[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 63.095796][ T26] audit: type=1800 audit(1572335865.444:25): pid=8566 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 63.131731][ T26] audit: type=1800 audit(1572335865.444:26): pid=8566 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 63.168572][ T26] audit: type=1800 audit(1572335865.454:27): pid=8566 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.156' (ECDSA) to the list of known hosts. 2019/10/29 07:57:55 fuzzer started 2019/10/29 07:57:57 dialing manager at 10.128.0.26:35103 2019/10/29 07:57:58 syscalls: 2541 2019/10/29 07:57:58 code coverage: enabled 2019/10/29 07:57:58 comparison tracing: enabled 2019/10/29 07:57:58 extra coverage: extra coverage is not supported by the kernel 2019/10/29 07:57:58 setuid sandbox: enabled 2019/10/29 07:57:58 namespace sandbox: enabled 2019/10/29 07:57:58 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/29 07:57:58 fault injection: enabled 2019/10/29 07:57:58 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/29 07:57:58 net packet injection: enabled 2019/10/29 07:57:58 net device setup: enabled 2019/10/29 07:57:58 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 08:00:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000240)=[{&(0x7f0000010000)="eb3c906d6b66732e", 0x8}], 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e24, @empty}}, 0xf24b, 0x100, 0x73, 0x800, 0x20}, &(0x7f0000000140)=0x98) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)="1f0000000203193b0200070000", 0xd}], 0x1) socket$caif_stream(0x25, 0x1, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000940)) 08:00:01 executing program 1: clock_settime(0x0, 0x0) syzkaller login: [ 199.624519][ T8735] IPVS: ftp: loaded support on port[0] = 21 [ 199.738775][ T8737] IPVS: ftp: loaded support on port[0] = 21 [ 199.815811][ T8735] chnl_net:caif_netlink_parms(): no params data found 08:00:02 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x23, &(0x7f0000000000), 0x8) [ 199.866918][ T8735] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.875100][ T8735] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.887658][ T8735] device bridge_slave_0 entered promiscuous mode [ 199.914540][ T8735] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.922278][ T8735] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.931460][ T8735] device bridge_slave_1 entered promiscuous mode [ 200.023642][ T8735] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 200.049911][ T8740] IPVS: ftp: loaded support on port[0] = 21 [ 200.063044][ T8735] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 200.107246][ T8735] team0: Port device team_slave_0 added [ 200.114093][ T8737] chnl_net:caif_netlink_parms(): no params data found [ 200.139504][ T8735] team0: Port device team_slave_1 added 08:00:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x4) getsockname$llc(0xffffffffffffffff, &(0x7f0000000540)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x0) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000140)={0x13, 0x10, 0xfa00, {&(0x7f0000000300)}}, 0x18) [ 200.244339][ T8735] device hsr_slave_0 entered promiscuous mode [ 200.290916][ T8735] device hsr_slave_1 entered promiscuous mode 08:00:02 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) dup2(r0, r1) [ 200.386563][ T8743] IPVS: ftp: loaded support on port[0] = 21 [ 200.400515][ T8737] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.407589][ T8737] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.421486][ T8737] device bridge_slave_0 entered promiscuous mode [ 200.451695][ T8737] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.458768][ T8737] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.467967][ T8737] device bridge_slave_1 entered promiscuous mode [ 200.570205][ T8737] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 200.620692][ T8737] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 200.629842][ T8740] chnl_net:caif_netlink_parms(): no params data found [ 200.744490][ T8737] team0: Port device team_slave_0 added [ 200.753179][ T8735] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.760345][ T8735] bridge0: port 2(bridge_slave_1) entered forwarding state [ 200.767964][ T8735] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.775022][ T8735] bridge0: port 1(bridge_slave_0) entered forwarding state [ 200.833382][ T8737] team0: Port device team_slave_1 added [ 200.850202][ T8746] IPVS: ftp: loaded support on port[0] = 21 [ 200.851529][ T8740] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.863589][ T8740] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.871853][ T8740] device bridge_slave_0 entered promiscuous mode 08:00:03 executing program 5: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x30, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, [@FRA_GENERIC_POLICY=@FRA_L3MDEV={0x8, 0x13, 0x401}, @FRA_FLOW={0x8, 0xb, 0x1}]}, 0x30}}, 0x20004000) [ 200.885027][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.899503][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.925257][ T8740] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.933452][ T8740] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.943619][ T8740] device bridge_slave_1 entered promiscuous mode [ 200.953436][ T8743] chnl_net:caif_netlink_parms(): no params data found [ 201.053688][ T8737] device hsr_slave_0 entered promiscuous mode [ 201.120683][ T8737] device hsr_slave_1 entered promiscuous mode [ 201.190591][ T8737] debugfs: Directory 'hsr0' with parent '/' already present! [ 201.223802][ T8740] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 201.252095][ T8750] IPVS: ftp: loaded support on port[0] = 21 [ 201.283852][ T8740] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 201.338781][ T8743] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.345999][ T8743] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.354124][ T8743] device bridge_slave_0 entered promiscuous mode [ 201.363653][ T8735] 8021q: adding VLAN 0 to HW filter on device bond0 [ 201.375147][ T8740] team0: Port device team_slave_0 added [ 201.383995][ T8740] team0: Port device team_slave_1 added [ 201.394309][ T8743] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.402520][ T8743] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.410053][ T8743] device bridge_slave_1 entered promiscuous mode [ 201.451260][ T2821] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 201.459283][ T2821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 201.471119][ T8735] 8021q: adding VLAN 0 to HW filter on device team0 [ 201.497022][ T8743] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 201.508917][ T8743] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 201.563651][ T8740] device hsr_slave_0 entered promiscuous mode [ 201.610985][ T8740] device hsr_slave_1 entered promiscuous mode [ 201.650569][ T8740] debugfs: Directory 'hsr0' with parent '/' already present! [ 201.675742][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 201.685934][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 201.694389][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.701488][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.747589][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 201.757245][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 201.765742][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.772837][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.781110][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 201.794860][ T8746] chnl_net:caif_netlink_parms(): no params data found [ 201.808185][ T8743] team0: Port device team_slave_0 added [ 201.835177][ T8751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 201.844104][ T8751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 201.854134][ T8751] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 201.865104][ T8743] team0: Port device team_slave_1 added [ 201.899699][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 201.945443][ T8746] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.952845][ T8746] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.960603][ T8746] device bridge_slave_0 entered promiscuous mode [ 201.969121][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 201.978100][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 201.986524][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 201.994947][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 202.062497][ T8743] device hsr_slave_0 entered promiscuous mode [ 202.120759][ T8743] device hsr_slave_1 entered promiscuous mode [ 202.170691][ T8743] debugfs: Directory 'hsr0' with parent '/' already present! [ 202.182804][ T8746] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.189857][ T8746] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.197704][ T8746] device bridge_slave_1 entered promiscuous mode [ 202.243057][ T8746] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 202.258817][ T8735] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 202.270995][ T8735] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 202.286793][ T8746] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 202.306448][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 202.315324][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 202.334447][ T8750] chnl_net:caif_netlink_parms(): no params data found [ 202.380236][ T8746] team0: Port device team_slave_0 added [ 202.405118][ T8750] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.413286][ T8750] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.421672][ T8750] device bridge_slave_0 entered promiscuous mode [ 202.429847][ T8750] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.437036][ T8750] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.445127][ T8750] device bridge_slave_1 entered promiscuous mode [ 202.466211][ T8735] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 202.475286][ T8746] team0: Port device team_slave_1 added [ 202.495403][ T8737] 8021q: adding VLAN 0 to HW filter on device bond0 [ 202.511460][ T8750] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 202.547150][ T8737] 8021q: adding VLAN 0 to HW filter on device team0 [ 202.557752][ T8750] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 202.622444][ T8746] device hsr_slave_0 entered promiscuous mode [ 202.674112][ T8746] device hsr_slave_1 entered promiscuous mode [ 202.710597][ T8746] debugfs: Directory 'hsr0' with parent '/' already present! [ 202.732767][ T8740] 8021q: adding VLAN 0 to HW filter on device bond0 [ 202.742416][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 202.750182][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 202.810667][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 202.819450][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 202.828744][ T8753] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.835865][ T8753] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.846483][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 202.855314][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 202.863872][ T8753] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.870985][ T8753] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.878749][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 202.887345][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 202.895913][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 202.904412][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 202.913068][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 202.921822][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 202.930090][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 202.938570][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 202.966490][ T8737] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 202.979288][ T8737] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 202.992478][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 203.002059][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 203.010092][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 203.018926][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 203.028465][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 203.036763][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 203.046616][ T8750] team0: Port device team_slave_0 added [ 203.068895][ T8750] team0: Port device team_slave_1 added [ 203.083185][ T8740] 8021q: adding VLAN 0 to HW filter on device team0 [ 203.118340][ C0] hrtimer: interrupt took 33807 ns [ 203.132759][ T8743] 8021q: adding VLAN 0 to HW filter on device bond0 [ 203.144824][ T8737] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 203.205681][ T8763] FAT-fs (loop0): bogus number of reserved sectors [ 203.210774][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 203.220816][ T8763] FAT-fs (loop0): Can't find a valid FAT filesystem [ 203.236735][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 203.249663][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.256779][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 203.268355][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 203.280054][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 203.288698][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.295797][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 203.303700][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 203.312670][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 203.323374][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 203.382568][ T8750] device hsr_slave_0 entered promiscuous mode [ 203.413622][ T8763] FAT-fs (loop0): bogus number of reserved sectors [ 203.420233][ T8763] FAT-fs (loop0): Can't find a valid FAT filesystem [ 203.433073][ T8750] device hsr_slave_1 entered promiscuous mode [ 203.480639][ T8750] debugfs: Directory 'hsr0' with parent '/' already present! [ 203.504192][ T8743] 8021q: adding VLAN 0 to HW filter on device team0 [ 203.512234][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 203.521233][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 203.549184][ T8746] 8021q: adding VLAN 0 to HW filter on device bond0 [ 203.571900][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 203.587364][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 08:00:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000240)=[{&(0x7f0000010000)="eb3c906d6b66732e", 0x8}], 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e24, @empty}}, 0xf24b, 0x100, 0x73, 0x800, 0x20}, &(0x7f0000000140)=0x98) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)="1f0000000203193b0200070000", 0xd}], 0x1) socket$caif_stream(0x25, 0x1, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000940)) [ 203.596521][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 203.608981][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 203.617602][ T8753] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.624680][ T8753] bridge0: port 1(bridge_slave_0) entered forwarding state [ 203.632536][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 203.641269][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 203.649669][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 203.658323][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 203.667006][ T8753] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.674119][ T8753] bridge0: port 2(bridge_slave_1) entered forwarding state [ 203.724757][ T8746] 8021q: adding VLAN 0 to HW filter on device team0 [ 203.732917][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 203.750960][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 203.758873][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 203.774683][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 203.786902][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 203.798438][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 203.798900][ T8777] FAT-fs (loop0): bogus number of reserved sectors [ 203.815150][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 203.826737][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 203.838568][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 203.849392][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 203.850996][ T8777] FAT-fs (loop0): Can't find a valid FAT filesystem [ 203.863975][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 203.865281][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 203.882115][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 203.890738][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 203.900063][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 203.908479][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 203.916649][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 203.925071][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 203.933700][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 203.948575][ T8740] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 