[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c.
[   55.991144][   T27] audit: type=1800 audit(1560166487.847:25): pid=8624 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0
[   56.018318][   T27] audit: type=1800 audit(1560166487.847:26): pid=8624 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0
[   56.044993][   T27] audit: type=1800 audit(1560166487.857:27): pid=8624 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0
[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c.
[....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c.

Debian GNU/Linux 7 syzkaller ttyS0

Warning: Permanently added '10.128.0.216' (ECDSA) to the list of known hosts.
2019/06/10 11:34:57 fuzzer started
2019/06/10 11:35:01 dialing manager at 10.128.0.26:46803
2019/06/10 11:35:01 syscalls: 2465
2019/06/10 11:35:01 code coverage: enabled
2019/06/10 11:35:01 comparison tracing: enabled
2019/06/10 11:35:01 extra coverage: extra coverage is not supported by the kernel
2019/06/10 11:35:01 setuid sandbox: enabled
2019/06/10 11:35:01 namespace sandbox: enabled
2019/06/10 11:35:01 Android sandbox: /sys/fs/selinux/policy does not exist
2019/06/10 11:35:01 fault injection: enabled
2019/06/10 11:35:01 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled
2019/06/10 11:35:01 net packet injection: enabled
2019/06/10 11:35:01 net device setup: enabled
11:37:41 executing program 0:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
setrlimit(0x0, &(0x7f0000000040))
recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00797)

syzkaller login: [  230.164994][ T8790] IPVS: ftp: loaded support on port[0] = 21
11:37:42 executing program 1:
clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='clear_refs\x00')
r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00')
exit(0x0)
syz_genetlink_get_family_id$tipc2(0x0)
sendfile(r0, r1, 0x0, 0x1)

[  230.290035][ T8790] chnl_net:caif_netlink_parms(): no params data found
[  230.380144][ T8790] bridge0: port 1(bridge_slave_0) entered blocking state
[  230.396677][ T8790] bridge0: port 1(bridge_slave_0) entered disabled state
[  230.405167][ T8790] device bridge_slave_0 entered promiscuous mode
[  230.430172][ T8790] bridge0: port 2(bridge_slave_1) entered blocking state
[  230.442701][ T8790] bridge0: port 2(bridge_slave_1) entered disabled state
[  230.451057][ T8790] device bridge_slave_1 entered promiscuous mode
[  230.472809][ T8793] IPVS: ftp: loaded support on port[0] = 21
[  230.489853][ T8790] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  230.500400][ T8790] bond0: Enslaving bond_slave_1 as an active interface with an up link
11:37:42 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070")
mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c832, 0xffffffffffffffff, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)

[  230.535481][ T8790] team0: Port device team_slave_0 added
[  230.551639][ T8790] team0: Port device team_slave_1 added
[  230.639580][ T8790] device hsr_slave_0 entered promiscuous mode
[  230.687896][ T8790] device hsr_slave_1 entered promiscuous mode
[  230.759136][ T8795] IPVS: ftp: loaded support on port[0] = 21
[  230.780988][ T8790] bridge0: port 2(bridge_slave_1) entered blocking state
[  230.788333][ T8790] bridge0: port 2(bridge_slave_1) entered forwarding state
[  230.796262][ T8790] bridge0: port 1(bridge_slave_0) entered blocking state
11:37:42 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
recvfrom$inet(r1, 0x0, 0x351, 0x41, 0x0, 0x0)
recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00cad)

[  230.803404][ T8790] bridge0: port 1(bridge_slave_0) entered forwarding state
[  230.980456][ T8793] chnl_net:caif_netlink_parms(): no params data found
[  231.002098][ T8798] IPVS: ftp: loaded support on port[0] = 21
11:37:42 executing program 4:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]})
r0 = openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0)
openat$cgroup_procs(r0, 0x0, 0x2, 0x0)

[  231.039966][ T8790] 8021q: adding VLAN 0 to HW filter on device bond0
[  231.118900][ T8790] 8021q: adding VLAN 0 to HW filter on device team0
[  231.126709][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  231.149270][ T8799] bridge0: port 1(bridge_slave_0) entered disabled state
[  231.158673][ T8799] bridge0: port 2(bridge_slave_1) entered disabled state
[  231.177544][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[  231.209269][ T8793] bridge0: port 1(bridge_slave_0) entered blocking state
[  231.219860][ T8793] bridge0: port 1(bridge_slave_0) entered disabled state
[  231.227995][ T8793] device bridge_slave_0 entered promiscuous mode
[  231.236463][ T8793] bridge0: port 2(bridge_slave_1) entered blocking state
[  231.246030][ T8793] bridge0: port 2(bridge_slave_1) entered disabled state
[  231.254690][ T8793] device bridge_slave_1 entered promiscuous mode
[  231.281115][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  231.289955][ T8799] bridge0: port 1(bridge_slave_0) entered blocking state
[  231.297074][ T8799] bridge0: port 1(bridge_slave_0) entered forwarding state
[  231.307560][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  231.316059][ T8799] bridge0: port 2(bridge_slave_1) entered blocking state
[  231.323181][ T8799] bridge0: port 2(bridge_slave_1) entered forwarding state
[  231.364594][ T8802] IPVS: ftp: loaded support on port[0] = 21
11:37:43 executing program 5:
r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0)
ioctl$SIOCAX25ADDFWD(r0, 0x890c, &(0x7f0000000040)={@default, @bcast})

