: 'tx-0' (000000008054d975): kobject_uevent_env [ 182.537096] kobject: 'tx-0' (000000008054d975): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 182.548187] kobject: 'batman_adv' (000000000361076c): kobject_add_internal: parent: 'gretap0', set: '' [ 182.558651] kobject: 'ip_vti0' (00000000db14f897): kobject_add_internal: parent: 'net', set: 'devices' [ 182.570007] kobject: 'ip_vti0' (00000000db14f897): kobject_uevent_env [ 182.576693] kobject: 'ip_vti0' (00000000db14f897): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 182.586413] kobject: 'queues' (00000000bc500333): kobject_add_internal: parent: 'ip_vti0', set: '' [ 182.596137] kobject: 'queues' (00000000bc500333): kobject_uevent_env [ 182.602629] kobject: 'queues' (00000000bc500333): kobject_uevent_env: filter function caused the event to drop! [ 182.612893] kobject: 'rx-0' (0000000050a7c6f6): kobject_add_internal: parent: 'queues', set: 'queues' [ 182.622319] kobject: 'rx-0' (0000000050a7c6f6): kobject_uevent_env [ 182.628708] kobject: 'rx-0' (0000000050a7c6f6): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 182.639184] kobject: 'tx-0' (000000000a8aabfa): kobject_add_internal: parent: 'queues', set: 'queues' [ 182.648721] kobject: 'tx-0' (000000000a8aabfa): kobject_uevent_env [ 182.655101] kobject: 'tx-0' (000000000a8aabfa): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 182.666220] kobject: 'erspan0' (00000000f72c4438): kobject_add_internal: parent: 'net', set: 'devices' [ 182.676615] kobject: 'erspan0' (00000000f72c4438): kobject_uevent_env [ 182.683207] kobject: 'erspan0' (00000000f72c4438): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 182.692920] kobject: 'queues' (00000000874ac385): kobject_add_internal: parent: 'erspan0', set: '' [ 182.702594] kobject: 'queues' (00000000874ac385): kobject_uevent_env [ 182.709108] kobject: 'queues' (00000000874ac385): kobject_uevent_env: filter function caused the event to drop! [ 182.719353] kobject: 'rx-0' (000000007dc5db6e): kobject_add_internal: parent: 'queues', set: 'queues' [ 182.728789] kobject: 'rx-0' (000000007dc5db6e): kobject_uevent_env [ 182.735155] kobject: 'rx-0' (000000007dc5db6e): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 182.745633] kobject: 'tx-0' (000000005fa858aa): kobject_add_internal: parent: 'queues', set: 'queues' [ 182.755177] kobject: 'tx-0' (000000005fa858aa): kobject_uevent_env [ 182.761514] kobject: 'tx-0' (000000005fa858aa): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 182.772376] kobject: 'batman_adv' (00000000a7468189): kobject_add_internal: parent: 'erspan0', set: '' [ 182.782820] kobject: 'ip_vti0' (00000000d5023b05): kobject_add_internal: parent: 'net', set: 'devices' [ 182.793014] kobject: 'ip_vti0' (00000000d5023b05): kobject_uevent_env [ 182.799660] kobject: 'ip_vti0' (00000000d5023b05): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 182.809434] kobject: 'queues' (00000000816930a2): kobject_add_internal: parent: 'ip_vti0', set: '' [ 182.819113] kobject: 'queues' (00000000816930a2): kobject_uevent_env [ 182.825632] kobject: 'queues' (00000000816930a2): kobject_uevent_env: filter function caused the event to drop! [ 182.835913] kobject: 'rx-0' (000000003fce91cc): kobject_add_internal: parent: 'queues', set: 'queues' [ 182.845358] kobject: 'rx-0' (000000003fce91cc): kobject_uevent_env [ 182.851714] kobject: 'rx-0' (000000003fce91cc): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 182.862367] kobject: 'tx-0' (00000000597511ad): kobject_add_internal: parent: 'queues', set: 'queues' [ 182.871902] kobject: 'tx-0' (00000000597511ad): kobject_uevent_env [ 182.878274] kobject: 'tx-0' (00000000597511ad): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 182.889788] kobject: 'rx-0' (0000000050a7c6f6): kobject_cleanup, parent 00000000bc500333 [ 182.899126] kobject: 'rx-0' (0000000050a7c6f6): auto cleanup 'remove' event [ 182.906365] kobject: 'rx-0' (0000000050a7c6f6): kobject_uevent_env [ 182.912688] kobject: 'rx-0' (0000000050a7c6f6): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 182.924442] kobject: 'rx-0' (0000000050a7c6f6): auto cleanup kobject_del [ 182.931360] kobject: 'rx-0' (0000000050a7c6f6): calling ktype release [ 182.937966] kobject: 'rx-0': free name [ 182.941867] kobject: 'tx-0' (000000000a8aabfa): kobject_cleanup, parent 00000000bc500333 [ 182.950112] kobject: 'tx-0' (000000000a8aabfa): auto cleanup 'remove' event [ 182.957238] kobject: 'tx-0' (000000000a8aabfa): kobject_uevent_env [ 182.963589] kobject: 'tx-0' (000000000a8aabfa): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 182.974069] kobject: 'tx-0' (000000000a8aabfa): auto cleanup kobject_del [ 182.980954] kobject: 'tx-0' (000000000a8aabfa): calling ktype release [ 182.987560] kobject: 'tx-0': free name [ 182.991459] kobject: 'queues' (00000000bc500333): kobject_cleanup, parent (null) [ 182.999945] kobject: 'queues' (00000000bc500333): calling ktype release [ 183.006729] kobject: 'queues' (00000000bc500333): kset_release [ 183.012697] kobject: 'queues': free name [ 183.017001] kobject: 'ip_vti0' (00000000db14f897): kobject_uevent_env [ 183.023683] kobject: 'ip_vti0' (00000000db14f897): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 183.034039] kobject: 'rx-0' (000000003fce91cc): kobject_cleanup, parent 00000000816930a2 [ 183.042553] kobject: 'rx-0' (000000003fce91cc): auto cleanup 'remove' event [ 183.049680] kobject: 'rx-0' (000000003fce91cc): kobject_uevent_env [ 183.056060] kobject: 'rx-0' (000000003fce91cc): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 183.066604] kobject: 'rx-0' (000000003fce91cc): auto cleanup kobject_del [ 183.073478] kobject: 'rx-0' (000000003fce91cc): calling ktype release [ 183.080658] kobject: 'rx-0': free name [ 183.084627] kobject: 'tx-0' (00000000597511ad): kobject_cleanup, parent 00000000816930a2 [ 183.092849] kobject: 'tx-0' (00000000597511ad): auto cleanup 'remove' event [ 183.099959] kobject: 'tx-0' (00000000597511ad): kobject_uevent_env [ 183.106338] kobject: 'tx-0' (00000000597511ad): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 183.116795] kobject: 'tx-0' (00000000597511ad): auto cleanup kobject_del [ 183.123661] kobject: 'tx-0' (00000000597511ad): calling ktype release [ 183.130269] kobject: 'tx-0': free name [ 183.134253] kobject: 'queues' (00000000816930a2): kobject_cleanup, parent (null) [ 183.142664] kobject: 'queues' (00000000816930a2): calling ktype release [ 183.149447] kobject: 'queues' (00000000816930a2): kset_release [ 183.155772] kobject: 'queues': free name [ 183.159975] kobject: 'ip_vti0' (00000000d5023b05): kobject_uevent_env [ 183.166849] kobject: 'ip_vti0' (00000000d5023b05): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 183.176650] kobject: 'ip_vti0' (00000000db14f897): kobject_cleanup, parent (null) [ 183.185255] kobject: 'ip_vti0' (00000000db14f897): calling ktype release [ 183.192100] kobject: 'ip_vti0': free name [ 183.194347] kobject: 'ip_vti0' (00000000d5023b05): kobject_cleanup, parent (null) [ 183.204787] kobject: 'ip_vti0' (00000000d5023b05): calling ktype release [ 183.211665] kobject: 'ip_vti0': free name [ 183.216422] kobject: 'batman_adv' (0000000066b940b7): kobject_uevent_env [ 183.223335] kobject: 'batman_adv' (0000000066b940b7): kobject_uevent_env: filter function caused the event to drop! [ 183.234718] kobject: 'batman_adv' (0000000066b940b7): kobject_cleanup, parent (null) [ 183.243537] kobject: 'batman_adv' (0000000066b940b7): calling ktype release [ 183.250706] kobject: (0000000066b940b7): dynamic_kobj_release [ 183.256661] kobject: 'batman_adv': free name [ 183.261159] kobject: 'rx-0' (0000000091b0d01e): kobject_cleanup, parent 00000000c71499b5 [ 183.269410] kobject: 'rx-0' (0000000091b0d01e): auto cleanup 'remove' event [ 183.276526] kobject: 'rx-0' (0000000091b0d01e): kobject_uevent_env [ 183.282841] kobject: 'rx-0' (0000000091b0d01e): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 183.293328] kobject: 'rx-0' (0000000091b0d01e): auto cleanup kobject_del [ 183.300353] kobject: 'rx-0' (0000000091b0d01e): calling ktype release [ 183.306978] kobject: 'rx-0': free name [ 183.310885] kobject: 'tx-0' (00000000b2b60956): kobject_cleanup, parent 00000000c71499b5 [ 183.319439] kobject: 'tx-0' (00000000b2b60956): auto cleanup 'remove' event [ 183.326586] kobject: 'tx-0' (00000000b2b60956): kobject_uevent_env [ 183.332935] kobject: 'tx-0' (00000000b2b60956): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 183.343412] kobject: 'tx-0' (00000000b2b60956): auto cleanup kobject_del [ 183.350298] kobject: 'tx-0' (00000000b2b60956): calling ktype release [ 183.356890] kobject: 'tx-0': free name [ 183.360806] kobject: 'queues' (00000000c71499b5): kobject_cleanup, parent (null) [ 183.369232] kobject: 'queues' (00000000c71499b5): calling ktype release [ 183.376016] kobject: 'queues' (00000000c71499b5): kset_release [ 183.381978] kobject: 'queues': free name [ 183.386329] kobject: 'erspan0' (0000000083ef0e2b): kobject_uevent_env [ 183.392907] kobject: 'erspan0' (0000000083ef0e2b): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 183.403538] kobject: 'batman_adv' (00000000a7468189): kobject_uevent_env [ 183.410465] kobject: 'batman_adv' (00000000a7468189): kobject_uevent_env: filter function caused the event to drop! [ 183.421069] kobject: 'batman_adv' (00000000a7468189): kobject_cleanup, parent (null) [ 183.430079] kobject: 'batman_adv' (00000000a7468189): calling ktype release [ 183.437212] kobject: (00000000a7468189): dynamic_kobj_release [ 183.443096] kobject: 'batman_adv': free name [ 183.447638] kobject: 'rx-0' (000000007dc5db6e): kobject_cleanup, parent 00000000874ac385 [ 183.455899] kobject: 'rx-0' (000000007dc5db6e): auto cleanup 'remove' event [ 183.463002] kobject: 'rx-0' (000000007dc5db6e): kobject_uevent_env [ 183.469372] kobject: 'rx-0' (000000007dc5db6e): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 183.480013] kobject: 'rx-0' (000000007dc5db6e): auto cleanup kobject_del [ 183.486930] kobject: 'rx-0' (000000007dc5db6e): calling ktype release [ 183.493528] kobject: 'rx-0': free name [ 183.497471] kobject: 'tx-0' (000000005fa858aa): kobject_cleanup, parent 00000000874ac385 [ 183.505729] kobject: 'tx-0' (000000005fa858aa): auto cleanup 'remove' event [ 183.512834] kobject: 'tx-0' (000000005fa858aa): kobject_uevent_env [ 183.519212] kobject: 'tx-0' (000000005fa858aa): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 183.529653] kobject: 'tx-0' (000000005fa858aa): auto cleanup kobject_del [ 183.536567] kobject: 'tx-0' (000000005fa858aa): calling ktype release [ 183.543132] kobject: 'tx-0': free name [ 183.547071] kobject: 'queues' (00000000874ac385): kobject_cleanup, parent (null) [ 183.564562] kobject: 'queues' (00000000874ac385): calling ktype release [ 183.572513] kobject: 'queues' (00000000874ac385): kset_release [ 183.580831] kobject: 'queues': free name [ 183.585626] kobject: 'erspan0' (00000000f72c4438): kobject_uevent_env [ 183.592348] kobject: 'erspan0' (00000000f72c4438): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 183.602432] kobject: 'erspan0' (0000000083ef0e2b): kobject_cleanup, parent (null) [ 183.610953] kobject: 'erspan0' (0000000083ef0e2b): calling ktype release [ 183.617817] kobject: 'erspan0': free name [ 183.622606] kobject: 'batman_adv' (000000009dfd949f): kobject_uevent_env [ 183.629540] kobject: 'batman_adv' (000000009dfd949f): kobject_uevent_env: filter function caused the event to drop! [ 183.641340] kobject: 'batman_adv' (000000009dfd949f): kobject_cleanup, parent (null) [ 183.650137] kobject: 'batman_adv' (000000009dfd949f): calling ktype release [ 183.657257] kobject: (000000009dfd949f): dynamic_kobj_release [ 183.663134] kobject: 'batman_adv': free name [ 183.667716] kobject: 'rx-0' (0000000082e304c9): kobject_cleanup, parent 000000009831e531 [ 183.675963] kobject: 'rx-0' (0000000082e304c9): auto cleanup 'remove' event [ 183.683050] kobject: 'rx-0' (0000000082e304c9): kobject_uevent_env [ 183.689419] kobject: 'rx-0' (0000000082e304c9): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 183.700120] kobject: 'rx-0' (0000000082e304c9): auto cleanup kobject_del [ 183.707042] kobject: 'rx-0' (0000000082e304c9): calling ktype release [ 183.713627] kobject: 'rx-0': free name [ 183.718088] kobject: 'tx-0' (0000000053ea7b42): kobject_cleanup, parent 000000009831e531 [ 183.726366] kobject: 'tx-0' (0000000053ea7b42): auto cleanup 'remove' event [ 183.733502] kobject: 'tx-0' (0000000053ea7b42): kobject_uevent_env [ 183.739876] kobject: 'tx-0' (0000000053ea7b42): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 183.750367] kobject: 'tx-0' (0000000053ea7b42): auto cleanup kobject_del [ 183.757235] kobject: 'tx-0' (0000000053ea7b42): calling ktype release [ 183.763820] kobject: 'tx-0': free name [ 183.767758] kobject: 'queues' (000000009831e531): kobject_cleanup, parent (null) [ 183.776185] kobject: 'queues' (000000009831e531): calling ktype release [ 183.782917] kobject: 'queues' (000000009831e531): kset_release [ 183.788908] kobject: 'queues': free name [ 183.793155] kobject: 'gretap0' (00000000e748916f): kobject_uevent_env [ 183.800344] kobject: 'gretap0' (00000000e748916f): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 183.810178] kobject: 'erspan0' (00000000f72c4438): kobject_cleanup, parent (null) [ 183.818714] kobject: 'erspan0' (00000000f72c4438): calling ktype release [ 183.825905] kobject: 'erspan0': free name [ 183.830634] kobject: 'batman_adv' (000000000361076c): kobject_uevent_env [ 183.837530] kobject: 'batman_adv' (000000000361076c): kobject_uevent_env: filter function caused the event to drop! [ 183.848310] kobject: 'batman_adv' (000000000361076c): kobject_cleanup, parent (null) [ 183.857093] kobject: 'batman_adv' (000000000361076c): calling ktype release [ 183.864227] kobject: (000000000361076c): dynamic_kobj_release [ 183.870109] kobject: 'batman_adv': free name [ 183.874685] kobject: 'rx-0' (000000001894688d): kobject_cleanup, parent 0000000064e3cf41 [ 183.882911] kobject: 'rx-0' (000000001894688d): auto cleanup 'remove' event [ 183.890041] kobject: 'rx-0' (000000001894688d): kobject_uevent_env [ 183.896428] kobject: 'rx-0' (000000001894688d): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 183.906905] kobject: 'rx-0' (000000001894688d): auto cleanup kobject_del [ 183.913752] kobject: 'rx-0' (000000001894688d): calling ktype release [ 183.920347] kobject: 'rx-0': free name [ 183.924300] kobject: 'tx-0' (000000008054d975): kobject_cleanup, parent 0000000064e3cf41 [ 183.932518] kobject: 'tx-0' (000000008054d975): auto cleanup 'remove' event [ 183.939635] kobject: 'tx-0' (000000008054d975): kobject_uevent_env [ 183.945994] kobject: 'tx-0' (000000008054d975): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 183.957031] kobject: 'tx-0' (000000008054d975): auto cleanup kobject_del [ 183.963893] kobject: 'tx-0' (000000008054d975): calling ktype release [ 183.970497] kobject: 'tx-0': free