204.011165][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 08:00:06 executing program 1: creat(&(0x7f0000000180)='./bus\x00', 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000040)=@ng, 0x2, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) [ 204.056627][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 204.068409][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 204.089910][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.097042][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.126900][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 204.135323][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 204.135337][ T26] audit: type=1804 audit(1572336006.474:31): pid=8789 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir027078550/syzkaller.zw8yes/1/bus" dev="sda1" ino=16529 res=1 08:00:06 executing program 1: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffb, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) [ 204.141474][ T26] audit: type=1804 audit(1572336006.474:32): pid=8790 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir027078550/syzkaller.zw8yes/1/bus" dev="sda1" ino=16529 res=1 [ 204.191185][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 204.199506][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.206611][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 204.214792][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 08:00:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000240)=[{&(0x7f0000010000)="eb3c906d6b66732e", 0x8}], 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e24, @empty}}, 0xf24b, 0x100, 0x73, 0x800, 0x20}, &(0x7f0000000140)=0x98) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)="1f0000000203193b0200070000", 0xd}], 0x1) socket$caif_stream(0x25, 0x1, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000940)) [ 204.239307][ T8740] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 204.310807][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 204.318640][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 204.339345][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 204.364785][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 204.373496][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 204.382596][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 204.391524][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 204.399974][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 204.441817][ T8798] FAT-fs (loop0): bogus number of reserved sectors [ 204.441855][ T8746] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 204.456198][ T8798] FAT-fs (loop0): Can't find a valid FAT filesystem [ 204.490356][ T8746] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 204.511992][ T8743] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 204.541953][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 204.551093][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 204.559464][ T8753] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 204.629073][ T8746] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 204.714115][ T8750] 8021q: adding VLAN 0 to HW filter on device bond0 08:00:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000240)=[{&(0x7f0000010000)="eb3c906d6b66732e", 0x8}], 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e24, @empty}}, 0xf24b, 0x100, 0x73, 0x800, 0x20}, &(0x7f0000000140)=0x98) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)="1f0000000203193b0200070000", 0xd}], 0x1) socket$caif_stream(0x25, 0x1, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000940)) 08:00:07 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x30}, 0xc) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="2221092635de190b65505b2c21446047b9d3ab442a1b0000000000000000"], 0x10094) write$binfmt_script(r0, &(0x7f0000000440)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000002c0), 0xc) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x1a000) write$binfmt_script(r0, &(0x7f0000000380)={'#! ', './file0'}, 0xb) [ 204.796086][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 204.812018][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 204.833943][ T8750] 8021q: adding VLAN 0 to HW filter on device team0 [ 204.891161][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 204.899888][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 204.983541][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.990677][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.022910][ T8821] FAT-fs (loop0): bogus number of reserved sectors [ 205.026394][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 205.043195][ T8821] FAT-fs (loop0): Can't find a valid FAT filesystem [ 205.091038][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 205.107369][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 205.174774][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.181966][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.209668][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 08:00:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x4) getsockname$llc(0xffffffffffffffff, &(0x7f0000000540)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x0) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000140)={0x13, 0x10, 0xfa00, {&(0x7f0000000300)}}, 0x18) 08:00:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x4) getsockname$llc(0xffffffffffffffff, &(0x7f0000000540)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x0) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000140)={0x13, 0x10, 0xfa00, {&(0x7f0000000300)}}, 0x18) [ 205.312266][ T8751] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 205.321316][ T8751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 205.335229][ T8751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 08:00:07 executing program 0: openat(0xffffffffffffffff, 0x0, 0x40000, 0x0) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) mq_open(0x0, 0x40, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) [ 205.367905][ T8751] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 205.431383][ T8751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 205.440075][ T8751] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 205.474550][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 205.488941][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 205.510337][ T8751] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 205.548340][ T8750] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 205.596798][ T8750] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 205.629015][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 205.669771][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 205.706701][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 08:00:08 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x30}, 0xc) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="2221092635de190b65505b2c21446047b9d3ab442a1b0000000000000000"], 0x10094) write$binfmt_script(r0, &(0x7f0000000440)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000002c0), 0xc) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x1a000) write$binfmt_script(r0, &(0x7f0000000380)={'#! ', './file0'}, 0xb) [ 205.757967][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 205.809897][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 08:00:08 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x10040, 0x0) r0 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff}) unshare(0x40600) write$P9_RCREATE(r0, &(0x7f0000000040)={0x18}, 0x18) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) fchmod(r0, 0x0) dup2(r0, r1) [ 205.916362][ T8750] 8021q: adding VLAN 0 to HW filter on device batadv0 08:00:08 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000000c0)=@ipx, 0x80, 0x0}}], 0x3fffffffffffe7e, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\x03\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\t\x870xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 08:00:09 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000000c0)=@ipx, 0x80, 0x0}}], 0x3fffffffffffe7e, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\x03\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\t\x870xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 08:00:10 executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) r0 = syz_open_dev$media(&(0x7f0000000280)='/dev/media#\x00', 0x0, 0x0) ioctl$RTC_EPOCH_READ(r0, 0xc0287c02, &(0x7f0000000040)) 08:00:10 executing program 3: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x2, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) msgctl$IPC_STAT(0xffffffffffffffff, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket$netlink(0x10, 0x3, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000180)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket$inet(0x2, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) 08:00:10 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xfffffffffffffd80, &(0x7f0000000280)=[{&(0x7f0000000000)="1400000019008102a00f80854a36b8ab1c959916", 0x14}], 0x1}, 0x0) 08:00:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f00000000c0)=@ethtool_rxnfc={0x2d, 0x0, 0x0, {0x0, @hdata="015280a82f7015ecb3276e71dc8399ab6a32a82ff905cb84a4eef1cdac897f63a8acad46ee838c74d9d573b0e1f2a069f3e924b4", {0x0, @remote}, @ether_spec={@broadcast}, {0x0, @broadcast}}}}) 08:00:10 executing program 4: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000001c0)={0x0, 0x0, 0xcc, &(0x7f0000000400)="fa13031b36b06be279451425c8d5ea6b4946a73613bddaf45e4c530717f0bfe064e06f62017f4d592066ecf61ff460cda032b5ae2283c2b79c33c77ecd3dd4780412bf31c49bf647123a7f5dfe2a6e17d91e2ea44a2257f407b57d06c89ddd9e649cfa3c3929bd59dbb7c723a5889bdac4efbc0de090345c213eea8c7b23b8df7223b237c319c2444810c2be03e64d58d909223e674dd7856ba0642775eaf0d2df91a09b9abc98deaeb5c33c3fddda13c44c67cc70f356538103ccaccc06f36a25b7a08c150e8036a0353ba6"}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000008000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) [ 208.096655][ T8976] ptrace attach of "/root/syz-executor.4"[8746] was attempted by " °ÿ àÿ 0 p €  ÿ Àÿ ðÿ ÿÿÿÿ   Ì   p  @ = 08:00:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x8003, &(0x7f0000000300)=0x75f, 0x9) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x5) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) 08:00:10 executing program 1: clone(0x2000000000200500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x20000080000000, 0x0) r0 = gettid() r1 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) tkill(r0, 0xa) 08:00:10 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xfffffffffffffd80, &(0x7f0000000280)=[{&(0x7f0000000000)="1400000019008102a00f80854a36b8ab1c959916", 0x14}], 0x1}, 0x0) [ 208.105706][ T8980] ptrace attach of "/root/syz-executor.4"[8746] was attempted by " °ÿ àÿ 0 p €  ÿ Àÿ ðÿ ÿÿÿÿ   Ì   p  @ = [ 208.212438][ T8984] ERROR: Domain ' /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.1 proc:/self/fd/3' not defined. 08:00:10 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) bind(r0, 0x0, 0x0) 08:00:10 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xfffffffffffffd80, &(0x7f0000000280)=[{&(0x7f0000000000)="1400000019008102a00f80854a36b8ab1c959916", 0x14}], 0x1}, 0x0) 08:00:10 executing program 4: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000001c0)={0x0, 0x0, 0xcc, &(0x7f0000000400)="fa13031b36b06be279451425c8d5ea6b4946a73613bddaf45e4c530717f0bfe064e06f62017f4d592066ecf61ff460cda032b5ae2283c2b79c33c77ecd3dd4780412bf31c49bf647123a7f5dfe2a6e17d91e2ea44a2257f407b57d06c89ddd9e649cfa3c3929bd59dbb7c723a5889bdac4efbc0de090345c213eea8c7b23b8df7223b237c319c2444810c2be03e64d58d909223e674dd7856ba0642775eaf0d2df91a09b9abc98deaeb5c33c3fddda13c44c67cc70f356538103ccaccc06f36a25b7a08c150e8036a0353ba6"}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000008000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) [ 208.667074][ T9012] ptrace attach of "/root/syz-executor.4"[8746] was attempted by " °ÿ àÿ 0 p €  ÿ Àÿ ðÿ ÿÿÿÿ   Ì   p  @ = 08:00:11 executing program 0: openat(0xffffffffffffffff, 0x0, 0x40000, 0x0) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) mq_open(0x0, 0x40, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 08:00:11 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0xfffffffe, 0x32}, 0x0, @in=@dev, 0x0, 0x0, 0x0, 0x5, 0x0, 0x7ff}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902000000a8a9890000007ba79554354cdddb4e767263a7192f6f0100000028db38a5668b145e6313f3ee41e2f28204b8de607a25340b579ac761976cae3a9a9e90785afd31885d362411ef23cd8fef4aa6dac6acb5ded04e547ce7a3bfaab8d914fb6ee79d501a7aa400000080000000005268d9ee158864d444d4bf66e8d85cc74a000000000000000000"], 0x10}}, 0x0) 08:00:11 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) recvmsg(r0, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x61) 08:00:11 executing program 4: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000001c0)={0x0, 0x0, 0xcc, &(0x7f0000000400)="fa13031b36b06be279451425c8d5ea6b4946a73613bddaf45e4c530717f0bfe064e06f62017f4d592066ecf61ff460cda032b5ae2283c2b79c33c77ecd3dd4780412bf31c49bf647123a7f5dfe2a6e17d91e2ea44a2257f407b57d06c89ddd9e649cfa3c3929bd59dbb7c723a5889bdac4efbc0de090345c213eea8c7b23b8df7223b237c319c2444810c2be03e64d58d909223e674dd7856ba0642775eaf0d2df91a09b9abc98deaeb5c33c3fddda13c44c67cc70f356538103ccaccc06f36a25b7a08c150e8036a0353ba6"}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000008000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 08:00:11 executing program 3: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x2, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) msgctl$IPC_STAT(0xffffffffffffffff, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket$netlink(0x10, 0x3, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000180)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket$inet(0x2, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) 08:00:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x8003, &(0x7f0000000300)=0x75f, 0x9) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x5) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) 08:00:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x8003, &(0x7f0000000300)=0x75f, 0x9) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x5) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) 08:00:11 executing program 4: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000001c0)={0x0, 0x0, 0xcc, &(0x7f0000000400)="fa13031b36b06be279451425c8d5ea6b4946a73613bddaf45e4c530717f0bfe064e06f62017f4d592066ecf61ff460cda032b5ae2283c2b79c33c77ecd3dd4780412bf31c49bf647123a7f5dfe2a6e17d91e2ea44a2257f407b57d06c89ddd9e649cfa3c3929bd59dbb7c723a5889bdac4efbc0de090345c213eea8c7b23b8df7223b237c319c2444810c2be03e64d58d909223e674dd7856ba0642775eaf0d2df91a09b9abc98deaeb5c33c3fddda13c44c67cc70f356538103ccaccc06f36a25b7a08c150e8036a0353ba6"}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000008000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) [ 209.277001][ T9036] ptrace attach of "/root/syz-executor.4"[8746] was attempted by " °ÿ àÿ 0 p €  ÿ Àÿ ðÿ ÿÿÿÿ   Ì   p  @ = 08:00:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x8003, &(0x7f0000000300)=0x75f, 0x9) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x5) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) [ 209.504186][ T9050] ptrace attach of "/root/syz-executor.4"[8746] was attempted by " °ÿ àÿ 0 p €  ÿ Àÿ ðÿ ÿÿÿÿ   Ì   p  @ = 08:00:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x8003, &(0x7f0000000300)=0x75f, 0x9) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x5) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) [ 210.115040][ T9034] syz-executor.1 (9034) used greatest stack depth: 22936 bytes left 08:00:12 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0xfffffffe, 0x32}, 0x0, @in=@dev, 0x0, 0x0, 0x0, 0x5, 0x0, 0x7ff}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902000000a8a9890000007ba79554354cdddb4e767263a7192f6f0100000028db38a5668b145e6313f3ee41e2f28204b8de607a25340b579ac761976cae3a9a9e90785afd31885d362411ef23cd8fef4aa6dac6acb5ded04e547ce7a3bfaab8d914fb6ee79d501a7aa400000080000000005268d9ee158864d444d4bf66e8d85cc74a000000000000000000"], 0x10}}, 0x0) 08:00:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x8003, &(0x7f0000000300)=0x75f, 0x9) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x5) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) 08:00:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x8003, &(0x7f0000000300)=0x75f, 0x9) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x5) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) 08:00:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x8003, &(0x7f0000000300)=0x75f, 0x9) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x5) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) 08:00:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x8003, &(0x7f0000000300)=0x75f, 