[  231.415892][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  231.430188][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  231.440610][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  231.450697][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  231.461546][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  231.470383][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  231.494617][ T8790] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  231.508152][ T8790] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  231.527349][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  231.535125][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  231.543541][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  231.554025][ T8793] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  231.564649][ T8793] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  231.611471][ T8795] chnl_net:caif_netlink_parms(): no params data found
[  231.638971][ T8793] team0: Port device team_slave_0 added
[  231.662985][ T8806] IPVS: ftp: loaded support on port[0] = 21
[  231.664619][ T8790] 8021q: adding VLAN 0 to HW filter on device batadv0
[  231.686022][ T8793] team0: Port device team_slave_1 added
[  231.738923][ T8795] bridge0: port 1(bridge_slave_0) entered blocking state
[  231.746053][ T8795] bridge0: port 1(bridge_slave_0) entered disabled state
[  231.754180][ T8795] device bridge_slave_0 entered promiscuous mode
[  231.764096][ T8795] bridge0: port 2(bridge_slave_1) entered blocking state
[  231.771292][ T8795] bridge0: port 2(bridge_slave_1) entered disabled state
[  231.779384][ T8795] device bridge_slave_1 entered promiscuous mode
[  231.837652][ T8795] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  231.898680][ T8793] device hsr_slave_0 entered promiscuous mode
[  231.956906][ T8793] device hsr_slave_1 entered promiscuous mode
[  232.042603][ T8795] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  232.108719][ T8798] chnl_net:caif_netlink_parms(): no params data found
[  232.202613][ T8795] team0: Port device team_slave_0 added
[  232.214394][ T8795] team0: Port device team_slave_1 added
[  232.272483][ T8798] bridge0: port 1(bridge_slave_0) entered blocking state
[  232.280140][ T8798] bridge0: port 1(bridge_slave_0) entered disabled state
[  232.289961][ T8798] device bridge_slave_0 entered promiscuous mode
[  232.298362][ T8798] bridge0: port 2(bridge_slave_1) entered blocking state
[  232.305560][ T8798] bridge0: port 2(bridge_slave_1) entered disabled state
[  232.314010][ T8798] device bridge_slave_1 entered promiscuous mode
[  232.321421][ T8802] chnl_net:caif_netlink_parms(): no params data found
[  232.373973][ T8806] chnl_net:caif_netlink_parms(): no params data found
[  232.419075][ T8795] device hsr_slave_0 entered promiscuous mode
[  232.457924][ T8795] device hsr_slave_1 entered promiscuous mode
[  232.554065][ T8798] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  232.597560][ T8798] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  232.606100][ T8802] bridge0: port 1(bridge_slave_0) entered blocking state
[  232.613950][ T8802] bridge0: port 1(bridge_slave_0) entered disabled state
[  232.622218][ T8802] device bridge_slave_0 entered promiscuous mode
[  232.630635][ T8802] bridge0: port 2(bridge_slave_1) entered blocking state
[  232.638123][ T8802] bridge0: port 2(bridge_slave_1) entered disabled state
[  232.646156][ T8802] device bridge_slave_1 entered promiscuous mode
[  232.665051][ T8793] 8021q: adding VLAN 0 to HW filter on device bond0
[  232.694646][ T8806] bridge0: port 1(bridge_slave_0) entered blocking state
[  232.702059][ T8806] bridge0: port 1(bridge_slave_0) entered disabled state
[  232.710998][ T8806] device bridge_slave_0 entered promiscuous mode
[  232.719330][ T8806] bridge0: port 2(bridge_slave_1) entered blocking state
[  232.730839][ T8806] bridge0: port 2(bridge_slave_1) entered disabled state
[  232.738976][ T8806] device bridge_slave_1 entered promiscuous mode
[  232.762338][ T8798] team0: Port device team_slave_0 added
[  232.787266][ T8802] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  232.807827][ T8802] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  232.821216][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  232.828975][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  232.839796][ T8798] team0: Port device team_slave_1 added
[  232.855367][ T8806] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  232.865867][ T8806] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  232.879359][ T8793] 8021q: adding VLAN 0 to HW filter on device team0
[  232.907394][ T8802] team0: Port device team_slave_0 added
[  232.928240][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  232.937019][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  232.945702][   T17] bridge0: port 1(bridge_slave_0) entered blocking state
11:37:44 executing program 0:
perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10)
connect$inet(r0, &(0x7f0000000480)={0x2, 0xa2, @multicast2}, 0x10)
sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001df, 0x0)

[  232.952974][   T17] bridge0: port 1(bridge_slave_0) entered forwarding state
[  232.971015][ T8802] team0: Port device team_slave_1 added
[  233.020336][ T8798] device hsr_slave_0 entered promiscuous mode
[  233.087176][ T8798] device hsr_slave_1 entered promiscuous mode
[  233.091067][ T8821] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based  firewall rule not found. Use the iptables CT target to attach helpers instead.
[  233.128134][ T8806] team0: Port device team_slave_0 added
[  233.135675][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  233.145372][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  233.154987][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  233.171617][   T17] bridge0: port 2(bridge_slave_1) entered blocking state
[  233.178946][   T17] bridge0: port 2(bridge_slave_1) entered forwarding state
[  233.214186][ T8806] team0: Port device team_slave_1 added
11:37:45 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="f6f7"])
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil})
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070")
ioctl$KVM_RUN(r2, 0xae80, 0x0)

[  233.269741][ T8802] device hsr_slave_0 entered promiscuous mode
[  233.297785][ T8802] device hsr_slave_1 entered promiscuous mode
[  233.346453][ T8802] bridge0: port 2(bridge_slave_1) entered blocking state
[  233.353902][ T8802] bridge0: port 2(bridge_slave_1) entered forwarding state
[  233.361466][ T8802] bridge0: port 1(bridge_slave_0) entered blocking state
[  233.368768][ T8802] bridge0: port 1(bridge_slave_0) entered forwarding state
[  233.407133][    T5] bridge0: port 1(bridge_slave_0) entered disabled state
[  233.415310][    T5] bridge0: port 2(bridge_slave_1) entered disabled state
[  233.419808][ T8824] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details.
[  233.443966][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  233.538863][ T8806] device hsr_slave_0 entered promiscuous mode
[  233.577293][ T8806] device hsr_slave_1 entered promiscuous mode
[  233.622635][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  233.632455][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  233.642348][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  233.690306][ T8795] 8021q: adding VLAN 0 to HW filter on device bond0
[  233.710470][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  233.719356][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  233.728594][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  233.740058][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  233.749037][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  233.775619][ T8795] 8021q: adding VLAN 0 to HW filter on device team0
[  233.808076][ T8802] 8021q: adding VLAN 0 to HW filter on device bond0
[  233.817547][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  233.831088][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  233.839716][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  233.849266][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  233.873257][ T8793] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  233.903092][ T8802] 8021q: adding VLAN 0 to HW filter on device team0
[  233.920311][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  233.931377][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  233.943356][ T3006] bridge0: port 1(bridge_slave_0) entered blocking state
[  233.950786][ T3006] bridge0: port 1(bridge_slave_0) entered forwarding state
[  233.966040][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  233.975110][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  233.989160][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  234.001992][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  234.012728][ T3006] bridge0: port 2(bridge_slave_1) entered blocking state
[  234.019867][ T3006] bridge0: port 2(bridge_slave_1) entered forwarding state
[  234.063387][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  234.078727][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  234.092626][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  234.103649][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  234.119194][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  234.132695][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  234.144077][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  234.159319][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  234.173722][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  234.184802][   T17] bridge0: port 1(bridge_slave_0) entered blocking state
[  234.191985][   T17] bridge0: port 1(bridge_slave_0) entered forwarding state
[  234.206196][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  234.215491][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  234.230733][   T17] bridge0: port 2(bridge_slave_1) entered blocking state
[  234.237998][   T17] bridge0: port 2(bridge_slave_1) entered forwarding state
[  234.264130][ T8798] 8021q: adding VLAN 0 to HW filter on device bond0
[  234.283485][ T8793] 8021q: adding VLAN 0 to HW filter on device batadv0
[  234.322109][ T8795] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
11:37:46 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="f6f7"])
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil})
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070")
ioctl$KVM_RUN(r2, 0xae80, 0x0)