name [ 183.974577] kobject: 'queues' (0000000064e3cf41): kobject_cleanup, parent (null) [ 183.982971] kobject: 'queues' (0000000064e3cf41): calling ktype release [ 183.989736] kobject: 'queues' (0000000064e3cf41): kset_release [ 183.995722] kobject: 'queues': free name [ 184.000013] kobject: 'gretap0' (0000000039b69937): kobject_uevent_env [ 184.006677] kobject: 'gretap0' (0000000039b69937): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 184.016447] kobject: 'gretap0' (00000000e748916f): kobject_cleanup, parent (null) [ 184.026134] kobject: 'gretap0' (00000000e748916f): calling ktype release [ 184.033007] kobject: 'gretap0': free name [ 184.037978] kobject: 'rx-0' (000000001d2bc571): kobject_cleanup, parent 00000000914aa216 [ 184.046342] kobject: 'rx-0' (000000001d2bc571): auto cleanup 'remove' event [ 184.053444] kobject: 'rx-0' (000000001d2bc571): kobject_uevent_env [ 184.059864] kobject: 'rx-0' (000000001d2bc571): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 184.070089] kobject: 'rx-0' (000000001d2bc571): auto cleanup kobject_del [ 184.076968] kobject: 'rx-0' (000000001d2bc571): calling ktype release [ 184.083541] kobject: 'rx-0': free name [ 184.087746] kobject: 'tx-0' (00000000163122fe): kobject_cleanup, parent 00000000914aa216 [ 184.096025] kobject: 'tx-0' (00000000163122fe): auto cleanup 'remove' event [ 184.103125] kobject: 'tx-0' (00000000163122fe): kobject_uevent_env [ 184.109555] kobject: 'tx-0' (00000000163122fe): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 184.120042] kobject: 'tx-0' (00000000163122fe): auto cleanup kobject_del [ 184.126953] kobject: 'tx-0' (00000000163122fe): calling ktype release [ 184.133532] kobject: 'tx-0': free name [ 184.137477] kobject: 'queues' (00000000914aa216): kobject_cleanup, parent (null) [ 184.145895] kobject: 'queues' (00000000914aa216): calling ktype release [ 184.152638] kobject: 'queues' (00000000914aa216): kset_release [ 184.158627] kobject: 'queues': free name [ 184.162907] kobject: 'gre0' (000000006a491228): kobject_uevent_env [ 184.169314] kobject: 'gre0' (000000006a491228): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 184.178582] kobject: 'gretap0' (0000000039b69937): kobject_cleanup, parent (null) [ 184.188249] kobject: 'gretap0' (0000000039b69937): calling ktype release [ 184.195535] kobject: 'gretap0': free name [ 184.200073] kobject: 'rx-0' (0000000043431d22): kobject_cleanup, parent 0000000040c7f79f [ 184.209349] kobject: 'rx-0' (0000000043431d22): auto cleanup 'remove' event [ 184.216839] kobject: 'rx-0' (0000000043431d22): kobject_uevent_env [ 184.223206] kobject: 'rx-0' (0000000043431d22): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 184.233434] kobject: 'rx-0' (0000000043431d22): auto cleanup kobject_del [ 184.240305] kobject: 'rx-0' (0000000043431d22): calling ktype release [ 184.246891] kobject: 'rx-0': free name [ 184.250811] kobject: 'tx-0' (00000000fd364081): kobject_cleanup, parent 0000000040c7f79f [ 184.259151] kobject: 'tx-0' (00000000fd364081): auto cleanup 'remove' event [ 184.266278] kobject: 'tx-0' (00000000fd364081): kobject_uevent_env [ 184.272629] kobject: 'tx-0' (00000000fd364081): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 184.283993] kobject: 'tx-0' (00000000fd364081): auto cleanup kobject_del [ 184.290898] kobject: 'tx-0' (00000000fd364081): calling ktype release [ 184.297524] kobject: 'tx-0': free name [ 184.301417] kobject: 'queues' (0000000040c7f79f): kobject_cleanup, parent (null) [ 184.309832] kobject: 'queues' (0000000040c7f79f): calling ktype release [ 184.316640] kobject: 'queues' (0000000040c7f79f): kset_release [ 184.322617] kobject: 'queues': free name [ 184.326994] kobject: 'gre0' (0000000095559220): kobject_uevent_env [ 184.333325] kobject: 'gre0' (0000000095559220): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 184.342618] kobject: 'gre0' (000000006a491228): kobject_cleanup, parent (null) [ 184.351081] kobject: 'gre0' (000000006a491228): calling ktype release [ 184.358386] kobject: 'gre0': free name [ 184.362637] kobject: 'rx-0' (0000000029a31029): kobject_cleanup, parent 000000007b6750cd [ 184.370904] kobject: 'rx-0' (0000000029a31029): auto cleanup 'remove' event [ 184.378075] kobject: 'rx-0' (0000000029a31029): kobject_uevent_env [ 184.384441] kobject: 'rx-0' (0000000029a31029): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 184.394761] kobject: 'rx-0' (0000000029a31029): auto cleanup kobject_del [ 184.401606] kobject: 'rx-0' (0000000029a31029): calling ktype release [ 184.408226] kobject: 'rx-0': free name [ 184.412161] kobject: 'tx-0' (00000000a0b24438): kobject_cleanup, parent 000000007b6750cd [ 184.420404] kobject: 'tx-0' (00000000a0b24438): auto cleanup 'remove' event [ 184.427518] kobject: 'tx-0' (00000000a0b24438): kobject_uevent_env [ 184.433851] kobject: 'tx-0' (00000000a0b24438): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 184.444926] kobject: 'tx-0' (00000000a0b24438): auto cleanup kobject_del [ 