0x9) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x5) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) 08:00:13 executing program 3: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x2, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) msgctl$IPC_STAT(0xffffffffffffffff, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket$netlink(0x10, 0x3, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000180)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket$inet(0x2, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) 08:00:13 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'syz_tun\x00\x00\x00\x00\x00\x01\b\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=@ipv6_newaddr={0x2c, 0x14, 0x9, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @empty}]}, 0x2c}}, 0x0) 08:00:13 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="440000001000010500"/20, @ANYRES32=0x0, @ANYBLOB="8410000000000000240012000c000100626f6e640000000014000200080018003f0000000800010004000000db35fb6fe1db5e9d607201c39064e152c1194e0493caff0287851f7b93c177fbeb2c5fcefd126c050ed2bb76bb10cea37c739aa283090d8d91041f12b8d13042e78614cceb3f5ab48930f1f02967cdb4ceb945d83f970b280956624115367094f1bf3c288d845f20bc4e75db797d3bd9e90ff23b68eef75364b7da524330e9ab149c1b0f549493"], 0x44}}, 0x0) [ 211.167109][ T9123] syz-executor.1 (9123) used greatest stack depth: 22904 bytes left 08:00:13 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0xfffffffe, 0x32}, 0x0, @in=@dev, 0x0, 0x0, 0x0, 0x5, 0x0, 0x7ff}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902000000a8a9890000007ba79554354cdddb4e767263a7192f6f0100000028db38a5668b145e6313f3ee41e2f28204b8de607a25340b579ac761976cae3a9a9e90785afd31885d362411ef23cd8fef4aa6dac6acb5ded04e547ce7a3bfaab8d914fb6ee79d501a7aa400000080000000005268d9ee158864d444d4bf66e8d85cc74a000000000000000000"], 0x10}}, 0x0) 08:00:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x8003, &(0x7f0000000300)=0x75f, 0x9) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x5) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) [ 211.269449][ T9186] netlink: 'syz-executor.5': attribute type 24 has an invalid length. [ 211.318555][ T9186] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 211.372831][ T9186] INFO: trying to register non-static key. [ 211.378679][ T9186] the code is fine but needs lockdep annotation. [ 211.384996][ T9186] turning off the locking correctness validator. [ 211.391327][ T9186] CPU: 0 PID: 9186 Comm: syz-executor.5 Not tainted 5.4.0-rc5-next-20191028 #0 [ 211.400248][ T9186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.410293][ T9186] Call Trace: [ 211.413589][ T9186] dump_stack+0x172/0x1f0 [ 211.417921][ T9186] register_lock_class+0x179e/0x1850 [ 211.423209][ T9186] ? __this_cpu_preempt_check+0x35/0x190 [ 211.428841][ T9186] ? is_dynamic_key+0x1c0/0x1c0 [ 211.433695][ T9186] __lock_acquire+0xf4/0x4a00 [ 211.438369][ T9186] ? _raw_spin_unlock_irqrestore+0x9f/0xe0 [ 211.444178][ T9186] ? stack_depot_save+0x25a/0x450 [ 211.449202][ T9186] ? mark_held_locks+0xf0/0xf0 [ 211.453965][ T9186] ? kasan_kmalloc+0x9/0x10 [ 211.458468][ T9186] ? __kasan_check_read+0x11/0x20 [ 211.463508][ T9186] ? mark_lock+0xc2/0x1220 [ 211.467921][ T9186] lock_acquire+0x190/0x410 [ 211.472422][ T9186] ? bond_3ad_update_ad_actor_settings+0x37b/0x7b0 [ 211.478930][ T9186] _raw_spin_lock_bh+0x33/0x50 [ 211.483693][ T9186] ? bond_3ad_update_ad_actor_settings+0x37b/0x7b0 [ 211.490194][ T9186] bond_3ad_update_ad_actor_settings+0x37b/0x7b0 [ 211.496519][ T9186] ? bond_3ad_bind_slave+0x12e0/0x12e0 [ 211.501978][ T9186] ? __this_cpu_preempt_check+0x35/0x190 [ 211.507606][ T9186] bond_option_ad_actor_sys_prio_set+0x67/0x80 [ 211.513757][ T9186] __bond_opt_set+0x2a1/0x540 [ 211.518431][ T9186] bond_changelink+0x14ed/0x1bd0 [ 211.523366][ T9186] ? memset+0x32/0x40 [ 211.527343][ T9186] ? bond_slave_changelink+0x1e0/0x1e0 [ 211.532802][ T9186] bond_newlink+0x2d/0x90 [ 211.537128][ T9186] ? bond_changelink+0x1bd0/0x1bd0 [ 211.542234][ T9186] __rtnl_newlink+0x10a1/0x16e0 [ 211.547088][ T9186] ? rtnl_link_unregister+0x250/0x250 [ 211.552457][ T9186] ? mark_held_locks+0xa4/0xf0 [ 211.557226][ T9186] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 211.562685][ T9186] ? retint_kernel+0x2b/0x2b [ 211.567277][ T9186] ? trace_hardirqs_on_caller+0x6a/0x240 [ 211.572909][ T9186] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 211.578363][ T9186] ? __this_cpu_preempt_check+0x35/0x190 [ 211.583990][ T9186] ? retint_kernel+0x2b/0x2b [ 211.588583][ T9186] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 211.594751][ T9186] ? save_stack+0x5c/0x90 [ 211.599163][ T9186] ? save_stack+0x23/0x90 [ 211.603512][ T9186] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 211.609312][ T9186] ? kasan_kmalloc+0x9/0x10 [ 211.613808][ T9186] ? kmem_cache_alloc_trace+0x158/0x790 [ 211.619368][ T9186] ? rtnl_newlink+0x4b/0xa0 [ 211.623870][ T9186] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 211.629413][ T9186] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 211.635394][ T9186] ? __rtnl_newlink+0x16e0/0x16e0 [ 211.640413][ T9186] rtnl_newlink+0x69/0xa0 [ 211.644736][ T9186] ? __rtnl_newlink+0x16e0/0x16e0 [ 211.649760][ T9186] rtnetlink_rcv_msg+0x45e/0xaf0 [ 211.654694][ T9186] ? rtnl_bridge_getlink+0x910/0x910 [ 211.659977][ T9186] ? retint_kernel+0x2b/0x2b [ 211.664565][ T9186] ? rtnl_bridge_getlink+0x910/0x910 [ 211.669854][ T9186] netlink_rcv_skb+0x177/0x450 08:00:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x8003, &(0x7f0000000300)=0x75f, 0x9) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x5) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) 08:00:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x8003, &(0x7f0000000300)=0x75f, 0x9) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x5) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) [ 211.674615][ T9186] ? rtnl_bridge_getlink+0x910/0x910 [ 211.679897][ T9186] ? netlink_ack+0xb50/0xb50 [ 211.684485][ T9186] ? __rcu_read_unlock+0x220/0x6b0 [ 211.689590][ T9186] ? __kasan_check_read+0x11/0x20 [ 211.694618][ T9186] ? netlink_deliver_tap+0x24a/0xbe0 [ 211.699899][ T9186] rtnetlink_rcv+0x1d/0x30 [ 211.704314][ T9186] netlink_unicast+0x531/0x710 [ 211.709076][ T9186] ? netlink_attachskb+0x7c0/0x7c0 [ 211.714195][ T9186] ? netlink_sendmsg+0x879/0xda0 [ 211.719129][ T9186] ? write_comp_data+0x1e/0x70 [ 211.723891][ T9186] netlink_sendmsg+0x8cf/0xda0 [ 211.728656][ T9186] ? netlink_unicast+0x710/0x710 [ 211.733594][ T9186] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 211.739142][ T9186] ? apparmor_socket_sendmsg+0x2a/0x30 [ 211.740698][ T3918] kobject: 'loop4' (0000000037890303): kobject_uevent_env [ 211.744600][ T9186] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 211.752164][ T3918] kobject: 'loop4' (0000000037890303): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 211.757900][ T9186] ? security_socket_sendmsg+0x8d/0xc0 [ 211.757914][ T9186] ? netlink_unicast+0x710/0x710 [ 211.757928][ T9186] sock_sendmsg+0xd7/0x130 [ 211.757944][ T9186] ___sys_sendmsg+0x803/0x920 [ 211.771352][ T3918] kobject: 'loop0' (000000004e62b20f): kobject_uevent_env [ 211.773504][ T9186] ? copy_msghdr_from_user+0x440/0x440 [ 211.773522][ T9186] ? __kasan_check_read+0x11/0x20 [ 211.773534][ T9186] ? __fget+0x37f/0x550 [ 211.773549][ T9186] ? ksys_dup3+0x3e0/0x3e0 [ 211.778612][ T3918] kobject: 'loop0' (000000004e62b20f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 211.782862][ T9186] ? check_memory_region+0x21/0x1a0 [ 211.782877][ T9186] ? __fget_light+0x1a9/0x230 [ 211.782889][ T9186] ? __fdget+0x1b/0x20 [ 211.782903][ T9186] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 211.782918][ T9186] __sys_sendmsg+0x105/0x1d0 [ 211.782930][ T9186] ? __sys_sendmsg_sock+0xd0/0xd0 [ 211.782950][ T9186] ? __this_cpu_preempt_check+0x35/0x190 [ 211.859262][ T9186] ? do_syscall_64+0xc0/0x760 [ 211.863921][ T9186] __x64_sys_sendmsg+0x78/0xb0 [ 211.868670][ T9186] do_syscall_64+0xfa/0x760 [ 211.873164][ T9186] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 211.879038][ T9186] RIP: 0033:0x459f49 [ 211.882914][ T9186] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 211.902545][ T9186] RSP: 002b:00007f07aa1f7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 211.910943][ T9186] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f49 08:00:14 executing program 3: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x2, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) msgctl$IPC_STAT(0xffffffffffffffff, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket$netlink(0x10, 0x3, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000180)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket$inet(0x2, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) [ 211.918899][ T9186] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000004 [ 211.926864][ T9186] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 211.934812][ T9186] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f07aa1f86d4 [ 211.942767][ T9186] R13: 00000000004c8338 R14: 00000000004de608 R15: 00000000ffffffff [ 211.956803][ T3918] kobject: 'loop3' (000000004d045281): kobject_uevent_env [ 211.965395][ T3918] kobject: 'loop3' (000000004d045281): fill_kobj_path: path = '/devices/virtual/block/loop3' 08:00:14 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0xfffffffe, 0x32}, 0x0, @in=@dev, 0x0, 0x0, 0x0, 0x5, 0x0, 0x7ff}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902000000a8a9890000007ba79554354cdddb4e767263a7192f6f0100000028db38a5668b145e6313f3ee41e2f28204b8de607a25340b579ac761976cae3a9a9e90785afd31885d362411ef23cd8fef4aa6dac6acb5ded04e547ce7a3bfaab8d914fb6ee79d501a7aa400000080000000005268d9ee158864d444d4bf66e8d85cc74a000000000000000000"], 0x10}}, 0x0) [ 211.978648][ T9186] kobject: 'bond1' (00000000bd9487c5): kobject_add_internal: parent: 'net', set: 'devices' [ 212.006006][ T9186] kobject: 'bond1' (00000000bd9487c5): kobject_uevent_env [ 212.018122][ T9186] kobject: 'bond1' (00000000bd9487c5): fill_kobj_path: path = '/devices/virtual/net/bond1' [ 212.020139][ T3918] kobject: 'loop1' (00000000677d8a3c): kobject_uevent_env [ 212.032413][ T9186] kobject: 'queues' (00000000e2d504f5): kobject_add_internal: parent: 'bond1', set: '' [ 212.045693][ T9186] kobject: 'queues' (00000000e2d504f5): kobject_uevent_env [ 212.049168][ T3918] kobject: 'loop1' (00000000677d8a3c): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 212.053015][ T9186] kobject: 'queues' (00000000e2d504f5): kobject_uevent_env: filter function caused the event to drop! [ 212.053045][ T9186] kobject: 'rx-0' (00000000952716cf): kobject_add_internal: parent: 'queues', set: 'queues' [ 212.053105][ T9186] kobject: 'rx-0' (00000000952716cf): kobject_uevent_env [ 212.092270][ T9186] kobject: 'rx-0' (00000000952716cf): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-0' [ 212.103427][ T9186] kobject: 'rx-1' (00000000d140149e): kobject_add_internal: parent: 'queues', set: 'queues' [ 212.113686][ T9186] kobject: 'rx-1' (00000000d140149e): kobject_uevent_env [ 212.120898][ T9186] kobject: 'rx-1' (00000000d140149e): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-1' [ 212.134199][ T9186] kobject: 'rx-2' (000000001c530ab5): kobject_add_internal: parent: 'queues', set: 'queues' [ 212.152852][ T9186] kobject: 'rx-2' (000000001c530ab5): kobject_uevent_env [ 212.159942][ T9186] kobject: 'rx-2' (000000001c530ab5): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-2' [ 212.174154][ T9186] kobject: 'rx-3' (00000000e42f7289): kobject_add_internal: parent: 'queues', set: 'queues' [ 212.193582][ T9186] kobject: 'rx-3' (00000000e42f7289): kobject_uevent_env [ 212.216382][ T9186] kobject: 'rx-3' (00000000e42f7289): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-3' [ 212.246589][ T9186] kobject: 'rx-4' (000000007b5eaf37): kobject_add_internal: parent: 'queues', set: 'queues' [ 212.266558][ T9186] kobject: 'rx-4' (000000007b5eaf37): kobject_uevent_env [ 212.283284][ T9186] kobject: 'rx-4' (000000007b5eaf37): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-4' [ 212.297346][ T9186] kobject: 'rx-5' (000000007298c9e3): kobject_add_internal: parent: 'queues', set: 'queues' [ 212.307669][ T9186] kobject: 'rx-5' (000000007298c9e3): kobject_uevent_env [ 212.317795][ T9186] kobject: 'rx-5' (000000007298c9e3): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-5' [ 212.329100][ T9186] kobject: 'rx-6' (000000005c74452d): kobject_add_internal: parent: 'queues', set: 'queues' 08:00:14 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000001c0)=0xfc, 0x4) bind$inet6(r0, &(0x7f0000000240), 0x1c) [ 212.342190][ T9186] kobject: 'rx-6' (000000005c74452d): kobject_uevent_env [ 212.349322][ T9186] kobject: 'rx-6' (000000005c74452d): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-6' [ 212.369905][ T9186] kobject: 'rx-7' (000000007533d589): kobject_add_internal: parent: 'queues', set: 'queues' [ 212.383618][ T9186] kobject: 'rx-7' (000000007533d589): kobject_uevent_env 08:00:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) set_mempolicy(0x8003, &(0x7f0000000300)=0x75f, 0x9) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x5) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) [ 212.391104][ T9186] kobject: 'rx-7' (000000007533d589): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-7' [ 212.397325][ T3918] kobject: 'loop2' (00000000d46815b4): kobject_uevent_env [ 212.404697][ T9186] kobject: 'rx-8' (00000000342329b8): kobject_add_internal: parent: 'queues', set: 'queues' [ 212.409557][ T3918] kobject: 'loop2' (00000000d46815b4): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 212.419761][ T9186] kobject: 'rx-8' (00000000342329b8): kobject_uevent_env 08:00:14 executing program 4: r0 = socket(0x10, 0x80002, 0x0) connect$netlink(r0, &(0x7f00000014c0)=@kern={0x10, 0x0, 0x0, 0x40000000}, 0x20) getpeername$packet(r0, 0x0, &(0x7f0000000180)) 08:00:14 executing program 2: unshare(0x400) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000140)) [ 212.480620][ T9186] kobject: 'rx-8' (00000000342329b8): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-8' [ 212.500870][ T3918] kobject: 'loop4' (0000000037890303): kobject_uevent_env [ 212.510716][ T9186] kobject: 'rx-9' (000000001dc56543): kobject_add_internal: parent: 'queues', set: 'queues' 08:00:14 executing program 4: getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffffc, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100), 0x0) bind$unix(r0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000002c0)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r3 = socket(0x10, 0x400000000080803, 0x0) write(r3, &(0x7f0000000040), 0x0) recvmmsg(r3, &(0x7f0000004040)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000140)=""/116, 0x74}, {&(0x7f00000001c0)=""/4096, 0x1000}], 0x2}}], 0x663, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r4, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001480)='/proc/capi/capi20\x00', 0x200000, 0x0) syz_open_dev$vbi(&(0x7f00000014c0)='/dev/vbi#\x00', 0x0, 0x2) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r6, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r7 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r7, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) openat$vfio(0xffffffffffffff9c, &(0x7f0000001500)='/dev/vfio/vfio\x00', 0x10000, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r8) r9 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r9, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r10 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r10, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r11) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r12) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001540), &(0x7f0000001580)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, 0x0) r14 = semget$private(0x0, 0x0, 0x10e) r15 = getgid() r16 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) semctl$IPC_SET(r14, 0x0, 0x1, &(0x7f00000005c0)={{0x0, 0x0, r15, r16}, 0x0, 0x6072, 0x80000001}) chown(0x0, r13, r17) accept4$unix(r0, &(0x7f0000001a80)=@abs, &(0x7f0000001b00)=0x6e, 0x800) r18 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r18, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r19 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r19) socket$can_raw(0x1d, 0x3, 0x1) r20 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r20, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001e80), &(0x7f0000001ec0)=0xc) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000001f00)='/proc/capi/capi20ncci\x00', 0x20402, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000001f40)='/dev/full\x00', 0x600200, 0x0) r21 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r21) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001f80)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r22 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r22) fcntl$getown(r22, 