[  234.347623][ T8795] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  234.374309][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  234.387681][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  234.397967][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  234.407271][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  234.417378][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  234.436390][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  234.459162][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  234.507293][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  234.515661][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  234.525037][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  234.547711][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  234.556933][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  234.565729][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  234.574666][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  234.583631][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  234.592676][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  234.605451][ T8802] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  234.621247][ T8798] 8021q: adding VLAN 0 to HW filter on device team0
[  234.639759][ T8795] 8021q: adding VLAN 0 to HW filter on device batadv0
[  234.655075][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  234.667469][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  234.675305][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  234.720046][ T8806] 8021q: adding VLAN 0 to HW filter on device bond0
[  234.757281][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  234.766451][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  234.825283][ T8801] bridge0: port 1(bridge_slave_0) entered blocking state
[  234.832906][ T8801] bridge0: port 1(bridge_slave_0) entered forwarding state
[  234.908822][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  234.923196][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  234.935742][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  234.967719][    T5] bridge0: port 2(bridge_slave_1) entered blocking state
[  234.974946][    T5] bridge0: port 2(bridge_slave_1) entered forwarding state
[  234.983089][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  234.993530][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  235.002130][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  235.014646][ T8806] 8021q: adding VLAN 0 to HW filter on device team0
[  235.035520][ T8802] 8021q: adding VLAN 0 to HW filter on device batadv0
[  235.053483][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  235.097655][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  235.119997][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  235.135162][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  235.154271][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  235.163127][ T8801] bridge0: port 1(bridge_slave_0) entered blocking state
[  235.170468][ T8801] bridge0: port 1(bridge_slave_0) entered forwarding state
[  235.184521][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  235.194080][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  235.210301][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  235.223609][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  235.234873][ T8801] bridge0: port 2(bridge_slave_1) entered blocking state
[  235.242181][ T8801] bridge0: port 2(bridge_slave_1) entered forwarding state
[  235.256749][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  235.265424][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
11:37:47 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="f6f7"])
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil})
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070")
ioctl$KVM_RUN(r2, 0xae80, 0x0)

[  235.341870][ T8798] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  235.424819][ T8798] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  235.456005][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  235.465274][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  235.475022][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  235.484757][ T8859] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state.
[  235.493973][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  235.503580][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  235.512310][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  235.521849][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
11:37:47 executing program 2:
r0 = socket$can_raw(0x1d, 0x3, 0x1)
sendto$isdn(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, "513cc98cfd54487ec80694c30ecf4b216b03e69883339a299eca8947b01ddf133c96924d41c33eb0f83f07753f5e200f222880680bfe28ba01c833d9b1054eaa7527a182538a39466624e669530ed7220dc037a500a43126af462d3b618a49420b63a502e9a6e8ae854a9a3f5b30e0f338abdfb6d12a76b25fcce946e57b216e5cfa97cc138c8b0e84d1b16b973ce3afc6e2083fdc93b3b4c2cfea039e8dd3a9b3f4dec067d6a2fad1cf6757d79c0f882ce5fd0bbce56e39424e0bd474cd22df"}, 0xc8, 0x0, 0x0, 0x0)
bind$can_raw(r0, &(0x7f0000000200), 0x10)
setsockopt(r0, 0x65, 0x1, &(0x7f0000000080), 0x1d0)

[  235.551549][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  235.580531][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
11:37:47 executing program 0:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]})
fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xffffff7f, 0x1)

[  235.599675][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  235.634737][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  235.660286][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  235.702560][ T8806] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
11:37:47 executing program 1:
r0 = gettid()
inotify_init1(0x0)
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
symlinkat(&(0x7f0000000200)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00')
listen(r1, 0x0)
request_key(0x0, 0x0, 0x0, 0xffffffffffffffff)
lstat(&(0x7f0000000040)='./file0/file0\x00', 0x0)
timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0)
umount2(0x0, 0x0)
tkill(r0, 0x1000000000016)

[  235.763817][ T8806] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  235.847188][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  235.864621][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
11:37:47 executing program 2:
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='cgroup\x00', 0x1200000, &(0x7f0000000280)='/dev/amidi#\x00')

[  235.890101][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  235.929990][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
11:37:47 executing program 0:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="021000000a000000000010ec000092000800120000048a0500000000006c004007000000b4cb8cb61b12e7280b41bbc2e0e82eff273aa2768a790297c1060c612b4300000034db362535393300000000"], 0x50}}, 0x0)
sendmmsg(r0, &(0x7f0000000180), 0x4000054, 0x0)

[  235.972726][ T8798] 8021q: adding VLAN 0 to HW filter on device batadv0
[  236.040709][ T8880] cgroup1: Unknown subsys name '/dev/amidi#'
[  236.066872][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  236.082274][ T8806] 8021q: adding VLAN 0 to HW filter on device batadv0
[  236.115106][ T8885] cgroup1: Unknown subsys name '/dev/amidi#'
11:37:49 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000810000100080400a00000000001400000", 0x58}], 0x1)

11:37:49 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070")
r1 = socket(0x400020000000010, 0x2, 0x0)
write(r1, &(0x7f0000000140)="1f00000054000d0000000000fc07ff1b070c0439000000000700012f010039", 0x1f)

11:37:49 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071")
r1 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
sendmmsg(r1, &(0x7f0000000180), 0x508, 0x0)

11:37:49 executing program 0:
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x40000000000015, 0x8000000000000010, 0xe68}, 0x2c)
bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000100)={r0, 0x0, 0x0}, 0x18)

11:37:49 executing program 2:
r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0)
ioctl$SIOCAX25ADDFWD(r0, 0x890c, &(0x7f0000000040)={@default, @rose})

11:37:49 executing program 5:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
select(0x40, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000000c0)={0x20000000009, 0xb456})
recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00381)

11:37:49 executing program 0:
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="f4585998bc7572958a0edbd35289d05f075893e3a4a35db4651a187df468413345b379d227d8d661ce0e9c83fd1ba4d0", 0x30}], 0x1}, 0x0)
r0 = socket$can_raw(0x1d, 0x3, 0x1)
bind$can_raw(r0, &(0x7f0000000200), 0x10)
setsockopt(r0, 0x65, 0x1, &(0x7f0000000080), 0x1d0)

11:37:49 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @rand_addr="cfa3c35f5c23a76d157f5d1253b31e77"}, 0x1c)

[  237.231020][ T8916] PF_BRIDGE: br_mdb_parse() with invalid ifindex
11:37:49 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000810000100080400a00000000001400000", 0x58}], 0x1)

11:37:49 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="c2dca5055e0bcfec7be070")
r1 = socket(0x400040000000015, 0x805, 0x0)
getsockopt(r1, 0x114, 0x271b, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0x208)

11:37:49 executing program 2:
r0 = perf_event_open(&(0x7f0000000000)={0x40000000000002, 0x70, 0x1e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='ppp1eth0nodev#\x00')