184.451798] kobject: 'tx-0' (00000000a0b24438): calling ktype release [ 184.458398] kobject: 'tx-0': free name [ 184.462301] kobject: 'queues' (000000007b6750cd): kobject_cleanup, parent (null) [ 184.470835] kobject: 'queues' (000000007b6750cd): calling ktype release [ 184.477840] kobject: 'queues' (000000007b6750cd): kset_release [ 184.483830] kobject: 'queues': free name [ 184.488221] kobject: 'tunl0' (000000003cc5409f): kobject_uevent_env [ 184.494746] kobject: 'tunl0' (000000003cc5409f): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 184.504137] kobject: 'gre0' (0000000095559220): kobject_cleanup, parent (null) [ 184.512538] kobject: 'gre0' (0000000095559220): calling ktype release [ 184.520244] kobject: 'gre0': free name [ 184.524788] kobject: 'rx-0' (000000003e9ec48b): kobject_cleanup, parent 00000000e5417493 [ 184.533008] kobject: 'rx-0' (000000003e9ec48b): auto cleanup 'remove' event [ 184.540141] kobject: 'rx-0' (000000003e9ec48b): kobject_uevent_env [ 184.546492] kobject: 'rx-0' (000000003e9ec48b): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 184.556842] kobject: 'rx-0' (000000003e9ec48b): auto cleanup kobject_del [ 184.563697] kobject: 'rx-0' (000000003e9ec48b): calling ktype release [ 184.570301] kobject: 'rx-0': free name [ 184.574264] kobject: 'tx-0' (0000000005d6acb4): kobject_cleanup, parent 00000000e5417493 [ 184.582521] kobject: 'tx-0' (0000000005d6acb4): auto cleanup 'remove' event [ 184.589642] kobject: 'tx-0' (0000000005d6acb4): kobject_uevent_env [ 184.596382] kobject: 'tx-0' (0000000005d6acb4): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 184.607011] kobject: 'tx-0' (0000000005d6acb4): auto cleanup kobject_del [ 184.613860] kobject: 'tx-0' (0000000005d6acb4): calling ktype release [ 184.620540] kobject: 'tx-0': free name [ 184.624490] kobject: 'queues' (00000000e5417493): kobject_cleanup, parent (null) [ 184.632890] kobject: 'queues' (00000000e5417493): calling ktype release [ 184.639656] kobject: 'queues' (00000000e5417493): kset_release [ 184.645639] kobject: 'queues': free name [ 184.649846] kobject: 'tunl0' (00000000c3881282): kobject_uevent_env [ 184.656297] kobject: 'tunl0' (00000000c3881282): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 184.665713] kobject: 'tunl0' (000000003cc5409f): kobject_cleanup, parent (null) [ 184.674031] kobject: 'tunl0' (000000003cc5409f): calling ktype release [ 184.680819] kobject: 'tunl0': free name [ 184.685507] kobject: 'rx-0' (0000000022140203): kobject_cleanup, parent 000000006f49a888 [ 184.693720] kobject: 'rx-0' (0000000022140203): auto cleanup 'remove' event [ 184.700851] kobject: 'rx-0' (0000000022140203): kobject_uevent_env [ 184.707220] kobject: 'rx-0' (0000000022140203): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 184.717294] kobject: 'rx-0' (0000000022140203): auto cleanup kobject_del [ 184.724159] kobject: 'rx-0' (0000000022140203): calling ktype release [ 184.730783] kobject: 'rx-0': free name [ 184.734718] kobject: 'tx-0' (00000000be4c0843): kobject_cleanup, parent 000000006f49a888 [ 184.742929] kobject: 'tx-0' (00000000be4c0843): auto cleanup 'remove' event [ 184.750028] kobject: 'tx-0' (00000000be4c0843): kobject_uevent_env [ 184.756793] kobject: 'tx-0' (00000000be4c0843): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 184.766841] kobject: 'tx-0' (00000000be4c0843): auto cleanup kobject_del [ 184.773714] kobject: 'tx-0' (00000000be4c0843): calling ktype release [ 184.780380] kobject: 'tx-0': free name [ 184.784313] kobject: 'queues' (000000006f49a888): kobject_cleanup, parent (null) [ 184.792697] kobject: 'queues' (000000006f49a888): calling ktype release [ 184.799472] kobject: 'queues' (000000006f49a888): kset_release [ 184.805452] kobject: 'queues': free name [ 184.809691] kobject: 'lo' (0000000074bfff63): kobject_uevent_env [ 184.815891] kobject: 'lo' (0000000074bfff63): fill_kobj_path: path = '/devices/virtual/net/lo' [ 184.824804] kobject: 'tunl0' (00000000c3881282): kobject_cleanup, parent (null) [ 184.833137] kobject: 'tunl0' (00000000c3881282): calling ktype release [ 184.840017] kobject: 'tunl0': free name [ 184.845030] kobject: 'rx-0' (0000000084965675): kobject_cleanup, parent 000000007ffb584f [ 184.853277] kobject: 'rx-0' (0000000084965675): auto cleanup 'remove' event [ 184.860402] kobject: 'rx-0' (0000000084965675): kobject_uevent_env [ 184.867176] kobject: 'rx-0' (0000000084965675): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 184.877225] kobject: 'rx-0' (0000000084965675): auto cleanup kobject_del [ 184.884077] kobject: 'rx-0' (0000000084965675): calling ktype release [ 184.890736] kobject: 'rx-0': free name [ 184.894755] kobject: 'tx-0' (00000000ddaf1339): kobject_cleanup, parent 000000007ffb584f [ 184.902980] kobject: 'tx-0' (00000000ddaf1339): auto cleanup 'remove' event [ 184.910100] kobject: 'tx-0' (00000000ddaf1339): kobject_uevent_env [ 184.916449] kobject: 'tx-0' (00000000ddaf1339): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 