0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002440), &(0x7f0000002480)=0xc) r23 = semget$private(0x0, 0x0, 0x10e) r24 = getgid() r25 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) semctl$IPC_SET(r23, 0x0, 0x1, &(0x7f00000005c0)={{0x0, 0x0, r24, r25, r26, 0x41}, 0x0, 0x6072, 0x80000001}) syz_open_dev$sndtimer(&(0x7f0000003c00)='/dev/snd/timer\x00', 0x0, 0x80) r27 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r27) r28 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r29 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r29, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x4, 0x0, 'lblc\x00'}, 0x2c) getsockopt$inet_pktinfo(r28, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) r30 = fcntl$getown(r29, 0x9) fcntl$lock(r28, 0x27, &(0x7f0000000280)={0x4, 0x3, 0x0, 0x3f, r30}) r31 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r32 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r32, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x4, 0x0, 'lblc\x00'}, 0x2c) getsockopt$inet_pktinfo(r31, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) r33 = fcntl$getown(r32, 0x9) fcntl$lock(r31, 0x27, &(0x7f0000000280)={0x4, 0x0, 0x5ba, 0x3f, r33}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, 0x0) r35 = semget$private(0x0, 0x0, 0x10e) r36 = getgid() r37 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) semctl$IPC_SET(r35, 0x0, 0x1, &(0x7f00000005c0)={{0x0, 0x0, r36, r37, r38, 0x41}, 0x0, 0x6072, 0x80000001}) chown(0x0, r34, r38) r39 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r39, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r40 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r40) socket$inet6_tcp(0xa, 0x1, 0x0) close(0xffffffffffffffff) r41 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r41, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r42 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r42) bind$netlink(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r43 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r43) r44 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r44) openat$udambuf(0xffffffffffffff9c, &(0x7f0000003ec0)='/dev/udmabuf\x00', 0x2) openat$capi20(0xffffffffffffff9c, &(0x7f0000003f00)='/dev/capi20\x00', 0x444142, 0x0) syz_open_dev$amidi(&(0x7f0000003f40)='/dev/amidi#\x00', 0x4c, 0x400000) socket$vsock_dgram(0x28, 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000003f80)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000003fc0)='net/nfsfs\x00') r45 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r46 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r46, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x4, 0x0, 'lblc\x00'}, 0x2c) getsockopt$inet_pktinfo(r45, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) fcntl$lock(r45, 0x27, &(0x7f0000000280)={0x4, 0x3, 0x5ba, 0x3f}) syz_open_procfs$namespace(0x0, &(0x7f0000004000)='ns/user\x00') socket$netlink(0x10, 0x3, 0x4) write(r1, &(0x7f0000000100)="b63db85e1e8d040000000000003ef0011dcc606aed69d2bc7037cebc9bc2feffffffffffffffe22c9b160096aa1fae1acfbd6cbf87798a9b02de7a91a3cbdfa009cf75a7eadb2a00", 0x48) [ 212.541766][ T9186] kobject: 'rx-9' (000000001dc56543): kobject_uevent_env [ 212.551280][ T3918] kobject: 'loop4' (0000000037890303): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 212.563924][ T9186] kobject: 'rx-9' (000000001dc56543): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-9' [ 212.597596][ T3918] kobject: 'loop0' (000000004e62b20f): kobject_uevent_env [ 212.614296][ T9186] kobject: 'rx-10' (0000000091f92016): kobject_add_internal: parent: 'queues', set: 'queues' [ 212.627679][ T3918] kobject: 'loop0' (000000004e62b20f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 212.638262][ T9186] kobject: 'rx-10' (0000000091f92016): kobject_uevent_env [ 212.648541][ T3918] kobject: 'loop1' (00000000677d8a3c): kobject_uevent_env [ 212.656451][ T9186] kobject: 'rx-10' (0000000091f92016): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-10' [ 212.680537][ T3918] kobject: 'loop1' (00000000677d8a3c): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 212.691371][ T9186] kobject: 'rx-11' (0000000033bec139): kobject_add_internal: parent: 'queues', set: 'queues' [ 212.703365][ T3918] kobject: 'loop2' (00000000d46815b4): kobject_uevent_env [ 212.710598][ T9186] kobject: 'rx-11' (0000000033bec139): kobject_uevent_env [ 212.717896][ T9186] kobject: 'rx-11' (0000000033bec139): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-11' [ 212.729252][ T3918] kobject: 'loop2' (00000000d46815b4): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 212.741455][ T3918] kobject: 'loop3' (000000004d045281): kobject_uevent_env [ 212.748596][ T3918] kobject: 'loop3' (000000004d045281): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 212.758884][ T9186] kobject: 'rx-12' (00000000c82cb213): kobject_add_internal: parent: 'queues', set: 'queues' [ 212.774754][ T9248] sg_write: data in/out 298234/24 bytes for SCSI command 0xff-- guessing data in; [ 212.774754][ T9248] program syz-executor.4 not setting count and/or reply_len properly [ 212.796658][ T9186] kobject: 'rx-12' (00000000c82cb213): kobject_uevent_env [ 212.815843][ T9186] kobject: 'rx-12' (00000000c82cb213): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-12' [ 212.827608][ T9186] kobject: 'rx-13' (00000000b5503068): kobject_add_internal: parent: 'queues', set: 'queues' [ 212.837856][ T9186] kobject: 'rx-13' (00000000b5503068): kobject_uevent_env [ 212.845473][ T9186] kobject: 'rx-13' (00000000b5503068): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-13' [ 212.856682][ T9186] kobject: 'rx-14' (00000000c4a82aea): kobject_add_internal: parent: 'queues', set: 'queues' [ 212.866911][ T9186] kobject: 'rx-14' (00000000c4a82aea): kobject_uevent_env [ 212.874064][ T9186] kobject: 'rx-14' (00000000c4a82aea): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-14' [ 212.885235][ T9186] kobject: 'rx-15' (000000007b051eb6): kobject_add_internal: parent: 'queues', set: 'queues' [ 212.895465][ T9186] kobject: 'rx-15' (000000007b051eb6): kobject_uevent_env [ 212.902829][ T9186] kobject: 'rx-15' (000000007b051eb6): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/rx-15' [ 212.914055][ T9186] kobject: 'tx-0' (000000004d72b1a0): kobject_add_internal: parent: 'queues', set: 'queues' [ 212.924254][ T9186] kobject: 'tx-0' (000000004d72b1a0): kobject_uevent_env [ 212.931339][ T9186] kobject: 'tx-0' (000000004d72b1a0): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-0' [ 212.942381][ T9186] kobject: 'tx-1' (00000000e50f9742): kobject_add_internal: parent: 'queues', set: 'queues' [ 212.952602][ T9186] kobject: 'tx-1' (00000000e50f9742): kobject_uevent_env [ 212.959633][ T9186] kobject: 'tx-1' (00000000e50f9742): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-1' [ 212.970669][ T9186] kobject: 'tx-2' (0000000015a84c99): kobject_add_internal: parent: 'queues', set: 'queues' [ 212.980891][ T9186] kobject: 'tx-2' (0000000015a84c99): kobject_uevent_env [ 212.987920][ T9186] kobject: 'tx-2' (0000000015a84c99): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-2' [ 212.998984][ T9186] kobject: 'tx-3' (000000006c019f8a): kobject_add_internal: parent: 'queues', set: 'queues' [ 213.009147][ T9186] kobject: 'tx-3' (000000006c019f8a): kobject_uevent_env [ 213.016222][ T9186] kobject: 'tx-3' (000000006c019f8a): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-3' [ 213.027219][ T9186] kobject: 'tx-4' (00000000474fae5b): kobject_add_internal: parent: 'queues', set: 'queues' [ 213.037493][ T9186] kobject: 'tx-4' (00000000474fae5b): kobject_uevent_env [ 213.044587][ T9186] kobject: 'tx-4' (00000000474fae5b): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-4' [ 213.055662][ T9186] kobject: 'tx-5' (00000000181f47e3): kobject_add_internal: parent: 'queues', set: 'queues' [ 213.065816][ T9186] kobject: 'tx-5' (00000000181f47e3): kobject_uevent_env [ 213.072905][ T9186] kobject: 'tx-5' (00000000181f47e3): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-5' [ 213.084073][ T9186] kobject: 'tx-6' (000000001c307644): kobject_add_internal: parent: 'queues', set: 'queues' [ 213.094296][ T9186] kobject: 'tx-6' (000000001c307644): kobject_uevent_env [ 213.101347][ T9186] kobject: 'tx-6' (000000001c307644): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-6' [ 213.112389][ T9186] kobject: 'tx-7' (00000000664f5034): kobject_add_internal: parent: 'queues', set: 'queues' [ 213.122546][ T9186] kobject: 'tx-7' (00000000664f5034): kobject_uevent_env [ 213.129565][ T9186] kobject: 'tx-7' (00000000664f5034): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-7' [ 213.140644][ T9186] kobject: 'tx-8' (00000000b27a1533): kobject_add_internal: parent: 'queues', set: 'queues' [ 213.150870][ T9186] kobject: 'tx-8' (00000000b27a1533): kobject_uevent_env [ 213.157901][ T9186] kobject: 'tx-8' (00000000b27a1533): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-8' [ 213.169284][ T9186] kobject: 'tx-9' (00000000d3ceb2e9): kobject_add_internal: parent: 'queues', set: 'queues' [ 213.179534][ T9186] kobject: 'tx-9' (00000000d3ceb2e9): kobject_uevent_env [ 213.186604][ T9186] kobject: 'tx-9' (00000000d3ceb2e9): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-9' [ 213.197623][ T9186] kobject: 'tx-10' (00000000331f7389): kobject_add_internal: parent: 'queues', set: 'queues' [ 213.207883][ T9186] kobject: 'tx-10' (00000000331f7389): kobject_uevent_env [ 213.215028][ T9186] kobject: 'tx-10' (00000000331f7389): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-10' [ 213.226236][ T9186] kobject: 'tx-11' (000000002702327b): kobject_add_internal: parent: 'queues', set: 'queues' [ 213.236613][ T9186] kobject: 'tx-11' (000000002702327b): kobject_uevent_env [ 213.243838][ T9186] kobject: 'tx-11' (000000002702327b): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-11' [ 213.255112][ T9186] kobject: 'tx-12' (00000000eb086279): kobject_add_internal: parent: 'queues', set: 'queues' [ 213.265450][ T9186] kobject: 'tx-12' (00000000eb086279): kobject_uevent_env [ 213.272651][ T9186] kobject: 'tx-12' (00000000eb086279): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-12' [ 213.283872][ T9186] kobject: 'tx-13' (000000006799120d): kobject_add_internal: parent: 'queues', set: 'queues' [ 213.294186][ T9186] kobject: 'tx-13' (000000006799120d): kobject_uevent_env [ 213.301349][ T9186] kobject: 'tx-13' (000000006799120d): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-13' [ 213.313089][ T9186] kobject: 'tx-14' (000000003bbae05c): kobject_add_internal: parent: 'queues', set: 'queues' [ 213.317495][ T3918] kobject: 'loop0' (000000004e62b20f): kobject_uevent_env [ 213.323458][ T9186] kobject: 'tx-14' (000000003bbae05c): kobject_uevent_env [ 213.333040][ T3918] kobject: 'loop0' (000000004e62b20f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 213.337564][ T9186] kobject: 'tx-14' (000000003bbae05c): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-14' [ 213.358920][ T9186] kobject: 'tx-15' (0000000076885c47): kobject_add_internal: parent: 'queues', set: 'queues' [ 213.369294][ T9186] kobject: 'tx-15' (0000000076885c47): kobject_uevent_env [ 213.376462][ T9186] kobject: 'tx-15' (0000000076885c47): fill_kobj_path: path = '/devices/virtual/net/bond1/queues/tx-15' [ 213.388118][ T9186] kobject: 'batman_adv' (0000000071176c6d): kobject_add_internal: parent: 'bond1', set: '' [ 213.398993][ T9215] netlink: 'syz-executor.5': attribute type 24 has an invalid length. [ 213.408803][ T9215] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 08:00:15 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="440000001000010500"/20, @ANYRES32=0x0, @ANYBLOB="8410000000000000240012000c000100626f6e640000000014000200080018003f0000000800010004000000db35fb6fe1db5e9d607201c39064e152c1194e0493caff0287851f7b93c177fbeb2c5fcefd126c050ed2bb76bb10cea37c739aa283090d8d91041f12b8d13042e78614cceb3f5ab48930f1f02967cdb4ceb945d83f970b280956624115367094f1bf3c288d845f20bc4e75db797d3bd9e90ff23b68eef75364b7da524330e9ab149c1b0f549493"], 0x44}}, 0x0) 08:00:15 executing program 2: unshare(0x400) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000140)) 08:00:15 executing program 1: unshare(0x400) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000140)) 08:00:15 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000180)={0x1, @win={{0x0, 0x0, 0x30314247}, 0x0, 0x0, 0x0, 0x0, 0x0}}) 08:00:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") bind$alg(r0, &(0x7f0000000240)={0x2, 'skcipher\x00', 0x0, 0x0, 'xts(ecb-camellia-aesni)\x00'}, 0x58) [ 213.580620][ T3918] kobject: 'loop5' (0000000090add63f): kobject_uevent_env [ 213.595295][ T3918] kobject: 'loop5' (0000000090add63f): fill_kobj_path: path = '/devices/virtual/block/loop5' 08:00:15 executing program 2: unshare(0x400) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000140)) 08:00:16 executing program 3: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(0xffffffffffffffff, 0x110, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) getdents64(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) io_setup(0x9, &(0x7f0000000380)=0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x101202, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 08:00:16 executing program 4: getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffffc, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100), 0x0) bind$unix(r0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000002c0)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r3 = socket(0x10, 0x400000000080803, 0x0) write(r3, &(0x7f0000000040), 0x0) recvmmsg(r3, &(0x7f0000004040)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000140)=""/116, 0x74}, {&(0x7f00000001c0)=""/4096, 0x1000}], 0x2}}], 0x663, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r4, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001480)='/proc/capi/capi20\x00', 0x200000, 0x0) syz_open_dev$vbi(&(0x7f00000014c0)='/dev/vbi#\x00', 0x0, 0x2) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r6, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r7 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r7, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) openat$vfio(0xffffffffffffff9c, &(0x7f0000001500)='/dev/vfio/vfio\x00', 0x10000, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r8) r9 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r9, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r10 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r10, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r11) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r12) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001540), &(0x7f0000001580)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, 0x0) r14 = semget$private(0x0, 0x0, 0x10e) r15 = getgid() r16 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) semctl$IPC_SET(r14, 0x0, 0x1, &(0x7f00000005c0)={{0x0, 0x0, r15, r16}, 0x0, 0x6072, 0x80000001}) chown(0x0, r13, r17) accept4$unix(r0, &(0x7f0000001a80)=@abs, &(0x7f0000001b00)=0x6e, 0x800) r18 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r18, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r19 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r19) socket$can_raw(0x1d, 0x3, 0x1) r20 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r20, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001e80), &(0x7f0000001ec0)=0xc) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000001f00)='/proc/capi/capi20ncci\x00', 0x20402, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000001f40)='/dev/full\x00', 0x600200, 0x0) r21 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r21) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001f80)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r22 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r22) fcntl$getown(r22, 0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002440), &(0x7f0000002480)=0xc) r23 = semget$private(0x0, 0x0, 0x10e) r24 = getgid() r25 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) semctl$IPC_SET(r23, 0x0, 0x1, &(0x7f00000005c0)={{0x0, 0x0, r24, r25, r26, 0x41}, 0x0, 0x6072, 0x80000001}) syz_open_dev$sndtimer(&(0x7f0000003c00)='/dev/snd/timer\x00', 0x0, 0x80) r27 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r27) r28 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r29 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r29, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x4, 0x0, 'lblc\x00'}, 0x2c) getsockopt$inet_pktinfo(r28, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) r30 = fcntl$getown(r29, 0x9) fcntl$lock(r28, 0x27, &(0x7f0000000280)={0x4, 0x3, 0x0, 0x3f, r30}) r31 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r32 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r32, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x4, 0x0, 'lblc\x00'}, 0x2c) getsockopt$inet_pktinfo(r31, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) r33 = fcntl$getown(r32, 