11:37:49 executing program 0:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\x00;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddpr\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0)
close(r0)
close(r1)
sendmsg$kcm(r1, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=ANY=[@ANYBLOB="18000000000000000100000001000000ec00000004"], 0x15}, 0x0)
r2 = socket$kcm(0xa, 0x2, 0x0)
close(r2)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
sendmsg$kcm(r2, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[{0x18, 0x1, 0x1, "ec"}], 0x18}, 0x0)
recvmsg$kcm(r1, &(0x7f00000003c0)={0x0, 0x1000000, 0x0, 0x0, &(0x7f0000000440)=""/134, 0x86}, 0x0)
getpid()
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9)
recvmsg(0xffffffffffffffff, &(0x7f0000017d00)={0x0, 0x0, 0x0}, 0x2)
sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e24, @loopback}, 0x4, 0x2, 0x4, 0x1}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000980)="44471c501e03230ed93443bd3a4b1f080fe50f03c9af3edd795084950d7a8a6033033efb80692640156caeb96e8d40ede99e7428233d4eeaeff74721200f1d6867cc8b0ef2ae4c7f540de15a56abf9bb3fc9f06f9c77506d93b2e80dceb1fe7889d9fd69b9a6e754826fe9d04bd8c15e05a58e4ab68ad6e63de3b00be4cf44f1005cc55a60864ba5781153a58e53f54230b42030b371956767931fbd26f33f282215b3842d032b318c73c863cbde7630aadf59c53edb863a023566f80f22a45f7c7b300dccd3d697a1e1cb27b413406308585c", 0xd3}], 0x1}, 0x800)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r1, &(0x7f0000002d00)='!', 0x0}, 0x18)
socketpair(0xe, 0x4, 0x1, &(0x7f00000000c0))
ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0)
bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000100)=r1, 0x1)
bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x20000000000002f1, 0x0, 0x0, 0x2400, 0x1000, &(0x7f00000017c0)=""/4096, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x2b3}, 0x70)

11:37:49 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000810000100080400a00000000001400000", 0x58}], 0x1)

11:37:49 executing program 1:
getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000640)="c0dca5055e00b4ec7be070")
r1 = socket$inet6(0xa, 0x100000000000001, 0x84)
bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c)
connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, 0x0, &(0x7f0000001080))
getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, 0x0, &(0x7f0000001240))

[  237.619293][    C1] hrtimer: interrupt took 28106 ns
11:37:49 executing program 4:
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='cgroup\x00', 0x0, 0x0)

11:37:49 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000810000100080400a00000000001400000", 0x58}], 0x1)

11:37:49 executing program 2:
perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f00000002c0)={{}, 0x0, 0x0, 'id0\x00', 'timer0\x00'})

11:37:49 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f00000000c0)=0x1e)

11:37:49 executing program 0:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\x00;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddpr\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0)
close(r0)
close(r1)
sendmsg$kcm(r1, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=ANY=[@ANYBLOB="18000000000000000100000001000000ec00000004"], 0x15}, 0x0)
r2 = socket$kcm(0xa, 0x2, 0x0)
close(r2)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
sendmsg$kcm(r2, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[{0x18, 0x1, 0x1, "ec"}], 0x18}, 0x0)
recvmsg$kcm(r1, &(0x7f00000003c0)={0x0, 0x1000000, 0x0, 0x0, &(0x7f0000000440)=""/134, 0x86}, 0x0)
getpid()
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9)
recvmsg(0xffffffffffffffff, &(0x7f0000017d00)={0x0, 0x0, 0x0}, 0x2)
sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e24, @loopback}, 0x4, 0x2, 0x4, 0x1}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000980)="44471c501e03230ed93443bd3a4b1f080fe50f03c9af3edd795084950d7a8a6033033efb80692640156caeb96e8d40ede99e7428233d4eeaeff74721200f1d6867cc8b0ef2ae4c7f540de15a56abf9bb3fc9f06f9c77506d93b2e80dceb1fe7889d9fd69b9a6e754826fe9d04bd8c15e05a58e4ab68ad6e63de3b00be4cf44f1005cc55a60864ba5781153a58e53f54230b42030b371956767931fbd26f33f282215b3842d032b318c73c863cbde7630aadf59c53edb863a023566f80f22a45f7c7b300dccd3d697a1e1cb27b413406308585c", 0xd3}], 0x1}, 0x800)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r1, &(0x7f0000002d00)='!', 0x0}, 0x18)
socketpair(0xe, 0x4, 0x1, &(0x7f00000000c0))
ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0)
bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000100)=r1, 0x1)
bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x20000000000002f1, 0x0, 0x0, 0x2400, 0x1000, &(0x7f00000017c0)=""/4096, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x2b3}, 0x70)

11:37:49 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x33, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x3, @ipv4=@multicast1=0xfeff0005}]}]}, 0x24}}, 0x0)

11:37:49 executing program 3:
writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000810000100080400a00000000001400000", 0x58}], 0x1)

[  238.120269][ T8974] openvswitch: netlink: Port 83951614 exceeds max allowable 65535
11:37:50 executing program 2:
r0 = socket$can_raw(0x1d, 0x3, 0x1)
ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@add_del={0x2, &(0x7f0000000080)='veth1_to_bridge\x00'})
bind$can_raw(r0, &(0x7f0000000200), 0x10)
setsockopt(r0, 0x65, 0x1, &(0x7f0000000080), 0x1d0)
close(r0)

11:37:50 executing program 3:
writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000810000100080400a00000000001400000", 0x58}], 0x1)

11:37:50 executing program 4:
r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0)
ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={@default, @netrom, 0x0, [@default, @default, @default, @default, @null, @rose, @bcast, @rose]})

11:37:50 executing program 0:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070")
r1 = socket$inet_udp(0x2, 0x2, 0x0)
connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @empty}, 0x10)
r2 = socket(0xa, 0x1, 0x0)
setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88)
setsockopt$sock_int(r1, 0x1, 0x29, &(0x7f00000001c0), 0x4)

11:37:50 executing program 1:
syz_emit_ethernet(0x36, &(0x7f0000000000)={@random="8db482075da1", @random="b4a75d018d1d", [], {@ipv4={0x800, {{0x5, 0x4, 0x3, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x883e, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0)

11:37:50 executing program 5:
r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0)
ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={@default, @netrom, 0x5, [@default, @default, @default, @default, @null, @rose, @bcast, @rose]})

11:37:50 executing program 3:
writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000810000100080400a00000000001400000", 0x58}], 0x1)

11:37:50 executing program 2:
r0 = socket$netlink(0x10, 0x3, 0x8000000004)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071")
writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd000000100001000a0c10000000000001400000", 0x58}], 0x1)