184.926489] kobject: 'tx-0' (00000000ddaf1339): auto cleanup kobject_del [ 184.933354] kobject: 'tx-0' (00000000ddaf1339): calling ktype release [ 184.939945] kobject: 'tx-0': free name [ 184.943841] kobject: 'queues' (000000007ffb584f): kobject_cleanup, parent (null) [ 184.952268] kobject: 'queues' (000000007ffb584f): calling ktype release [ 184.959064] kobject: 'queues' (000000007ffb584f): kset_release [ 184.965081] kobject: 'queues': free name [ 184.969348] kobject: 'lo' (000000009a0b662d): kobject_uevent_env [ 184.975748] kobject: 'lo' (000000009a0b662d): fill_kobj_path: path = '/devices/virtual/net/lo' [ 184.984709] kobject: 'lo' (0000000074bfff63): kobject_cleanup, parent (null) [ 184.992761] kobject: 'lo' (0000000074bfff63): calling ktype release [ 184.999751] kobject: 'lo': free name [ 185.034413] kobject: 'lo' (000000009a0b662d): kobject_cleanup, parent (null) [ 185.042483] kobject: 'lo' (000000009a0b662d): calling ktype release [ 185.049275] kobject: 'lo': free name 19:37:18 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x800, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000040)={0xffffffffffffffc1, 0x3ff, 0x2, 0x3, 0x9, [{0x3, 0x8, 0x46, 0x0, 0x0, 0x9dec55c0691d344b}, {0x4, 0x7ff, 0x3, 0x0, 0x0, 0x100}, {0x1, 0x6, 0x100000001, 0x0, 0x0, 0x2}, {0x3, 0xffffffffffffffe0, 0x4, 0x0, 0x0, 0x800}, {0x6, 0x3, 0xaa2e, 0x0, 0x0, 0xa}, {0xcf, 0x2, 0x5, 0x0, 0x0, 0x8}, {0x1, 0x0, 0x1000, 0x0, 0x0, 0x100}, {0x80000000, 0x1000, 0x0, 0x0, 0x0, 0x2000}, {0x7fffffff, 0x2, 0x0, 0x0, 0x0, 0x600}]}) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm-control\x00', 0x40001, 0x0) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000380)={0x1, 0x0, [{0x5, 0x0, 0xbc8}]}) ioctl(r1, 0x8000, &(0x7f00000003c0)="8ffd4d99b8260394bda8b7d91f59214b18f52551d8b79db4b558ab9d4b768411c3c025cd03dd9d1b46e8d676bf586efdd24f1e76fbfcbc6e4e66b06f5904500207fe945d8d92cf35172fed080ef96fa217e5fbb7de16a7aac570c7512b197f0a985088ec5f408239be2bc8f710b822b8d563d6e545e28d6a71f5e038ca81d896209b8082f6e8dad30786fc10141c6bc8123a") socket$inet6_udplite(0xa, 0x2, 0x88) r2 = syz_open_dev$dspn(&(0x7f0000000480)='/dev/dsp#\x00', 0x4, 0x1) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000004c0)={'nr0\x00', @link_local}) fcntl$setstatus(r2, 0x4, 0x40000) r3 = socket$inet6(0xa, 0x8000b, 0x6) ioctl$VIDIOC_S_FMT(r1, 0xc0cc5605, &(0x7f0000000500)={0xc, @sdr={0x32314d54, 0x6}}) ioctl$KVM_GET_DEVICE_ATTR(r2, 0x4018aee2, &(0x7f0000000640)={0x0, 0x2, 0x3, &(0x7f0000000600)=0x685}) unshare(0x40000000) openat$ion(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ion\x00', 0x200, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f00000006c0)={0x7b, 0x0, [0x3e8, 0x3, 0x4, 0x582d1643]}) ioctl$CAPI_NCCI_OPENCOUNT(r2, 0x80044326, &(0x7f0000000740)=0x877c) socketpair(0x3, 0x2, 0x101, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/self/attr/current\x00', 0x2, 0x0) lseek(r4, 0x58, 0x2) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000800), &(0x7f0000000840)=0xb) ioctl$sock_ifreq(r3, 0x89ff, &(0x7f00000008c0)={'dummy0\x00', @ifru_settings={0x8000, 0x7fff, @te1=&(0x7f0000000880)={0x0, 0x1, 0x7fffffff, 0x2}}}) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000940)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r2, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x200012}, 0xc, &(0x7f00000009c0)={&(0x7f0000000980)={0x1c, r5, 0x400, 0x70bd2c, 0x25dfdbfd, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x4004000) perf_event_open(&(0x7f0000000a80)={0x4, 0x70, 0x9, 0x7, 0x300000000, 0x1f, 0x0, 0x40, 0x0, 0x3, 0x40, 0x6, 0x3a5, 0x4, 0x4, 0x3bcd3d1d, 0x6, 0x7, 0xdd, 0xff, 0x8, 0x9, 0xc8, 0x5, 0x1f, 0x3, 0x7, 0x81, 0xffffffff, 0x2, 0x8, 0x7, 0x10000, 0xd064, 0x9, 0xfffffffffffffffc, 0x9, 0x5b, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000a40)}, 0x8001, 0x96, 0x80000001, 0x3, 0x1, 0x1, 0x2}, 0xffffffffffffffff, 0x9, r2, 0x2) listxattr(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)=""/205, 0xcd) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000c40)={0x10001}, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f0000000c80)={0x100000000, 'syz1\x00'}) r6 = getpgrp(0xffffffffffffffff) capset(&(0x7f0000000cc0)={0x0, r6}, &(0x7f0000000d00)={0x5, 0x9, 0xfff, 0xbd, 0xe7, 0xffffffffffff0001}) 19:37:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = accept4(r0, &(0x7f00000001c0)=@x25, &(0x7f00000000c0)=0x80, 0x800) ioctl$VIDIOC_G_JPEGCOMP(r0, 0x808c563d, &(0x7f0000000240)) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) set_tid_address(&(0x7f0000000000)) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000040)=0x5, 0x4) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x2d, &(0x7f0000000340)={0x7, {{0x2, 0x4e22, @multicast2}}}, 0x84) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000004c0)=@filter={'filter\x00', 0xe, 0x4, 0x348, 0x0, 0x104, 0x2b4, 0x104, 0x1c0, 0x2b4, 0x2b4, 0x2b4, 0x2b4, 0x2b4, 0x4, &(0x7f0000000140), {[{{@ip={@multicast1, @multicast2, 0x0, 0xff000000, 