0x9) fcntl$lock(r31, 0x27, &(0x7f0000000280)={0x4, 0x0, 0x5ba, 0x3f, r33}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, 0x0) r35 = semget$private(0x0, 0x0, 0x10e) r36 = getgid() r37 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) semctl$IPC_SET(r35, 0x0, 0x1, &(0x7f00000005c0)={{0x0, 0x0, r36, r37, r38, 0x41}, 0x0, 0x6072, 0x80000001}) chown(0x0, r34, r38) r39 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r39, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r40 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r40) socket$inet6_tcp(0xa, 0x1, 0x0) close(0xffffffffffffffff) r41 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r41, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r42 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r42) bind$netlink(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r43 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r43) r44 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r44) openat$udambuf(0xffffffffffffff9c, &(0x7f0000003ec0)='/dev/udmabuf\x00', 0x2) openat$capi20(0xffffffffffffff9c, &(0x7f0000003f00)='/dev/capi20\x00', 0x444142, 0x0) syz_open_dev$amidi(&(0x7f0000003f40)='/dev/amidi#\x00', 0x4c, 0x400000) socket$vsock_dgram(0x28, 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000003f80)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000003fc0)='net/nfsfs\x00') r45 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r46 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r46, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x4, 0x0, 'lblc\x00'}, 0x2c) getsockopt$inet_pktinfo(r45, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) fcntl$lock(r45, 0x27, &(0x7f0000000280)={0x4, 0x3, 0x5ba, 0x3f}) syz_open_procfs$namespace(0x0, &(0x7f0000004000)='ns/user\x00') socket$netlink(0x10, 0x3, 0x4) write(r1, &(0x7f0000000100)="b63db85e1e8d040000000000003ef0011dcc606aed69d2bc7037cebc9bc2feffffffffffffffe22c9b160096aa1fae1acfbd6cbf87798a9b02de7a91a3cbdfa009cf75a7eadb2a00", 0x48) [ 213.633005][ T9268] netlink: 'syz-executor.5': attribute type 24 has an invalid length. [ 213.654511][ T3918] kobject: 'loop3' (000000004d045281): kobject_uevent_env [ 213.668953][ T9268] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 08:00:16 executing program 1: unshare(0x400) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000140)) [ 213.685252][ T3918] kobject: 'loop3' (000000004d045281): fill_kobj_path: path = '/devices/virtual/block/loop3' 08:00:16 executing program 2: unshare(0x400) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000140)) 08:00:16 executing program 2: getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffffc, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100), 0x0) bind$unix(r0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000002c0)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r3 = socket(0x10, 0x400000000080803, 0x0) write(r3, &(0x7f0000000040), 0x0) recvmmsg(r3, &(0x7f0000004040)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000140)=""/116, 0x74}, {&(0x7f00000001c0)=""/4096, 0x1000}], 0x2}}], 0x663, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r4, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001480)='/proc/capi/capi20\x00', 0x200000, 0x0) syz_open_dev$vbi(&(0x7f00000014c0)='/dev/vbi#\x00', 0x0, 0x2) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r6, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r7 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r7, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) openat$vfio(0xffffffffffffff9c, &(0x7f0000001500)='/dev/vfio/vfio\x00', 0x10000, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r8) r9 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r9, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r10 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r10, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r11) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r12) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001540), &(0x7f0000001580)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, 0x0) r14 = semget$private(0x0, 0x0, 0x10e) r15 = getgid() r16 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) semctl$IPC_SET(r14, 0x0, 0x1, &(0x7f00000005c0)={{0x0, 0x0, r15, r16}, 0x0, 0x6072, 0x80000001}) chown(0x0, r13, r17) accept4$unix(r0, &(0x7f0000001a80)=@abs, &(0x7f0000001b00)=0x6e, 0x800) r18 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r18, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r19 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r19) socket$can_raw(0x1d, 0x3, 0x1) r20 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r20, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001e80), &(0x7f0000001ec0)=0xc) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000001f00)='/proc/capi/capi20ncci\x00', 0x20402, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000001f40)='/dev/full\x00', 0x600200, 0x0) r21 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r21) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001f80)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r22 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r22) fcntl$getown(r22, 0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002440), &(0x7f0000002480)=0xc) r23 = semget$private(0x0, 0x0, 0x10e) r24 = getgid() r25 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) semctl$IPC_SET(r23, 0x0, 0x1, &(0x7f00000005c0)={{0x0, 0x0, r24, r25, r26, 0x41}, 0x0, 0x6072, 0x80000001}) syz_open_dev$sndtimer(&(0x7f0000003c00)='/dev/snd/timer\x00', 0x0, 0x80) r27 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r27) r28 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r29 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r29, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x4, 0x0, 'lblc\x00'}, 0x2c) getsockopt$inet_pktinfo(r28, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) r30 = fcntl$getown(r29, 0x9) fcntl$lock(r28, 0x27, &(0x7f0000000280)={0x4, 0x3, 0x0, 0x3f, r30}) r31 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r32 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r32, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x4, 0x0, 'lblc\x00'}, 0x2c) getsockopt$inet_pktinfo(r31, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) r33 = fcntl$getown(r32, 0x9) fcntl$lock(r31, 0x27, &(0x7f0000000280)={0x4, 0x0, 0x5ba, 0x3f, r33}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, 0x0) r35 = semget$private(0x0, 0x0, 0x10e) r36 = getgid() r37 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) semctl$IPC_SET(r35, 0x0, 0x1, &(0x7f00000005c0)={{0x0, 0x0, r36, r37, r38, 0x41}, 0x0, 0x6072, 0x80000001}) chown(0x0, r34, r38) r39 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r39, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r40 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r40) socket$inet6_tcp(0xa, 0x1, 0x0) close(0xffffffffffffffff) r41 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r41, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r42 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r42) bind$netlink(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r43 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r43) r44 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r44) openat$udambuf(0xffffffffffffff9c, &(0x7f0000003ec0)='/dev/udmabuf\x00', 0x2) openat$capi20(0xffffffffffffff9c, &(0x7f0000003f00)='/dev/capi20\x00', 0x444142, 0x0) syz_open_dev$amidi(&(0x7f0000003f40)='/dev/amidi#\x00', 0x4c, 0x400000) socket$vsock_dgram(0x28, 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000003f80)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000003fc0)='net/nfsfs\x00') r45 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r46 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r46, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x4, 0x0, 'lblc\x00'}, 0x2c) getsockopt$inet_pktinfo(r45, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) fcntl$lock(r45, 0x27, &(0x7f0000000280)={0x4, 0x3, 0x5ba, 0x3f}) syz_open_procfs$namespace(0x0, &(0x7f0000004000)='ns/user\x00') socket$netlink(0x10, 0x3, 0x4) write(r1, &(0x7f0000000100)="b63db85e1e8d040000000000003ef0011dcc606aed69d2bc7037cebc9bc2feffffffffffffffe22c9b160096aa1fae1acfbd6cbf87798a9b02de7a91a3cbdfa009cf75a7eadb2a00", 0x48) [ 213.726365][ T9268] kobject: 'bond2' (0000000039dd10ef): kobject_add_internal: parent: 'net', set: 'devices' 08:00:16 executing program 1: unshare(0x400) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000140)) [ 213.768085][ T3918] kobject: 'loop2' (00000000d46815b4): kobject_uevent_env [ 213.795669][ T9268] kobject: 'bond2' (0000000039dd10ef): kobject_uevent_env [ 213.817500][ T3918] kobject: 'loop2' (00000000d46815b4): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 213.843918][ T9268] kobject: 'bond2' (0000000039dd10ef): fill_kobj_path: path = '/devices/virtual/net/bond2' [ 213.854940][ T9268] kobject: 'queues' (000000006975b3b5): kobject_add_internal: parent: 'bond2', set: '' [ 213.858807][ T3918] kobject: 'loop4' (0000000037890303): kobject_uevent_env [ 213.865852][ T9268] kobject: 'queues' (000000006975b3b5): kobject_uevent_env [ 213.879724][ T9268] kobject: 'queues' (000000006975b3b5): kobject_uevent_env: filter function caused the event to drop! [ 213.886674][ T3918] kobject: 'loop4' (0000000037890303): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 213.898524][ T9268] kobject: 'rx-0' (000000000a9a81fc): kobject_add_internal: parent: 'queues', set: 'queues' [ 213.917598][ T9268] kobject: 'rx-0' (000000000a9a81fc): kobject_uevent_env [ 213.922285][ T3918] kobject: 'loop1' (00000000677d8a3c): kobject_uevent_env [ 213.927152][ T9268] kobject: 'rx-0' (000000000a9a81fc): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-0' [ 213.932137][ T3918] kobject: 'loop1' (00000000677d8a3c): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 213.949083][ T9298] sg_write: data in/out 298234/24 bytes for SCSI command 0xff-- guessing data in; [ 213.949083][ T9298] program syz-executor.2 not setting count and/or reply_len properly [ 213.955752][ T3918] kobject: 'loop2' (00000000d46815b4): kobject_uevent_env [ 213.973425][ T9268] kobject: 'rx-1' (00000000f6754bfb): kobject_add_internal: parent: 'queues', set: 'queues' [ 213.981191][ T9299] sg_write: data in/out 298234/24 bytes for SCSI command 0xff-- guessing data in; [ 213.981191][ T9299] program syz-executor.4 not setting count and/or reply_len properly [ 213.994175][ T9268] kobject: 'rx-1' (00000000f6754bfb): kobject_uevent_env [ 214.005582][ T3918] kobject: 'loop2' (00000000d46815b4): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 214.014876][ T9268] kobject: 'rx-1' (00000000f6754bfb): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-1' [ 214.032761][ T3918] kobject: 'loop1' (00000000677d8a3c): kobject_uevent_env [ 214.036248][ T9268] kobject: 'rx-2' (00000000082216a9): kobject_add_internal: parent: 'queues', set: 'queues' [ 214.049283][ T3918] kobject: 'loop1' (00000000677d8a3c): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 214.058212][ T9268] kobject: 'rx-2' (00000000082216a9): kobject_uevent_env [ 214.068215][ T9268] kobject: 'rx-2' (00000000082216a9): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-2' [ 214.070366][ T3918] kobject: 'loop3' (000000004d045281): kobject_uevent_env [ 214.079557][ T9268] kobject: 'rx-3' (00000000ecbb7b68): kobject_add_internal: parent: 'queues', set: 'queues' [ 214.089172][ T3918] kobject: 'loop3' (000000004d045281): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 214.096724][ T9268] kobject: 'rx-3' (00000000ecbb7b68): kobject_uevent_env [ 214.110735][ T3918] kobject: 'loop1' (00000000677d8a3c): kobject_uevent_env [ 214.114276][ T9268] kobject: 'rx-3' (00000000ecbb7b68): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-3' [ 214.123660][ T3918] kobject: 'loop1' (00000000677d8a3c): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 214.132594][ T9268] kobject: 'rx-4' (000000003c4ffd19): kobject_add_internal: parent: 'queues', set: 'queues' [ 214.152643][ T9268] kobject: 'rx-4' (000000003c4ffd19): kobject_uevent_env [ 214.159830][ T9268] kobject: 'rx-4' (000000003c4ffd19): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-4' [ 214.184829][ T9268] kobject: 'rx-5' (000000007d8a4b62): kobject_add_internal: parent: 'queues', set: 'queues' [ 214.216921][ T9268] kobject: 'rx-5' (000000007d8a4b62): kobject_uevent_env [ 214.230307][ T9268] kobject: 'rx-5' (000000007d8a4b62): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-5' [ 214.242760][ T9268] kobject: 'rx-6' (000000005769670b): kobject_add_internal: parent: 'queues', set: 'queues' [ 214.253812][ T9268] kobject: 'rx-6' (000000005769670b): kobject_uevent_env [ 214.261032][ T9268] kobject: 'rx-6' (000000005769670b): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-6' [ 214.272411][ T9268] kobject: 'rx-7' (000000004ea1f51c): kobject_add_internal: parent: 'queues', set: 'queues' [ 214.283030][ T9268] kobject: 'rx-7' (000000004ea1f51c): kobject_uevent_env [ 214.290115][ T9268] kobject: 'rx-7' (000000004ea1f51c): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-7' [ 214.301531][ T9268] kobject: 'rx-8' (00000000888c0bed): kobject_add_internal: parent: 'queues', set: 'queues' [ 214.311867][ T9268] kobject: 'rx-8' (00000000888c0bed): kobject_uevent_env [ 214.318940][ T9268] kobject: 'rx-8' (00000000888c0bed): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-8' [ 214.330222][ T9268] kobject: 'rx-9' (000000002a1a87d6): kobject_add_internal: parent: 'queues', set: 'queues' [ 214.340461][ T9268] kobject: 'rx-9' (000000002a1a87d6): kobject_uevent_env [ 214.347545][ T9268] kobject: 'rx-9' (000000002a1a87d6): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-9' [ 214.358876][ T9268] kobject: 'rx-10' (000000001c8353ba): kobject_add_internal: parent: 'queues', set: 'queues' [ 214.369306][ T9268] kobject: 'rx-10' (000000001c8353ba): kobject_uevent_env [ 214.376814][ T9268] kobject: 'rx-10' (000000001c8353ba): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-10' [ 214.388240][ T9268] kobject: 'rx-11' (000000000fa86e1c): kobject_add_internal: parent: 'queues', set: 'queues' [ 214.398513][ T9268] kobject: 'rx-11' (000000000fa86e1c): kobject_uevent_env [ 214.405842][ T9268] kobject: 'rx-11' (000000000fa86e1c): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-11' [ 214.417081][ T9268] kobject: 'rx-12' (00000000987dfd16): kobject_add_internal: parent: 'queues', set: 'queues' [ 214.427521][ T9268] kobject: 'rx-12' (00000000987dfd16): kobject_uevent_env [ 214.434750][ T9268] kobject: 'rx-12' (00000000987dfd16): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-12' [ 214.446467][ T9268] kobject: 'rx-13' (0000000079eadbe8): kobject_add_internal: parent: 'queues', set: 'queues' [ 214.456702][ T9268] kobject: 'rx-13' (0000000079eadbe8): kobject_uevent_env [ 214.463876][ T9268] kobject: 'rx-13' (0000000079eadbe8): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-13' [ 214.475087][ T9268] kobject: 'rx-14' (00000000a8eb8ab0): kobject_add_internal: parent: 'queues', set: 'queues' [ 214.485326][ T9268] kobject: 'rx-14' (00000000a8eb8ab0): kobject_uevent_env [ 214.492484][ T9268] kobject: 'rx-14' (00000000a8eb8ab0): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-14' [ 214.503871][ T9268] kobject: 'rx-15' (000000001e6c6d40): kobject_add_internal: parent: 'queues', set: 'queues' [ 214.514105][ T9268] kobject: 'rx-15' (000000001e6c6d40): kobject_uevent_env [ 214.521285][ T9268] kobject: 'rx-15' (000000001e6c6d40): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/rx-15' [ 214.532495][ T9268] kobject: 'tx-0' (000000005f51893d): kobject_add_internal: parent: 'queues', set: 'queues' [ 214.543076][ T9268] kobject: 'tx-0' (000000005f51893d): kobject_uevent_env [ 214.550095][ T9268] kobject: 'tx-0' (000000005f51893d): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-0' [ 214.561681][ T9268] kobject: 'tx-1' (0000000029ac1629): kobject_add_internal: parent: 'queues', set: 'queues' [ 214.571961][ T9268] kobject: 'tx-1' (0000000029ac1629): kobject_uevent_env [ 214.579000][ T9268] kobject: 'tx-1' (0000000029ac1629): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-1' [ 214.590102][ T9268] kobject: 'tx-2' (00000000491417bc): kobject_add_internal: parent: 'queues', set: 'queues' [ 214.600332][ T9268] kobject: 'tx-2' (00000000491417bc): kobject_uevent_env [ 214.607832][ T9268] kobject: 'tx-2' (00000000491417bc): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-2' [ 214.618947][ T9268] kobject: 'tx-3' (00000000bf65c947): kobject_add_internal: parent: 'queues', set: 'queues' [ 214.629127][ T9268] kobject: 'tx-3' (00000000bf65c947): kobject_uevent_env [ 214.636488][ T9268] kobject: 'tx-3' (00000000bf65c947): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-3' [ 214.647542][ T9268] kobject: 'tx-4' (00000000de5676fa): kobject_add_internal: parent: 'queues', set: 'queues' [ 214.657696][ T9268] kobject: 