11:37:50 executing program 0:
r0 = perf_event_open(&(0x7f0000000000)={0x40000000000002, 0x70, 0x1e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='ppp1eth0nodev#\x00')

11:37:50 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]})
fsetxattr$trusted_overlay_origin(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0xf4a52a64e54fb6a7)

11:37:50 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070")
bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x58)
r2 = accept4(r0, 0x0, 0x0, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB], 0x1}}, 0x0)

11:37:50 executing program 4:
r0 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100080410000000000001400000", 0x58}], 0x1)

11:37:50 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x0)
writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000810000100080400a00000000001400000", 0x58}], 0x1)

11:37:50 executing program 2:
r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0)
bind$ax25(r0, &(0x7f0000000080)={{0x3, @default}, [@remote, @netrom, @default, @null, @null, @default, @bcast]}, 0x48)

11:37:50 executing program 0:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]})
r0 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0)

[  238.785386][ T9025] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'.
11:37:50 executing program 1:
r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0)
setsockopt$ax25_SO_BINDTODEVICE(r0, 0x101, 0x19, &(0x7f0000000000)=@bpq0='bpq0\x00', 0x10)

11:37:50 executing program 4:
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x8, &(0x7f0000000240)=@raw=[@jmp={0x5, 0x1b78, 0x1, 0x8, 0xf, 0xfffffffffffffffc, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xe94}, @exit, @map, @exit, @jmp], &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)

11:37:50 executing program 5:
r0 = socket(0x10, 0x80002, 0x0)
r1 = creat(0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f00000004c0))
prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0)
ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201)
r2 = openat$null(0xffffffffffffff9c, 0x0, 0x300, 0x0)
getsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f00000001c0)={@multicast1, @remote, @empty}, &(0x7f0000000240)=0xffffffffffffff7d)
unshare(0x400)
ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0)
shutdown(0xffffffffffffffff, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0)=0x5, 0x4)
fchown(r1, 0x0, 0x0)
fsetxattr$system_posix_acl(r2, 0x0, &(0x7f0000000c80)=ANY=[], 0x0, 0x2)
r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0)
request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffff8)
fstat(r3, 0x0)
r5 = semget$private(0x0, 0x0, 0x0)
vmsplice(r4, &(0x7f0000000180), 0x0, 0x8)
semtimedop(r5, &(0x7f0000000400)=[{0x0, 0x80000001, 0x1000}, {0x0, 0x5, 0x800}], 0x2, &(0x7f0000000900))
write$P9_RCREATE(r1, &(0x7f0000000100)={0x18, 0x73, 0x1, {{0x21, 0x4, 0x1}, 0x8}}, 0x18)
write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x1, {0x20, 0x2, 0x3}}, 0x14)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0)
ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0)
write$P9_RFLUSH(r2, &(0x7f0000000140)={0x7, 0x6d, 0x1}, 0x7)
r6 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x6000)

11:37:50 executing program 2:
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='cgroup\x00', 0x0, 0x0)

11:37:50 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x0)
writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000810000100080400a00000000001400000", 0x58}], 0x1)

[  239.047731][ T9045] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'.
11:37:50 executing program 4:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x3b7)
connect$inet6(r0, &(0x7f0000000080), 0x1c)
setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0)
r2 = dup2(r0, r1)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64)
clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88)
write$P9_RFLUSH(r1, 0x0, 0x0)

11:37:51 executing program 1:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x443, 0x0)
ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040))

11:37:51 executing program 2:
request_key(0x0, &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]})
r0 = openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x70, 0x6, 0x5, 0x4, 0x200, 0x0, 0x66d4, 0xc8100, 0x0, 0x0, 0x8, 0x7, 0x38, 0xfffffffffffffffc, 0x0, 0x1, 0x9, 0x0, 0x40, 0x0, 0x5, 0x7fffffff, 0x200, 0x1, 0x4a1, 0x9, 0x7, 0x0, 0x0, 0x3ff, 0xd54f, 0xa54, 0x0, 0x8, 0x8, 0x0, 0x1, 0x0, 0x7b6, 0x0, @perf_bp={0x0, 0xc}, 0x9041, 0x7, 0x8, 0x7, 0xfffffffffffffff5, 0x33cc, 0x8}, r0, 0x0, 0xffffffffffffffff, 0x0)

11:37:51 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x0)
writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000810000100080400a00000000001400000", 0x58}], 0x1)

11:37:51 executing program 0:
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='cgroup\x00', 0x1200000, &(0x7f0000000280)='/dev/amidi#\x00')

11:37:51 executing program 0:

11:37:51 executing program 0:

[  239.225533][ T9056] cgroup1: Unknown subsys name '/dev/amidi#'
[  239.234671][ T9057] cgroup1: Unknown subsys name '/dev/amidi#'
[  239.358026][ T9066] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'.
11:37:51 executing program 0:

11:37:51 executing program 3:
socket$netlink(0x10, 0x3, 0x8000000004)
writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000810000100080400a00000000001400000", 0x58}], 0x1)

11:37:51 executing program 5:
r0 = socket(0x10, 0x80002, 0x0)
r1 = creat(0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f00000004c0))
prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0)
ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201)
r2 = openat$null(0xffffffffffffff9c, 0x0, 0x300, 0x0)
getsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f00000001c0)={@multicast1, @remote, @empty}, &(0x7f0000000240)=0xffffffffffffff7d)
unshare(0x400)
ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0)
shutdown(0xffffffffffffffff, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0)=0x5, 0x4)
fchown(r1, 0x0, 0x0)
fsetxattr$system_posix_acl(r2, 0x0, &(0x7f0000000c80)=ANY=[], 0x0, 0x2)
r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0)
request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffff8)
fstat(r3, 0x0)
r5 = semget$private(0x0, 0x0, 0x0)
vmsplice(r4, &(0x7f0000000180), 0x0, 0x8)
semtimedop(r5, &(0x7f0000000400)=[{0x0, 0x80000001, 0x1000}, {0x0, 0x5, 0x800}], 0x2, &(0x7f0000000900))
write$P9_RCREATE(r1, &(0x7f0000000100)={0x18, 0x73, 0x1, {{0x21, 0x4, 0x1}, 0x8}}, 0x18)
write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x1, {0x20, 0x2, 0x3}}, 0x14)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0)
ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0)
write$P9_RFLUSH(r2, &(0x7f0000000140)={0x7, 0x6d, 0x1}, 0x7)
r6 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x6000)

11:37:51 executing program 1:

11:37:51 executing program 0:

11:37:51 executing program 2:

11:37:51 executing program 3:
socket$netlink(0x10, 0x3, 0x8000000004)
writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000810000100080400a00000000001400000", 0x58}], 0x1)

11:37:51 executing program 1:

11:37:51 executing program 4:

11:37:51 executing program 0:

11:37:51 executing program 0:

11:37:51 executing program 1:

11:37:51 executing program 3:
socket$netlink(0x10, 0x3, 0x8000000004)
writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000810000100080400a00000000001400000", 0x58}], 0x1)

11:37:51 executing program 2:

11:37:51 executing program 5:
r0 = socket(0x10, 0x80002, 0x0)
r1 = creat(0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f00000004c0))
prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0)
ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201)
r2 = openat$null(0xffffffffffffff9c, 0x0, 0x300, 0x0)
getsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f00000001c0)={@multicast1, @remote, @empty}, &(0x7f0000000240)=0xffffffffffffff7d)
unshare(0x400)
ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0)
shutdown(0xffffffffffffffff, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0)=0x5, 0x4)
fchown(r1, 0x0, 0x0)
fsetxattr$system_posix_acl(r2, 0x0, &(0x7f0000000c80)=ANY=[], 0x0, 0x2)
r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0)
request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffff8)
fstat(r3, 0x0)
r5 = semget$private(0x0, 0x0, 0x0)
vmsplice(r4, &(0x7f0000000180), 0x0, 0x8)
semtimedop(r5, &(0x7f0000000400)=[{0x0, 0x80000001, 0x1000}, {0x0, 0x5, 0x800}], 0x2, &(0x7f0000000900))
write$P9_RCREATE(r1, &(0x7f0000000100)={0x18, 0x73, 0x1, {{0x21, 0x4, 0x1}, 0x8}}, 0x18)
write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x1, {0x20, 0x2, 0x3}}, 0x14)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0)
ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0)
write$P9_RFLUSH(r2, &(0x7f0000000140)={0x7, 0x6d, 0x1}, 0x7)
r6 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x6000)

11:37:52 executing program 4:

11:37:52 executing program 0:

11:37:52 executing program 2:

11:37:52 executing program 1:

11:37:52 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r0, 0x0, 0x0)

11:37:52 executing program 4:

11:37:52 executing program 0:

11:37:52 executing program 2:

11:37:52 executing program 4:

11:37:52 executing program 5:
r0 = socket(0x10, 0x80002, 0x0)
r1 = creat(0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f00000004c0))
prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0)
ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201)
r2 = openat$null(0xffffffffffffff9c, 0x0, 0x300, 0x0)
getsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f00000001c0)={@multicast1, @remote, @empty}, &(0x7f0000000240)=0xffffffffffffff7d)
unshare(0x400)
ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0)
shutdown(0xffffffffffffffff, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0)=0x5, 0x4)
fchown(r1, 0x0, 0x0)
fsetxattr$system_posix_acl(r2, 0x0, &(0x7f0000000c80)=ANY=[], 0x0, 0x2)
r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0)
request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffff8)
fstat(r3, 0x0)
r5 = semget$private(0x0, 0x0, 0x0)
vmsplice(r4, &(0x7f0000000180), 0x0, 0x8)
semtimedop(r5, &(0x7f0000000400)=[{0x0, 0x80000001, 0x1000}, {0x0, 0x5, 0x800}], 0x2, &(0x7f0000000900))
write$P9_RCREATE(r1, &(0x7f0000000100)={0x18, 0x73, 0x1, {{0x21, 0x4, 0x1}, 0x8}}, 0x18)
write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x1, {0x20, 0x2, 0x3}}, 0x14)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0)
ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0)
write$P9_RFLUSH(r2, &(0x7f0000000140)={0x7, 0x6d, 0x1}, 0x7)
r6 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x6000)

11:37:52 executing program 2:

11:37:52 executing program 0:

11:37:52 executing program 1:

11:37:52 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r0, 0x0, 0x0)

11:37:52 executing program 4:

11:37:52 executing program 2:

11:37:52 executing program 0:

11:37:52 executing program 1:

11:37:52 executing program 4:

11:37:52 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r0, 0x0, 0x0)

11:37:53 executing program 0:

11:37:53 executing program 5:
r0 = socket(0x10, 0x80002, 0x0)
r1 = creat(0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f00000004c0))
prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0)
ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201)
r2 = openat$null(0xffffffffffffff9c, 0x0, 0x300, 0x0)
getsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f00000001c0)={@multicast1, @remote, @empty}, &(0x7f0000000240)=0xffffffffffffff7d)
unshare(0x400)
ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0)
shutdown(0xffffffffffffffff, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0)=0x5, 0x4)
fchown(r1, 0x0, 0x0)
fsetxattr$system_posix_acl(r2, 0x0, &(0x7f0000000c80)=ANY=[], 0x0, 0x2)
r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0)
request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffff8)
fstat(r3, 0x0)
r5 = semget$private(0x0, 0x0, 0x0)
vmsplice(r4, &(0x7f0000000180), 0x0, 0x8)
semtimedop(r5, &(0x7f0000000400)=[{0x0, 0x80000001, 0x1000}, {0x0, 0x5, 0x800}], 0x2, &(0x7f0000000900))
write$P9_RCREATE(r1, &(0x7f0000000100)={0x18, 0x73, 0x1, {{0x21, 0x4, 0x1}, 0x8}}, 0x18)
write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x1, {0x20, 0x2, 0x3}}, 0x14)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0)
ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0)
write$P9_RFLUSH(r2, &(0x7f0000000140)={0x7, 0x6d, 0x1}, 0x7)
shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)

11:37:53 executing program 1:

11:37:53 executing program 0:

11:37:53 executing program 4:

11:37:53 executing program 2:

11:37:53 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r0, &(0x7f0000000080), 0x0)

11:37:53 executing program 1:

11:37:53 executing program 0:

11:37:53 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r0, &(0x7f0000000080), 0x0)

11:37:53 executing program 2:

11:37:53 executing program 4:

11:37:53 executing program 0:

11:37:53 executing program 5:
r0 = socket(0x10, 0x80002, 0x0)
r1 = creat(0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f00000004c0))
prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0)
ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201)
r2 = openat$null(0xffffffffffffff9c, 0x0, 0x300, 0x0)
getsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f00000001c0)={@multicast1, @remote, @empty}, &(0x7f0000000240)=0xffffffffffffff7d)
unshare(0x400)
ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0)
shutdown(0xffffffffffffffff, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0)=0x5, 0x4)
fchown(r1, 0x0, 0x0)
fsetxattr$system_posix_acl(r2, 0x0, &(0x7f0000000c80)=ANY=[], 0x0, 0x2)
r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0)
request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffff8)
fstat(r3, 0x0)
r5 = semget$private(0x0, 0x0, 0x0)
vmsplice(r4, &(0x7f0000000180), 0x0, 0x8)
semtimedop(r5, &(0x7f0000000400)=[{0x0, 0x80000001, 0x1000}, {0x0, 0x5, 0x800}], 0x2, &(0x7f0000000900))
write$P9_RCREATE(r1, &(0x7f0000000100)={0x18, 0x73, 0x1, {{0x21, 0x4, 0x1}, 0x8}}, 0x18)
write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x1, {0x20, 0x2, 0x3}}, 0x14)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0)
ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0)
write$P9_RFLUSH(r2, &(0x7f0000000140)={0x7, 0x6d, 0x1}, 0x7)
shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)