'veth1\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x27, 0x2, 0x10}, 0x0, 0x98, 0x104}, @common=@unspec=@NFLOG={0x6c, 'NFLOG\x00', 0x0, {0x6f31, 0x1f, 0x2, 0x1, 0x0, "cc0167286c4bd2e8e615d4447bf5fd00d810cfddf03d3a83a19060bfec1fc6bf9dc01df94eb62309353a5f01794ffb2d280f60e25c7232257ad89e52ee842905"}}}, {{@uncond, 0x0, 0x98, 0xbc}, @REJECT={0x24, 'REJECT\x00', 0x0, {0x3}}}, {{@uncond, 0x0, 0x98, 0xf4}, @common=@CLUSTERIP={0x5c, 'CLUSTERIP\x00', 0x0, {0x1, @random="6fc40e52b7f1", 0x3, 0x9, [0x27, 0x2e, 0x2c, 0x3b, 0x4, 0x26, 0x25, 0x14, 0x36, 0x3d, 0x1c, 0x38, 0x22, 0xf, 0x18, 0xd], 0x1, 0x0, 0x400}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x3a4) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000480)={0x69}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 19:37:18 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) getsockname$netlink(r0, &(0x7f0000000040), &(0x7f0000000080)=0xc) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f00000000c0)) r1 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x0, 0x2) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000340)={0x0, 0x7f}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000003c0)={r2, 0x9, 0x7fffffff}, 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000400)="7a0b2e327bab15b043c04fb779697295", 0x10) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000440)=""/118) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000500)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800042}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x3c, r3, 0x600, 0x70bd29, 0x25dfdbfb, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x2f}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000c0}, 0x4000004) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000600)) statx(r0, &(0x7f0000000640)='./file0\x00', 0x800, 0x180, &(0x7f0000000680)) r4 = geteuid() lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000780)='/dev/loop0\x00', &(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='fuseblk\x00', 0xc18, &(0x7f0000000900)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x4}}, {@default_permissions='default_permissions'}, {@blksize={'blksize'}}, {@max_read={'max_read', 0x3d, 0x8}}, {@allow_other='allow_other'}], [{@fscontext={'fscontext', 0x3d, 'root'}}]}}) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/vsock\x00', 0x0, 0x0) rt_sigpending(&(0x7f0000000a80), 0x8) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/vsock\x00', 0x400000, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000b00)=0x4000, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000cc0)={r6, &(0x7f0000000b40)="aafd402c7ba2f761eef57f0ddcf475a128436f1244a0f81e6ce2a0a44f25cdb278a3a983e3b46e70a4a9daf45e4fea6c220bdac49e30f1f521e5b1e3238ce557cef319dbf0e7e3b703a3eff7abfc40761efe3a57f95bf32cb3c46e494792bdb894478a2593d6f36dde82eb57ab5419352c6a7ff3a2fb8f882f62e12921a72d01c920286344b30d43ccadfb447eca541d51a02e2fa6647ff6f50470b9384840e0c61aa61e3713ecdd443236b591e9bdedda1c4cf00ed6c4f8aa9380767c34fe2b221e986ef87c6cf906789a1688a836e6af17cd33aceb77a130e7f806e0ca3ed8a2f01e4891bfdfd540057b996199b1dfc6acd0e6acdf7e", &(0x7f0000000c40)=""/113}, 0x18) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000d00)={0x106000, 0x2000}) dup3(r6, r7, 0x80000) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000d40)) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) readlink(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)=""/60, 0x3c) ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f0000000e40)={0x56, "6aa3284c6063fc26948605982677525a69601e9281dc9d73103845d24d409020", 0x400, 0x9, 0xffffffff80000001, 0x10, 0x3}) socket$l2tp(0x18, 0x1, 0x1) 19:37:18 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x800, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040)=0xa97b, 0x4) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e20, 0x8, @empty, 0x6}}, 0x9, 0x100, 0xfffffffffffffff8, 0x0, 0xffffffffffffff81}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e21, 0xe10, @mcast2, 0x4}}, 0x576, 0x8, 0x7fff, 0x3ff, 0xa0}, &(0x7f0000000240)=0x98) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x7) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000002c0), &(0x7f0000000300)=0x4) alarm(0x9) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000340)={0x8, 0x101, 0x0, {0x4822, 0x8000, 0x5, 0x5}}) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x80) r3 = request_key(&(0x7f0000000380)='encrypted\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='$nodevwlan0\'\x00', 0xffffffffffffffff) r4 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$search(0xa, r3, &(0x7f0000000440)='cifs.idmap\x00', &(0x7f0000000480)={'syz', 0x0}, r4) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000540)="dd30b76fd682ae1181dd437689eb905fcb4ae8248214d7c89bfb2e555c3b5e9defd6b3d8c7ade8eb7847f88eb35e408d3387ab23be8d088fce5a28b5aa21860801a069859de1f76e408040d1dc71", 0x4e) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f00000005c0)={@ipv4={[], [], @remote}, 