'tx-4' (00000000de5676fa): kobject_uevent_env [ 214.664769][ T9268] kobject: 'tx-4' (00000000de5676fa): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-4' [ 214.675799][ T9268] kobject: 'tx-5' (000000007a1c87f8): kobject_add_internal: parent: 'queues', set: 'queues' [ 214.686076][ T9268] kobject: 'tx-5' (000000007a1c87f8): kobject_uevent_env [ 214.693153][ T9268] kobject: 'tx-5' (000000007a1c87f8): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-5' [ 214.704173][ T9268] kobject: 'tx-6' (00000000ab6e103b): kobject_add_internal: parent: 'queues', set: 'queues' [ 214.714384][ T9268] kobject: 'tx-6' (00000000ab6e103b): kobject_uevent_env [ 214.721455][ T9268] kobject: 'tx-6' (00000000ab6e103b): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-6' [ 214.732445][ T9268] kobject: 'tx-7' (00000000132413e2): kobject_add_internal: parent: 'queues', set: 'queues' [ 214.742662][ T9268] kobject: 'tx-7' (00000000132413e2): kobject_uevent_env [ 214.749718][ T9268] kobject: 'tx-7' (00000000132413e2): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-7' [ 214.761209][ T9268] kobject: 'tx-8' (00000000b583e8b3): kobject_add_internal: parent: 'queues', set: 'queues' [ 214.771457][ T9268] kobject: 'tx-8' (00000000b583e8b3): kobject_uevent_env [ 214.778538][ T9268] kobject: 'tx-8' (00000000b583e8b3): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-8' [ 214.789586][ T9268] kobject: 'tx-9' (00000000132ba04b): kobject_add_internal: parent: 'queues', set: 'queues' [ 214.799790][ T9268] kobject: 'tx-9' (00000000132ba04b): kobject_uevent_env [ 214.806857][ T9268] kobject: 'tx-9' (00000000132ba04b): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-9' [ 214.818641][ T9268] kobject: 'tx-10' (00000000f9c0dfc7): kobject_add_internal: parent: 'queues', set: 'queues' [ 214.828946][ T9268] kobject: 'tx-10' (00000000f9c0dfc7): kobject_uevent_env [ 214.836092][ T9268] kobject: 'tx-10' (00000000f9c0dfc7): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-10' [ 214.847337][ T9268] kobject: 'tx-11' (000000005bd468b4): kobject_add_internal: parent: 'queues', set: 'queues' [ 214.857596][ T9268] kobject: 'tx-11' (000000005bd468b4): kobject_uevent_env [ 214.864743][ T9268] kobject: 'tx-11' (000000005bd468b4): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-11' [ 214.875945][ T9268] kobject: 'tx-12' (0000000020c0d5d0): kobject_add_internal: parent: 'queues', set: 'queues' [ 214.886255][ T9268] kobject: 'tx-12' (0000000020c0d5d0): kobject_uevent_env [ 214.893617][ T9268] kobject: 'tx-12' (0000000020c0d5d0): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-12' [ 214.904893][ T9268] kobject: 'tx-13' (000000002bac3243): kobject_add_internal: parent: 'queues', set: 'queues' [ 214.915149][ T9268] kobject: 'tx-13' (000000002bac3243): kobject_uevent_env [ 214.922302][ T9268] kobject: 'tx-13' (000000002bac3243): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-13' [ 214.933478][ T9268] kobject: 'tx-14' (00000000c806b7bc): kobject_add_internal: parent: 'queues', set: 'queues' [ 214.943779][ T9268] kobject: 'tx-14' (00000000c806b7bc): kobject_uevent_env [ 214.950955][ T9268] kobject: 'tx-14' (00000000c806b7bc): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-14' [ 214.962171][ T9268] kobject: 'tx-15' (0000000099ca0184): kobject_add_internal: parent: 'queues', set: 'queues' [ 214.972435][ T9268] kobject: 'tx-15' (0000000099ca0184): kobject_uevent_env [ 214.979623][ T9268] kobject: 'tx-15' (0000000099ca0184): fill_kobj_path: path = '/devices/virtual/net/bond2/queues/tx-15' [ 214.991372][ T9268] kobject: 'batman_adv' (0000000045ee0bbb): kobject_add_internal: parent: 'bond2', set: '' 08:00:17 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="440000001000010500"/20, @ANYRES32=0x0, @ANYBLOB="8410000000000000240012000c000100626f6e640000000014000200080018003f0000000800010004000000db35fb6fe1db5e9d607201c39064e152c1194e0493caff0287851f7b93c177fbeb2c5fcefd126c050ed2bb76bb10cea37c739aa283090d8d91041f12b8d13042e78614cceb3f5ab48930f1f02967cdb4ceb945d83f970b280956624115367094f1bf3c288d845f20bc4e75db797d3bd9e90ff23b68eef75364b7da524330e9ab149c1b0f549493"], 0x44}}, 0x0) 08:00:17 executing program 3: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(0xffffffffffffffff, 0x110, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) getdents64(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) io_setup(0x9, &(0x7f0000000380)=0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x101202, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 08:00:17 executing program 1: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(0xffffffffffffffff, 0x110, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) getdents64(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) io_setup(0x9, &(0x7f0000000380)=0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x101202, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 08:00:17 executing program 4: getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffffc, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100), 0x0) bind$unix(r0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000002c0)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r3 = socket(0x10, 0x400000000080803, 0x0) write(r3, &(0x7f0000000040), 0x0) recvmmsg(r3, &(0x7f0000004040)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000140)=""/116, 0x74}, {&(0x7f00000001c0)=""/4096, 0x1000}], 0x2}}], 0x663, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r4, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001480)='/proc/capi/capi20\x00', 0x200000, 0x0) syz_open_dev$vbi(&(0x7f00000014c0)='/dev/vbi#\x00', 0x0, 0x2) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r6, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r7 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r7, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) openat$vfio(0xffffffffffffff9c, &(0x7f0000001500)='/dev/vfio/vfio\x00', 0x10000, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r8) r9 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r9, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r10 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r10, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r11) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r12) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001540), &(0x7f0000001580)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, 0x0) r14 = semget$private(0x0, 0x0, 0x10e) r15 = getgid() r16 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) semctl$IPC_SET(r14, 0x0, 0x1, &(0x7f00000005c0)={{0x0, 0x0, r15, r16}, 0x0, 0x6072, 0x80000001}) chown(0x0, r13, r17) accept4$unix(r0, &(0x7f0000001a80)=@abs, &(0x7f0000001b00)=0x6e, 0x800) r18 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r18, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r19 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r19) socket$can_raw(0x1d, 0x3, 0x1) r20 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r20, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001e80), &(0x7f0000001ec0)=0xc) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000001f00)='/proc/capi/capi20ncci\x00', 0x20402, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000001f40)='/dev/full\x00', 0x600200, 0x0) r21 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r21) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001f80)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r22 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r22) fcntl$getown(r22, 0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002440), &(0x7f0000002480)=0xc) r23 = semget$private(0x0, 0x0, 0x10e) r24 = getgid() r25 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) semctl$IPC_SET(r23, 0x0, 0x1, &(0x7f00000005c0)={{0x0, 0x0, r24, r25, r26, 0x41}, 0x0, 0x6072, 0x80000001}) syz_open_dev$sndtimer(&(0x7f0000003c00)='/dev/snd/timer\x00', 0x0, 0x80) r27 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r27) r28 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r29 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r29, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x4, 0x0, 'lblc\x00'}, 0x2c) getsockopt$inet_pktinfo(r28, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) r30 = fcntl$getown(r29, 0x9) fcntl$lock(r28, 0x27, &(0x7f0000000280)={0x4, 0x3, 0x0, 0x3f, r30}) r31 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r32 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r32, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x4, 0x0, 'lblc\x00'}, 0x2c) getsockopt$inet_pktinfo(r31, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) r33 = fcntl$getown(r32, 0x9) fcntl$lock(r31, 0x27, &(0x7f0000000280)={0x4, 0x0, 0x5ba, 0x3f, r33}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, 0x0) r35 = semget$private(0x0, 0x0, 0x10e) r36 = getgid() r37 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) semctl$IPC_SET(r35, 0x0, 0x1, &(0x7f00000005c0)={{0x0, 0x0, r36, r37, r38, 0x41}, 0x0, 0x6072, 0x80000001}) chown(0x0, r34, r38) r39 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r39, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r40 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r40) socket$inet6_tcp(0xa, 0x1, 0x0) close(0xffffffffffffffff) r41 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r41, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r42 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r42) bind$netlink(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r43 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r43) r44 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r44) openat$udambuf(0xffffffffffffff9c, &(0x7f0000003ec0)='/dev/udmabuf\x00', 0x2) openat$capi20(0xffffffffffffff9c, &(0x7f0000003f00)='/dev/capi20\x00', 0x444142, 0x0) syz_open_dev$amidi(&(0x7f0000003f40)='/dev/amidi#\x00', 0x4c, 0x400000) socket$vsock_dgram(0x28, 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000003f80)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000003fc0)='net/nfsfs\x00') r45 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r46 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r46, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x4, 0x0, 'lblc\x00'}, 0x2c) getsockopt$inet_pktinfo(r45, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) fcntl$lock(r45, 0x27, &(0x7f0000000280)={0x4, 0x3, 0x5ba, 0x3f}) syz_open_procfs$namespace(0x0, &(0x7f0000004000)='ns/user\x00') socket$netlink(0x10, 0x3, 0x4) write(r1, &(0x7f0000000100)="b63db85e1e8d040000000000003ef0011dcc606aed69d2bc7037cebc9bc2feffffffffffffffe22c9b160096aa1fae1acfbd6cbf87798a9b02de7a91a3cbdfa009cf75a7eadb2a00", 0x48) 08:00:17 executing program 0: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(0xffffffffffffffff, 0x110, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) getdents64(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) io_setup(0x9, &(0x7f0000000380)=0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x101202, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) [ 215.030112][ T3918] kobject: 'loop0' (000000004e62b20f): kobject_uevent_env [ 215.073451][ T3918] kobject: 'loop0' (000000004e62b20f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 215.088293][ T9317] netlink: 'syz-executor.5': attribute type 24 has an invalid length. [ 215.096807][ T9317] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 215.108540][ T3918] kobject: 'loop4' (0000000037890303): kobject_uevent_env 08:00:17 executing program 2: getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffffc, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100), 0x0) bind$unix(r0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000002c0)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r3 = socket(0x10, 0x400000000080803, 0x0) write(r3, &(0x7f0000000040), 0x0) recvmmsg(r3, &(0x7f0000004040)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000140)=""/116, 0x74}, {&(0x7f00000001c0)=""/4096, 0x1000}], 0x2}}], 0x663, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r4, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001480)='/proc/capi/capi20\x00', 0x200000, 0x0) syz_open_dev$vbi(&(0x7f00000014c0)='/dev/vbi#\x00', 0x0, 0x2) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r6, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r7 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r7, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) openat$vfio(0xffffffffffffff9c, &(0x7f0000001500)='/dev/vfio/vfio\x00', 0x10000, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r8) r9 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r9, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r10 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r10, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r11) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r12) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001540), &(0x7f0000001580)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, 0x0) r14 = semget$private(0x0, 0x0, 0x10e) r15 = getgid() r16 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) semctl$IPC_SET(r14, 0x0, 0x1, &(0x7f00000005c0)={{0x0, 0x0, r15, r16}, 0x0, 0x6072, 0x80000001}) chown(0x0, r13, r17) accept4$unix(r0, &(0x7f0000001a80)=@abs, &(0x7f0000001b00)=0x6e, 0x800) r18 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r18, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r19 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r19) socket$can_raw(0x1d, 0x3, 0x1) r20 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r20, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001e80), &(0x7f0000001ec0)=0xc) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000001f00)='/proc/capi/capi20ncci\x00', 0x20402, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000001f40)='/dev/full\x00', 0x600200, 0x0) r21 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r21) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001f80)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r22 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r22) fcntl$getown(r22, 0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002440), &(0x7f0000002480)=0xc) r23 = semget$private(0x0, 0x0, 0x10e) r24 = getgid() r25 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) semctl$IPC_SET(r23, 0x0, 0x1, &(0x7f00000005c0)={{0x0, 0x0, r24, r25, r26, 0x41}, 0x0, 0x6072, 0x80000001}) syz_open_dev$sndtimer(&(0x7f0000003c00)='/dev/snd/timer\x00', 0x0, 0x80) r27 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r27) r28 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r29 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r29, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x4, 0x0, 'lblc\x00'}, 0x2c) getsockopt$inet_pktinfo(r28, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) r30 = fcntl$getown(r29, 0x9) fcntl$lock(r28, 0x27, &(0x7f0000000280)={0x4, 0x3, 0x0, 0x3f, r30}) r31 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r32 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r32, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x4, 0x0, 'lblc\x00'}, 0x2c) getsockopt$inet_pktinfo(r31, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) r33 = fcntl$getown(r32, 0x9) fcntl$lock(r31, 0x27, &(0x7f0000000280)={0x4, 0x0, 0x5ba, 0x3f, r33}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, 0x0) r35 = semget$private(0x0, 0x0, 0x10e) r36 = getgid() r37 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) semctl$IPC_SET(r35, 0x0, 0x1, &(0x7f00000005c0)={{0x0, 0x0, r36, r37, r38, 0x41}, 0x0, 0x6072, 0x80000001}) chown(0x0, r34, r38) r39 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r39, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r40 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r40) socket$inet6_tcp(0xa, 0x1, 0x0) close(0xffffffffffffffff) r41 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r41, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r42 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r42) bind$netlink(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r43 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r43) r44 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r44) openat$udambuf(0xffffffffffffff9c, &(0x7f0000003ec0)='/dev/udmabuf\x00', 0x2) openat$capi20(0xffffffffffffff9c, &(0x7f0000003f00)='/dev/capi20\x00', 0x444142, 0x0) syz_open_dev$amidi(&(0x7f0000003f40)='/dev/amidi#\x00', 0x4c, 0x400000) socket$vsock_dgram(0x28, 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000003f80)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000003fc0)='net/nfsfs\x00') r45 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r46 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r46, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x4, 0x0, 'lblc\x00'}, 0x2c) getsockopt$inet_pktinfo(r45, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) fcntl$lock(r45, 0x27, &(0x7f0000000280)={0x4, 0x3, 0x5ba, 0x3f}) syz_open_procfs$namespace(0x0, &(0x7f0000004000)='ns/user\x00') socket$netlink(0x10, 