11:37:53 executing program 1:

11:37:53 executing program 4:

11:37:53 executing program 2:

11:37:53 executing program 0:

11:37:53 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r0, &(0x7f0000000080), 0x0)

11:37:53 executing program 1:

11:37:53 executing program 4:

11:37:53 executing program 0:

11:37:53 executing program 2:

11:37:53 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r0, &(0x7f0000000080)=[{0x0}], 0x1)

11:37:54 executing program 4:

11:37:54 executing program 5:
r0 = socket(0x10, 0x80002, 0x0)
r1 = creat(0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f00000004c0))
prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0)
ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201)
r2 = openat$null(0xffffffffffffff9c, 0x0, 0x300, 0x0)
getsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f00000001c0)={@multicast1, @remote, @empty}, &(0x7f0000000240)=0xffffffffffffff7d)
unshare(0x400)
ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0)
shutdown(0xffffffffffffffff, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0)=0x5, 0x4)
fchown(r1, 0x0, 0x0)
fsetxattr$system_posix_acl(r2, 0x0, &(0x7f0000000c80)=ANY=[], 0x0, 0x2)
r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0)
request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffff8)
fstat(r3, 0x0)
r5 = semget$private(0x0, 0x0, 0x0)
vmsplice(r4, &(0x7f0000000180), 0x0, 0x8)
semtimedop(r5, &(0x7f0000000400)=[{0x0, 0x80000001, 0x1000}, {0x0, 0x5, 0x800}], 0x2, &(0x7f0000000900))
write$P9_RCREATE(r1, &(0x7f0000000100)={0x18, 0x73, 0x1, {{0x21, 0x4, 0x1}, 0x8}}, 0x18)
write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x1, {0x20, 0x2, 0x3}}, 0x14)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0)
ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0)
write$P9_RFLUSH(r2, &(0x7f0000000140)={0x7, 0x6d, 0x1}, 0x7)
shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)

11:37:54 executing program 2:

11:37:54 executing program 1:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = memfd_create(&(0x7f0000000000)='dev ', 0x7)
ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8})

11:37:54 executing program 0:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0)
setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0)
mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, &(0x7f0000000280))
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0)
mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0)
getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0)
umount2(&(0x7f0000000800)='./file0\x00', 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7f8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)

11:37:54 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r0, &(0x7f0000000080)=[{0x0}], 0x1)

11:37:54 executing program 4:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @broadcast=0xe0000001}, @icmp}}}}, 0x0)
setrlimit(0x5, &(0x7f0000000040))
recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00966)

11:37:54 executing program 2:
r0 = socket$inet(0x2, 0x4040000000000001, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000140)=0x4, 0x4)
bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast2}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10)
sendto(r0, &(0x7f00000022c0)="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", 0x481, 0x0, 0x0, 0x0)

11:37:54 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r0, &(0x7f0000000080)=[{0x0}], 0x1)

11:37:54 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r0, &(0x7f0000000080)=[{}], 0x1)

11:37:54 executing program 1:
r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x0)
pread64(r0, &(0x7f0000000240)=""/243, 0xf3, 0x0)
write(0xffffffffffffffff, 0x0, 0x0)

11:37:54 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = creat(0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = creat(&(0x7f0000000140)='./bus\x00', 0xfffffffffffffffe)
ftruncate(r2, 0x0)
r3 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x34)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0)
prctl$PR_GET_TSC(0x19, &(0x7f0000000300))
read(r3, &(0x7f0000000180)=""/19, 0xfffffe47)
r4 = getpgid(0x0)
r5 = getpid()
rt_tgsigqueueinfo(r4, r5, 0x8, &(0x7f0000000280)={0x5, 0x7, 0xf77})
ioctl$TIOCMGET(r2, 0x5415, &(0x7f0000000340))
setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000240)="1e7997811d97b072df00b6341d7d85b3", 0x10)
ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611)
ioctl$TCSETX(r2, 0x5433, &(0x7f00000001c0)={0x2, 0x2, [0x9, 0x4, 0x1, 0x800, 0xcc88], 0xef7})
socket$inet_udplite(0x2, 0x2, 0x88)
fsetxattr$trusted_overlay_origin(r0, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x3)
ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)=<r6=>0x0)
ptrace$cont(0x1f, r6, 0x81, 0x10001)
finit_module(r3, &(0x7f0000000200)='\x00', 0x3)

11:37:54 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r0, &(0x7f0000000080)=[{}], 0x1)

11:37:54 executing program 5:
r0 = socket(0x10, 0x80002, 0x0)
r1 = creat(0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f00000004c0))
prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0)
ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201)
r2 = openat$null(0xffffffffffffff9c, 0x0, 0x300, 0x0)
getsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f00000001c0)={@multicast1, @remote, @empty}, &(0x7f0000000240)=0xffffffffffffff7d)
unshare(0x400)
ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0)
shutdown(0xffffffffffffffff, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0)=0x5, 0x4)
fchown(r1, 0x0, 0x0)
fsetxattr$system_posix_acl(r2, 0x0, &(0x7f0000000c80)=ANY=[], 0x0, 0x2)
r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0)
request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffff8)
fstat(r3, 0x0)
r5 = semget$private(0x0, 0x0, 0x0)
vmsplice(r4, &(0x7f0000000180), 0x0, 0x8)
semtimedop(r5, &(0x7f0000000400)=[{0x0, 0x80000001, 0x1000}, {0x0, 0x5, 0x800}], 0x2, &(0x7f0000000900))
write$P9_RCREATE(r1, &(0x7f0000000100)={0x18, 0x73, 0x1, {{0x21, 0x4, 0x1}, 0x8}}, 0x18)
write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x1, {0x20, 0x2, 0x3}}, 0x14)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0)
ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0)
write$P9_RFLUSH(r2, &(0x7f0000000140)={0x7, 0x6d, 0x1}, 0x7)
shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x6000)

11:37:54 executing program 2:
r0 = syz_open_pts(0xffffffffffffffff, 0x0)
ioctl$TIOCCONS(r0, 0x80047462)
mknod(&(0x7f0000000040)='./bus\x00', 0x8000, 0x0)
r1 = open(&(0x7f0000000140)='./bus\x00', 0x40000000006, 0x0)
write(r1, 0x0, 0x0)

11:37:54 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r0, &(0x7f0000000080)=[{}], 0x1)

[  243.050115][ T9233] vivid-000: kernel_thread() failed
11:37:55 executing program 2:
pipe2$9p(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [], 0x22000000}})
write$P9_RREMOVE(r1, &(0x7f0000000100)={0x7, 0x7b, 0x2}, 0x7)