0x0}, &(0x7f0000000600)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00', r5}) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000680)={0xfc, 0x40, 0x1, 0x9, 0xf, 0x28d, 0x2, 0x6, 0x81, 0xffffffffffffff3f}) clock_gettime(0x0, &(0x7f0000000700)={0x0, 0x0}) futimesat(r0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000740)={{0x0, 0x2710}, {r6, r7/1000+10000}}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000007c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000780), 0x2, 0xb}}, 0x20) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000800)='bbr\x00', 0x4) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000840)={r1, 0xfff, 0xa, [0x3ff, 0x9, 0x1, 0x0, 0x0, 0xfff, 0x9, 0xfffffffffffffeb3, 0xfffffffffffffff9, 0x1]}, &(0x7f0000000880)=0x1c) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000008c0), &(0x7f0000000900)=0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000940)=0x0) sched_setparam(r8, &(0x7f0000000980)=0x3) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000009c0)={r2, @in={{0x2, 0x4e22, @multicast1}}, 0x4, 0x8, 0x40, 0x8, 0x80}, 0x98) 19:37:18 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000240)={0x1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x17}}}, {{0x2, 0x4e22, @multicast2}}}, 0x104) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r2, 0x0, 0x10005, 0x0) 19:37:18 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x800, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040)=0xa97b, 0x4) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e20, 0x8, @empty, 0x6}}, 0x9, 0x100, 0xfffffffffffffff8, 0x0, 0xffffffffffffff81}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e21, 0xe10, @mcast2, 0x4}}, 0x576, 0x8, 0x7fff, 0x3ff, 0xa0}, &(0x7f0000000240)=0x98) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x7) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000002c0), &(0x7f0000000300)=0x4) alarm(0x9) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000340)={0x8, 0x101, 0x0, {0x4822, 0x8000, 0x5, 0x5}}) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x80) r2 = request_key(&(0x7f0000000380)='encrypted\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='$nodevwlan0\'\x00', 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$search(0xa, r2, &(0x7f0000000440)='cifs.idmap\x00', &(0x7f0000000480)={'syz', 0x0}, r3) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000540)="dd30b76fd682ae1181dd437689eb905fcb4ae8248214d7c89bfb2e555c3b5e9defd6b3d8c7ade8eb7847f88eb35e408d3387ab23be8d088fce5a28b5aa21860801a069859de1f76e408040d1dc71", 0x4e) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f00000005c0)={@ipv4={[], [], @remote}, 0x0}, &(0x7f0000000600)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00', r4}) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000680)={0xfc, 0x40, 0x1, 0x9, 0xf, 0x28d, 0x2, 0x6, 0x81, 0xffffffffffffff3f}) clock_gettime(0x0, &(0x7f0000000700)={0x0, 0x0}) futimesat(r0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000740)={{0x0, 0x2710}, {r5, r6/1000+10000}}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000007c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000780), 0x2, 0xb}}, 0x20) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000800)='bbr\x00', 0x4) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000840)={r1, 0xfff, 0xa, [0x3ff, 0x9, 0x1, 0x0, 0x0, 0xfff, 0x9, 0xfffffffffffffeb3, 0xfffffffffffffff9, 0x1]}, &(0x7f0000000880)=0x1c) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000008c0), &(0x7f0000000900)=0x8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000940)=0x0) sched_setparam(r7, &(0x7f0000000980)=0x3) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) [ 185.751449] kobject: 'loop5' (00000000627b5503): kobject_uevent_env [ 185.773989] kobject: 'loop5' (00000000627b5503): fill_kobj_path: path = '/devices/virtual/block/loop5' 19:37:18 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x800, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040)=0xa97b, 0x4) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e20, 0x8, @empty, 0x6}}, 0x9, 0x100, 0xfffffffffffffff8, 0x0, 0xffffffffffffff81}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e21, 0xe10, @mcast2, 0x4}}, 0x576, 0x8, 0x7fff, 0x3ff, 0xa0}, &(0x7f0000000240)=0x98) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x7) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000002c0), &(0x7f0000000300)=0x4) alarm(0x9) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000340)={0x8, 0x101, 0x0, {0x4822, 0x8000, 0x5, 0x5}}) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x80) r2 = request_key(&(0x7f0000000380)='encrypted\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='$nodevwlan0\'\x00', 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$search(0xa, r2, &(0x7f0000000440)='cifs.idmap\x00', &(0x7f0000000480)={'syz', 0x0}, r3) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000540)="dd30b76fd682ae1181dd437689eb905fcb4ae82482