0x3, 0x4) write(r1, &(0x7f0000000100)="b63db85e1e8d040000000000003ef0011dcc606aed69d2bc7037cebc9bc2feffffffffffffffe22c9b160096aa1fae1acfbd6cbf87798a9b02de7a91a3cbdfa009cf75a7eadb2a00", 0x48) [ 215.115991][ T3918] kobject: 'loop4' (0000000037890303): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 215.126877][ T9317] kobject: 'bond3' (000000009db98afd): kobject_add_internal: parent: 'net', set: 'devices' [ 215.147864][ T3918] kobject: 'loop5' (0000000090add63f): kobject_uevent_env [ 215.166269][ T9317] kobject: 'bond3' (000000009db98afd): kobject_uevent_env 08:00:17 executing program 3: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(0xffffffffffffffff, 0x110, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) getdents64(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) io_setup(0x9, &(0x7f0000000380)=0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x101202, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 08:00:17 executing program 1: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(0xffffffffffffffff, 0x110, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) getdents64(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) io_setup(0x9, &(0x7f0000000380)=0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x101202, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) [ 215.192957][ T9317] kobject: 'bond3' (000000009db98afd): fill_kobj_path: path = '/devices/virtual/net/bond3' [ 215.206603][ T3918] kobject: 'loop5' (0000000090add63f): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 215.225645][ T9317] kobject: 'queues' (000000008b5cc1c0): kobject_add_internal: parent: 'bond3', set: '' 08:00:17 executing program 0: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(0xffffffffffffffff, 0x110, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) getdents64(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) io_setup(0x9, &(0x7f0000000380)=0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x101202, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) [ 215.264106][ T3918] kobject: 'loop2' (00000000d46815b4): kobject_uevent_env [ 215.266918][ T9321] sg_write: data in/out 298234/24 bytes for SCSI command 0xff-- guessing data in; [ 215.266918][ T9321] program syz-executor.4 not setting count and/or reply_len properly [ 215.300911][ T3918] kobject: 'loop2' (00000000d46815b4): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 215.315098][ T9317] kobject: 'queues' (000000008b5cc1c0): kobject_uevent_env [ 215.330369][ T9317] kobject: 'queues' (000000008b5cc1c0): kobject_uevent_env: filter function caused the event to drop! [ 215.341486][ T3918] kobject: 'loop3' (000000004d045281): kobject_uevent_env [ 215.346884][ T9330] sg_write: data in/out 298234/24 bytes for SCSI command 0xff-- guessing data in; 08:00:17 executing program 3: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(0xffffffffffffffff, 0x110, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) getdents64(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) io_setup(0x9, &(0x7f0000000380)=0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x101202, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) [ 215.346884][ T9330] program syz-executor.2 not setting count and/or reply_len properly [ 215.349443][ T3918] kobject: 'loop3' (000000004d045281): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 215.367120][ T9317] kobject: 'rx-0' (000000006e500d5e): kobject_add_internal: parent: 'queues', set: 'queues' [ 215.390613][ T9317] kobject: 'rx-0' (000000006e500d5e): kobject_uevent_env [ 215.397911][ T9317] kobject: 'rx-0' (000000006e500d5e): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-0' 08:00:17 executing program 1: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(0xffffffffffffffff, 0x110, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) getdents64(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) io_setup(0x9, &(0x7f0000000380)=0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x101202, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 08:00:17 executing program 0: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(0xffffffffffffffff, 0x110, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) getdents64(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) io_setup(0x9, &(0x7f0000000380)=0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x101202, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) [ 215.403881][ T3918] kobject: 'loop1' (00000000677d8a3c): kobject_uevent_env [ 215.439488][ T3918] kobject: 'loop1' (00000000677d8a3c): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 215.439681][ T9317] kobject: 'rx-1' (0000000081373542): kobject_add_internal: parent: 'queues', set: 'queues' [ 215.452794][ T3918] kobject: 'loop0' (000000004e62b20f): kobject_uevent_env [ 215.467541][ T3918] kobject: 'loop0' (000000004e62b20f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 215.493173][ T3918] kobject: 'loop3' (000000004d045281): kobject_uevent_env [ 215.500351][ T3918] kobject: 'loop3' (000000004d045281): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 215.511452][ T9317] kobject: 'rx-1' (0000000081373542): kobject_uevent_env [ 215.511667][ T3918] kobject: 'loop0' (000000004e62b20f): kobject_uevent_env [ 215.518851][ T9317] kobject: 'rx-1' (0000000081373542): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-1' [ 215.525749][ T3918] kobject: 'loop0' (000000004e62b20f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 215.526857][ T3918] kobject: 'loop1' (00000000677d8a3c): kobject_uevent_env [ 215.540323][ T9317] kobject: 'rx-2' (000000004a7ebec6): kobject_add_internal: parent: 'queues', set: 'queues' [ 215.547580][ T3918] kobject: 'loop1' (00000000677d8a3c): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 215.554905][ T9317] kobject: 'rx-2' (000000004a7ebec6): kobject_uevent_env [ 215.644042][ T9317] kobject: 'rx-2' (000000004a7ebec6): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-2' [ 215.686360][ T9317] kobject: 'rx-3' (00000000ef5df239): kobject_add_internal: parent: 'queues', set: 'queues' [ 215.694204][ T3918] kobject: 'loop0' (000000004e62b20f): kobject_uevent_env [ 215.713720][ T3918] kobject: 'loop0' (000000004e62b20f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 215.717886][ T9317] kobject: 'rx-3' (00000000ef5df239): kobject_uevent_env [ 215.733715][ T9317] kobject: 'rx-3' (00000000ef5df239): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-3' [ 215.735862][ T3918] kobject: 'loop1' (00000000677d8a3c): kobject_uevent_env [ 215.745734][ T9317] kobject: 'rx-4' (000000003729926d): kobject_add_internal: parent: 'queues', set: 'queues' [ 215.752147][ T3918] kobject: 'loop1' (00000000677d8a3c): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 215.773450][ T9317] kobject: 'rx-4' (000000003729926d): kobject_uevent_env [ 215.783606][ T9317] kobject: 'rx-4' (000000003729926d): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-4' [ 215.795403][ T9317] kobject: 'rx-5' (00000000a3aac264): kobject_add_internal: parent: 'queues', set: 'queues' [ 215.806093][ T9317] kobject: 'rx-5' (00000000a3aac264): kobject_uevent_env [ 215.813389][ T9317] kobject: 'rx-5' (00000000a3aac264): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-5' [ 215.824752][ T9317] kobject: 'rx-6' (0000000079604530): kobject_add_internal: parent: 'queues', set: 'queues' [ 215.835150][ T9317] kobject: 'rx-6' (0000000079604530): kobject_uevent_env [ 215.842378][ T9317] kobject: 'rx-6' (0000000079604530): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-6' [ 215.853763][ T9317] kobject: 'rx-7' (000000003aadfb4b): kobject_add_internal: parent: 'queues', set: 'queues' [ 215.864160][ T9317] kobject: 'rx-7' (000000003aadfb4b): kobject_uevent_env [ 215.871429][ T9317] kobject: 'rx-7' (000000003aadfb4b): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-7' [ 215.883072][ T9317] kobject: 'rx-8' (000000003cf1225f): kobject_add_internal: parent: 'queues', set: 'queues' [ 215.893594][ T9317] kobject: 'rx-8' (000000003cf1225f): kobject_uevent_env [ 215.900855][ T9317] kobject: 'rx-8' (000000003cf1225f): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-8' [ 215.913952][ T9317] kobject: 'rx-9' (00000000ef9de927): kobject_add_internal: parent: 'queues', set: 'queues' [ 215.924161][ T9317] kobject: 'rx-9' (00000000ef9de927): kobject_uevent_env [ 215.931245][ T9317] kobject: 'rx-9' (00000000ef9de927): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-9' [ 215.942281][ T9317] kobject: 'rx-10' (00000000ec430317): kobject_add_internal: parent: 'queues', set: 'queues' [ 215.952491][ T9317] kobject: 'rx-10' (00000000ec430317): kobject_uevent_env [ 215.959614][ T9317] kobject: 'rx-10' (00000000ec430317): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-10' [ 215.970874][ T9317] kobject: 'rx-11' (000000004c1c4dd2): kobject_add_internal: parent: 'queues', set: 'queues' [ 215.981088][ T9317] kobject: 'rx-11' (000000004c1c4dd2): kobject_uevent_env [ 215.988228][ T9317] kobject: 'rx-11' (000000004c1c4dd2): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-11' [ 215.999449][ T9317] kobject: 'rx-12' (00000000997a9038): kobject_add_internal: parent: 'queues', set: 'queues' [ 216.009662][ T9317] kobject: 'rx-12' (00000000997a9038): kobject_uevent_env [ 216.016802][ T9317] kobject: 'rx-12' (00000000997a9038): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-12' [ 216.028020][ T9317] kobject: 'rx-13' (0000000022dd0251): kobject_add_internal: parent: 'queues', set: 'queues' [ 216.038212][ T9317] kobject: 'rx-13' (0000000022dd0251): kobject_uevent_env [ 216.045420][ T9317] kobject: 'rx-13' (0000000022dd0251): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-13' [ 216.056617][ T9317] kobject: 'rx-14' (00000000c5f84959): kobject_add_internal: parent: 'queues', set: 'queues' [ 216.066887][ T9317] kobject: 'rx-14' (00000000c5f84959): kobject_uevent_env [ 216.074032][ T9317] kobject: 'rx-14' (00000000c5f84959): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-14' [ 216.085227][ T9317] kobject: 'rx-15' (000000008c4769d0): kobject_add_internal: parent: 'queues', set: 'queues' [ 216.095422][ T9317] kobject: 'rx-15' (000000008c4769d0): kobject_uevent_env [ 216.102588][ T9317] kobject: 'rx-15' (000000008c4769d0): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/rx-15' [ 216.113755][ T9317] kobject: 'tx-0' (00000000f273e11f): kobject_add_internal: parent: 'queues', set: 'queues' [ 216.124126][ T9317] kobject: 'tx-0' (00000000f273e11f): kobject_uevent_env [ 216.131218][ T9317] kobject: 'tx-0' (00000000f273e11f): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/tx-0' [ 216.142252][ T9317] kobject: 'tx-1' (00000000523990b6): kobject_add_internal: parent: 'queues', set: 'queues' [ 216.152491][ T9317] kobject: 'tx-1' (00000000523990b6): kobject_uevent_env [ 216.159540][ T9317] kobject: 'tx-1' (00000000523990b6): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/tx-1' [ 216.170590][ T9317] kobject: 'tx-2' (00000000057d2028): kobject_add_internal: parent: 'queues', set: 'queues' [ 216.180828][ T9317] kobject: 'tx-2' (00000000057d2028): kobject_uevent_env [ 216.187857][ T9317] kobject: 'tx-2' (00000000057d2028): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/tx-2' [ 216.198877][ T9317] kobject: 'tx-3' (000000001f5b8e2a): kobject_add_internal: parent: 'queues', set: 'queues' [ 216.209033][ T9317] kobject: 'tx-3' (000000001f5b8e2a): kobject_uevent_env [ 216.216097][ T9317] kobject: 'tx-3' (000000001f5b8e2a): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/tx-3' [ 216.227090][ T9317] kobject: 'tx-4' (00000000dfe27352): kobject_add_internal: parent: 'queues', set: 'queues' [ 216.237326][ T9317] kobject: 'tx-4' (00000000dfe27352): kobject_uevent_env [ 216.244423][ T9317] kobject: 'tx-4' (00000000dfe27352): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/tx-4' [ 216.255457][ T9317] kobject: 'tx-5' (00000000f2ec3a7f): kobject_add_internal: parent: 'queues', set: 'queues' [ 216.265671][ T9317] kobject: 'tx-5' (00000000f2ec3a7f): kobject_uevent_env [ 216.272758][ T9317] kobject: 'tx-5' (00000000f2ec3a7f): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/tx-5' [ 216.283801][ T9317] kobject: 'tx-6' (00000000ff802bc4): kobject_add_internal: parent: 'queues', set: 'queues' [ 216.294029][ T9317] kobject: 'tx-6' (00000000ff802bc4): kobject_uevent_env [ 216.301083][ T9317] kobject: 'tx-6' (00000000ff802bc4): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/tx-6' [ 216.312119][ T9317] kobject: 'tx-7' (000000001b0238f6): kobject_add_internal: parent: 'queues', set: 'queues' [ 216.322277][ T9317] kobject: 'tx-7' (000000001b0238f6): kobject_uevent_env [ 216.329315][ T9317] kobject: 'tx-7' (000000001b0238f6): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/tx-7' [ 216.340346][ T9317] kobject: 'tx-8' (000000007cd0d69e): kobject_add_internal: parent: 'queues', set: 'queues' [ 216.350544][ T9317] kobject: 'tx-8' (000000007cd0d69e): kobject_uevent_env [ 216.357585][ T9317] kobject: 'tx-8' (000000007cd0d69e): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/tx-8' [ 216.369882][ T9317] kobject: 'tx-9' (000000003c0ab55f): kobject_add_internal: parent: 'queues', set: 'queues' [ 216.380167][ T9317] kobject: 'tx-9' (000000003c0ab55f): kobject_uevent_env [ 216.387246][ T9317] kobject: 'tx-9' (000000003c0ab55f): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/tx-9' [ 216.398329][ T9317] kobject: 'tx-10' (00000000434495f3): kobject_add_internal: parent: 'queues', set: 'queues' [ 216.408576][ T9317] kobject: 'tx-10' (00000000434495f3): kobject_uevent_env [ 216.415725][ T9317] kobject: 'tx-10' (00000000434495f3): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/tx-10' [ 216.426901][ T9317] kobject: 'tx-11' (0000000056b2bab8): kobject_add_internal: parent: 'queues', set: 'queues' [ 216.437190][ T9317] kobject: 'tx-11' (0000000056b2bab8): kobject_uevent_env [ 216.444357][ T9317] kobject: 'tx-11' (0000000056b2bab8): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/tx-11' [ 216.455534][ T9317] kobject: 'tx-12' (00000000e89c5f61): kobject_add_internal: parent: 'queues', set: 'queues' [ 216.465834][ T9317] kobject: 'tx-12' (00000000e89c5f61): kobject_uevent_env [ 216.472977][ T9317] kobject: 'tx-12' (00000000e89c5f61): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/tx-12' [ 216.484219][ T9317] kobject: 'tx-13' (0000000016331a0b): kobject_add_internal: parent: 'queues', set: 'queues' [ 216.494500][ T9317] kobject: 'tx-13' (0000000016331a0b): kobject_uevent_env [ 216.501877][ T9317] kobject: 'tx-13' (0000000016331a0b): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/tx-13' [ 216.513146][ T9317] kobject: 'tx-14' (000000004bfee093): kobject_add_internal: parent: 'queues', set: 'queues' [ 216.523928][ T9317] kobject: 'tx-14' (000000004bfee093): kobject_uevent_env [ 216.531117][ T9317] kobject: 'tx-14' (000000004bfee093): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/tx-14' [ 216.542286][ T9317] kobject: 'tx-15' (0000000083dbb24c): kobject_add_internal: parent: 'queues', set: 'queues' [ 216.552580][ T9317] kobject: 'tx-15' (0000000083dbb24c): kobject_uevent_env [ 216.559700][ T9317] kobject: 'tx-15' (0000000083dbb24c): fill_kobj_path: path = '/devices/virtual/net/bond3/queues/tx-15' [ 216.571425][ T9317] kobject: 'batman_adv' (0000000044f77fdb): kobject_add_internal: parent: 'bond3', set: '' 08:00:18 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="440000001000010500"/20, @ANYRES32=0x0, @ANYBLOB="8410000000000000240012000c000100626f6e640000000014000200080018003f0000000800010004000000db35fb6fe1db5e9d607201c39064e152c1194e0493caff0287851f7b93c177fbeb2c5fcefd126c050ed2bb76bb10cea37c739aa283090d8d91041f12b8d13042e78614cceb3f5ab48930f1f02967cdb4ceb945d83f970b280956624115367094f1bf3c288d845f20bc4e75db797d3bd9e90ff23b68eef75364b7da524330e9ab149c1b0f549493"], 0x44}}, 0x0) 08:00:18 executing program 3: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(0xffffffffffffffff, 0x110, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) getdents64(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) io_setup(0x9, &(0x7f0000000380)=0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x101202, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 08:00:18 executing program 0: getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffffc, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100), 0x0) bind$unix(r0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000002c0)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r3 = socket(0x10, 0x400000000080803, 0x0) write(r3, &(0x7f0000000040), 0x0) recvmmsg(r3, &(0x7f0000004040)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000140)=""/116, 0x74}, {&(0x7f00000001c0)=""/4096, 0x1000}], 0x2}}], 0x663, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r4, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001480)='/proc/capi/capi20\x00', 0x200000, 0x0) syz_open_dev$vbi(&(0x7f00000014c0)='/dev/vbi#\x00', 0x0, 0x2) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r6, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r7 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r7, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) openat$vfio(0xffffffffffffff9c, &(0x7f0000001500)='/dev/vfio/vfio\x00', 0x10000, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r8) r9 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r9, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r10 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r10, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r11) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r12) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001540), &(0x7f0000001580)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, 0x0) r14 = semget$private(0x0, 0x0, 0x10e) r15 = getgid() r16 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) semctl$IPC_SET(r14, 0x0, 0x1, &(0x7f00000005c0)={{0x0, 0x0, r15, r16}, 0x0, 0x6072, 0x80000001}) chown(0x0, r13, r17) accept4$unix(r0, &(0x7f0000001a80)=@abs, &(0x7f0000001b00)=0x6e, 0x800) r18 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r18, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r19 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r19) socket$can_raw(0x1d, 0x3, 0x1) r20 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r20, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001e80), &(0x7f0000001ec0)=0xc) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000001f00)='/proc/capi/capi20ncci\x00', 0x20402, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000001f40)='/dev/full\x00', 0x600200, 0x0) r21 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r21) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001f80)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r22 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r22) fcntl$getown(r22, 0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002440), &(0x7f0000002480)=0xc) r23 = semget$private(0x0, 0x0, 0x10e) r24 = getgid() r25 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) semctl$IPC_SET(r23, 0x0, 0x1, &(0x7f00000005c0)={{0x0, 0x0, r24, r25, r26, 0x41}, 0x0, 0x6072, 0x80000001}) syz_open_dev$sndtimer(&(0x7f0000003c00)='/dev/snd/timer\x00', 0x0, 0x80) r27 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r27) r28 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r29 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r29, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x4, 0x0, 'lblc\x00'}, 0x2c) getsockopt$inet_pktinfo(r28, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) r30 = fcntl$getown(r29, 0x9) fcntl$lock(r28, 0x27, &(0x7f0000000280)={0x4, 0x3, 0x0, 0x3f, r30}) r31 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r32 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r32, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x4, 0x0, 'lblc\x00'}, 0x2c) getsockopt$inet_pktinfo(r31, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) r33 = fcntl$getown(r32, 0x9) fcntl$lock(r31, 0x27, &(0x7f0000000280)={0x4, 0x0, 0x5ba, 0x3f, r33}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, 0x0) r35 = semget$private(0x0, 0x0, 0x10e) r36 = getgid() r37 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) semctl$IPC_SET(r35, 0x0, 0x1, &(0x7f00000005c0)={{0x0, 0x0, r36, r37, r38, 0x41}, 0x0, 0x6072, 0x80000001}) chown(0x0, r34, r38) r39 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r39, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r40 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r40) socket$inet6_tcp(0xa, 0x1, 0x0) close(0xffffffffffffffff) r41 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r41, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r42 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r42) bind$netlink(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r43 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r43) r44 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r44) openat$udambuf(0xffffffffffffff9c, &(0x7f0000003ec0)='/dev/udmabuf\x00', 0x2) openat$capi20(0xffffffffffffff9c, &(0x7f0000003f00)='/dev/capi20\x00', 0x444142, 0x0) syz_open_dev$amidi(&(0x7f0000003f40)='/dev/amidi#\x00', 0x4c, 0x400000) socket$vsock_dgram(0x28, 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000003f80)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000003fc0)='net/nfsfs\x00') r45 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r46 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r46, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x4, 0x0, 'lblc\x00'}, 0x2c) getsockopt$inet_pktinfo(r45, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) fcntl$lock(r45, 0x27, &(0x7f0000000280)={0x4, 0x3, 0x5ba, 0x3f}) syz_open_procfs$namespace(0x0, &(0x7f0000004000)='ns/user\x00') socket$netlink(0x10, 0x3, 0x4) write(r1, &(0x7f0000000100)="b63db85e1e8d040000000000003ef0011dcc606aed69d2bc7037cebc9bc2feffffffffffffffe22c9b160096aa1fae1acfbd6cbf87798a9b02de7a91a3cbdfa009cf75a7eadb2a00", 0x48) 08:00:18 executing program 1: getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffffc, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100), 0x0) bind$unix(r0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000002c0)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r3 = socket(0x10, 0x400000000080803, 0x0) write(r3, &(0x7f0000000040), 0x0) recvmmsg(r3, &(0x7f0000004040)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000140)=""/116, 0x74}, {&(0x7f00000001c0)=""/4096, 0x1000}], 0x2}}], 0x663, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r4, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001480)='/proc/capi/capi20\x00', 0x200000, 0x0) syz_open_dev$vbi(&(0x7f00000014c0)='/dev/vbi#\x00', 0x0, 0x2) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r6, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r7 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r7, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) openat$vfio(0xffffffffffffff9c, &(0x7f0000001500)='/dev/vfio/vfio\x00', 0x10000, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r8) r9 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r9, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r10 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r10, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r11) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r12) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001540), &(0x7f0000001580)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, 0x0) r14 = semget$private(0x0, 0x0, 0x10e) r15 = getgid() r16 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) semctl$IPC_SET(r14, 0x0, 0x1, &(0x7f00000005c0)={{0x0, 0x0, r15, r16}, 0x0, 0x6072, 0x80000001}) chown(0x0, r13, r17) accept4$unix(r0, &(0x7f0000001a80)=@abs, &(0x7f0000001b00)=0x6e, 0x800) r18 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r18, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r19 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r19) socket$can_raw(0x1d, 0x3, 0x1) r20 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r20, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001e80), &(0x7f0000001ec0)=0xc) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000001f00)='/proc/capi/capi20ncci\x00', 0x20402, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000001f40)='/dev/full\x00', 0x600200, 0x0) r21 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r21) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001f80)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r22 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r22) fcntl$getown(r22, 0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002440), &(0x7f0000002480)=0xc) r23 = semget$private(0x0, 0x0, 0x10e) r24 = getgid() r25 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) semctl$IPC_SET(r23, 0x0, 0x1, &(0x7f00000005c0)={{0x0, 0x0, r24, r25, r26, 0x41}, 0x0, 0x6072, 0x80000001}) syz_open_dev$sndtimer(&(0x7f0000003c00)='/dev/snd/timer\x00', 0x0, 0x80) r27 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r27) r28 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r29 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r29, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x4, 0x0, 'lblc\x00'}, 0x2c) getsockopt$inet_pktinfo(r28, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) r30 = fcntl$getown(r29, 0x9) fcntl$lock(r28, 0x27, &(0x7f0000000280)={0x4, 0x3, 0x0, 0x3f, r30}) r31 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r32 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r32, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x4, 0x0, 'lblc\x00'}, 0x2c) getsockopt$inet_pktinfo(r31, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) r33 = fcntl$getown(r32, 0x9) fcntl$lock(r31, 0x27, &(0x7f0000000280)={0x4, 0x0, 0x5ba, 0x3f, r33}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, 0x0) r35 = semget$private(0x0, 0x0, 0x10e) r36 = getgid() r37 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) semctl$IPC_SET(r35, 0x0, 0x1, &(0x7f00000005c0)={{0x0, 0x0, r36, r37, r38, 0x41}, 0x0, 0x6072, 0x80000001}) chown(0x0, r34, r38) r39 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r39, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r40 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r40) socket$inet6_tcp(0xa, 0x1, 0x0) close(0xffffffffffffffff) r41 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r41, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r42 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r42) bind$netlink(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r43 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r43) r44 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r44) openat$udambuf(0xffffffffffffff9c, &(0x7f0000003ec0)='/dev/udmabuf\x00', 0x2) openat$capi20(0xffffffffffffff9c, &(0x7f0000003f00)='/dev/capi20\x00', 0x444142, 0x0) syz_open_dev$amidi(&(0x7f0000003f40)='/dev/amidi#\x00', 0x4c, 0x400000) socket$vsock_dgram(0x28, 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000003f80)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000003fc0)='net/nfsfs\x00') r45 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r46 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r46, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x4, 0x0, 'lblc\x00'}, 0x2c) getsockopt$inet_pktinfo(r45, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) fcntl$lock(r45, 0x27, &(0x7f0000000280)={0x4, 0x3, 0x5ba, 0x3f}) syz_open_procfs$namespace(0x0, &(0x7f0000004000)='ns/user\x00') socket$netlink(0x10, 0x3, 0x4) write(r1, &(0x7f0000000100)="b63db85e1e8d040000000000003ef0011dcc606aed69d2bc7037cebc9bc2feffffffffffffffe22c9b160096aa1fae1acfbd6cbf87798a9b02de7a91a3cbdfa009cf75a7eadb2a00", 0x48) 08:00:18 executing program 4: getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffffc, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100), 0x0) bind$unix(r0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000002c0)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r3 = socket(0x10, 0x400000000080803, 0x0) write(r3, &(0x7f0000000040), 0x0) recvmmsg(r3, &(0x7f0000004040)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000140)=""/116, 0x74}, {&(0x7f00000001c0)=""/4096, 0x1000}], 0x2}}], 0x663, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r4, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001480)='/proc/capi/capi20\x00', 0x200000, 0x0) syz_open_dev$vbi(&(0x7f00000014c0)='/dev/vbi#\x00', 0x0, 0x2) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r6, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r7 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r7, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) openat$vfio(0xffffffffffffff9c, &(0x7f0000001500)='/dev/vfio/vfio\x00', 0x10000, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r8) r9 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r9, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r10 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r10, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r11) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r12) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001540), &(0x7f0000001580)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, 0x0) r14 = semget$private(0x0, 0x0, 0x10e) r15 = getgid() r16 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) semctl$IPC_SET(r14, 0x0, 0x1, &(0x7f00000005c0)={{0x0, 0x0, r15, r16}, 0x0, 0x6072, 0x80000001}) chown(0x0, r13, r17) accept4$unix(r0, &(0x7f0000001a80)=@abs, &(0x7f0000001b00)=0x6e, 0x800) r18 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r18, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r19 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r19) socket$can_raw(0x1d, 0x3, 0x1) r20 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r20, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001e80), &(0x7f0000001ec0)=0xc) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000001f00)='/proc/capi/capi20ncci\x00', 0x20402, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000001f40)='/dev/full\x00', 0x600200, 0x0) r21 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r21) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001f80)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r22 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r22) fcntl$getown(r22, 0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002440), &(0x7f0000002480)=0xc) r23 = semget$private(0x0, 0x0, 0x10e) r24 = getgid() r25 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) semctl$IPC_SET(r23, 0x0, 0x1, &(0x7f00000005c0)={{0x0, 0x0, r24, r25, r26, 0x41}, 0x0, 0x6072, 0x80000001}) syz_open_dev$sndtimer(&(0x7f0000003c00)='/dev/snd/timer\x00', 0x0, 0x80) r27 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r27) r28 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r29 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r29, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x4, 0x0, 'lblc\x00'}, 0x2c) getsockopt$inet_pktinfo(r28, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) r30 = fcntl$getown(r29, 0x9) fcntl$lock(r28, 0x27, &(0x7f0000000280)={0x4, 0x3, 0x0, 0x3f, r30}) r31 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r32 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r32, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x4, 0x0, 'lblc\x00'}, 0x2c) getsockopt$inet_pktinfo(r31, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) r33 = fcntl$getown(r32, 0x9) fcntl$lock(r31, 0x27, &(0x7f0000000280)={0x4, 0x0, 0x5ba, 0x3f, r33}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, 0x0) r35 = semget$private(0x0, 0x0, 0x10e) r36 = getgid() r37 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) semctl$IPC_SET(r35, 0x0, 0x1, &(0x7f00000005c0)={{0x0, 0x0, r36, r37, r38, 0x41}, 0x0, 0x6072, 0x80000001}) chown(0x0, r34, r38) r39 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r39, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r40 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r40) socket$inet6_tcp(0xa, 0x1, 0x0) close(0xffffffffffffffff) r41 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r41, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r42 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r42) bind$netlink(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb16579c7108f782f}, 0xc) r43 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r43) r44 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r44) openat$udambuf(0xffffffffffffff9c, &(0x7f0000003ec0)='/dev/udmabuf\x00', 0x2) openat$capi20(0xffffffffffffff9c, &(0x7f0000003f00)='/dev/capi20\x00', 0x444142, 0x0) syz_open_dev$amidi(&(0x7f0000003f40)='/dev/amidi#\x00', 0x4c, 0x400000) socket$vsock_dgram(0x28, 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000003f80)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000003fc0)='net/nfsfs\x00') r45 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r46 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r46, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x4, 0x0, 'lblc\x00'}, 0x2c) getsockopt$inet_pktinfo(r45, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) fcntl$lock(r45, 0x27, &(0x7f0000000280)={0x4, 0x3, 0x5ba, 0x3f}) syz_open_procfs$namespace(0x0, &(0x7f0000004000)='ns/user\x00') socket$netlink(0x10, 0x3, 0x4) write(r1, &(0x7f0000000100)="b63db85e1e8d040000000000003ef0011dcc606aed69d2bc7037cebc9bc2feffffffffffffffe22c9b160096aa1fae1acfbd6cbf87798a9b02de7a91a3cbdfa009cf75a7eadb2a00", 0x48) [ 216.607519][ T3918] kobject: 'loop5' (0000000090add63f): kobject_uevent_env [ 216.634888][ T3918] kobject: 'loop5' (0000000090add63f): fill_kobj_path: path = '/devices/virtual/block/loop5' 08:00:19 executing program 2: getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffffc, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100), 0x0) bind$unix(r0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) getsockop