11:37:55 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c)
listen(r0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c)
recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c)
getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0)
setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x30f)
setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='yeah\x00', 0x5)
setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0)
write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0)
ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0)
clock_gettime(0x0, 0x0)
setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(0xffffffffffffffff, 0x28, 0x6, 0x0, 0x0)
shutdown(r1, 0x1)
r2 = accept4(r0, 0x0, 0x0, 0x800)
sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0)

[  243.253259][    C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
11:37:55 executing program 4:
perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$xdp(0x2c, 0x3, 0x0)
setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x8000, 0x4)
mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x6, 0x52, r0, 0x0)

11:37:55 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f640094000500", 0x2c}], 0x1)

11:37:55 executing program 0:
r0 = socket$inet6_tcp(0x1c, 0x1, 0x0)
r1 = dup(r0)
connect$unix(r1, &(0x7f00000003c0)=@abs={0xf64cb340ce081cac, 0x3}, 0x1c)
setsockopt$inet6_int(r1, 0x29, 0x2f, &(0x7f0000000040), 0x4)

11:37:55 executing program 5:
r0 = socket(0x10, 0x80002, 0x0)
r1 = creat(0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f00000004c0))
prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0)
ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201)
r2 = openat$null(0xffffffffffffff9c, 0x0, 0x300, 0x0)
getsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f00000001c0)={@multicast1, @remote, @empty}, &(0x7f0000000240)=0xffffffffffffff7d)
unshare(0x400)
ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0)
shutdown(0xffffffffffffffff, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0)=0x5, 0x4)
fchown(r1, 0x0, 0x0)
fsetxattr$system_posix_acl(r2, 0x0, &(0x7f0000000c80)=ANY=[], 0x0, 0x2)
r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0)
request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffff8)
fstat(r3, 0x0)
r5 = semget$private(0x0, 0x0, 0x0)
vmsplice(r4, &(0x7f0000000180), 0x0, 0x8)
semtimedop(r5, &(0x7f0000000400)=[{0x0, 0x80000001, 0x1000}, {0x0, 0x5, 0x800}], 0x2, &(0x7f0000000900))
write$P9_RCREATE(r1, &(0x7f0000000100)={0x18, 0x73, 0x1, {{0x21, 0x4, 0x1}, 0x8}}, 0x18)
write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x1, {0x20, 0x2, 0x3}}, 0x14)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0)
ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0)
write$P9_RFLUSH(r2, &(0x7f0000000140)={0x7, 0x6d, 0x1}, 0x7)
shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x6000)

11:37:55 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f640094000500", 0x2c}], 0x1)

11:37:55 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f640094000500", 0x2c}], 0x1)

11:37:55 executing program 0:
r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0)
ioctl$SIOCAX25ADDFWD(r0, 0x89eb, &(0x7f0000000040)={@default, @rose})

11:37:55 executing program 4:
perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$xdp(0x2c, 0x3, 0x0)
setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x8000, 0x4)
mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x6, 0x52, r0, 0x0)

11:37:55 executing program 2:
r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x0)
read(r0, &(0x7f0000000040)=""/28, 0x1c)
ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x204000000bd})
ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0xc0bc5351, &(0x7f0000000400)={0x0, 0x0, 0x0, 'queue0\x00'})
r1 = gettid()
timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0))
timer_settime(0x0, 0x0, 0x0, 0x0)
tkill(r1, 0x1000000000013)

11:37:55 executing program 0:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070")
mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002540), 0x1000)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)

11:37:55 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000", 0x42}], 0x1)

[  244.038149][    C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
11:37:55 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]})
fsetxattr$trusted_overlay_origin(0xffffffffffffff9c, &(0x7f0000000000)='trusted.overlay.origin\x00', 0x0, 0xfffffffffffffe71, 0xfffffffffffffffb)

11:37:55 executing program 5:
r0 = socket(0x10, 0x80002, 0x0)
r1 = creat(0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f00000004c0))
prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0)
ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201)
r2 = openat$null(0xffffffffffffff9c, 0x0, 0x300, 0x0)
getsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f00000001c0)={@multicast1, @remote, @empty}, &(0x7f0000000240)=0xffffffffffffff7d)
unshare(0x400)
ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0)
shutdown(0xffffffffffffffff, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0)=0x5, 0x4)
fchown(r1, 0x0, 0x0)
fsetxattr$system_posix_acl(r2, 0x0, &(0x7f0000000c80)=ANY=[], 0x0, 0x2)
r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0)
request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffff8)
fstat(r3, 0x0)
r5 = semget$private(0x0, 0x0, 0x0)
vmsplice(r4, &(0x7f0000000180), 0x0, 0x8)
semtimedop(r5, &(0x7f0000000400)=[{0x0, 0x80000001, 0x1000}, {0x0, 0x5, 0x800}], 0x2, &(0x7f0000000900))
write$P9_RCREATE(r1, &(0x7f0000000100)={0x18, 0x73, 0x1, {{0x21, 0x4, 0x1}, 0x8}}, 0x18)
write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x1, {0x20, 0x2, 0x3}}, 0x14)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0)
ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0)
write$P9_RFLUSH(r2, &(0x7f0000000140)={0x7, 0x6d, 0x1}, 0x7)
shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x6000)

11:37:55 executing program 4:
perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$xdp(0x2c, 0x3, 0x0)
setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x8000, 0x4)
mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x6, 0x52, r0, 0x0)

11:37:55 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000", 0x42}], 0x1)

11:37:56 executing program 4:
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0)
mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0)
setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0)
mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0)
getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7f8)

11:37:56 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000", 0x42}], 0x1)

11:37:56 executing program 1:
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0)
mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0)
setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0)
mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0)
mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0)
mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0)
getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7f8)

11:37:56 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd0000081000010008", 0x4d}], 0x1)

11:37:56 executing program 5:
r0 = socket(0x10, 0x80002, 0x0)
r1 = creat(0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f00000004c0))
prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0)
ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201)
r2 = openat$null(0xffffffffffffff9c, 0x0, 0x300, 0x0)
getsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f00000001c0)={@multicast1, @remote, @empty}, &(0x7f0000000240)=0xffffffffffffff7d)
unshare(0x400)
ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0)
shutdown(0xffffffffffffffff, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0)=0x5, 0x4)
fchown(r1, 0x0, 0x0)
fsetxattr$system_posix_acl(r2, 0x0, &(0x7f0000000c80)=ANY=[], 0x0, 0x2)
r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0)
request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffff8)
fstat(r3, 0x0)
r5 = semget$private(0x0, 0x0, 0x0)
vmsplice(r4, &(0x7f0000000180), 0x0, 0x8)
semtimedop(r5, &(0x7f0000000400)=[{0x0, 0x80000001, 0x1000}, {0x0, 0x5, 0x800}], 0x2, &(0x7f0000000900))
write$P9_RCREATE(r1, &(0x7f0000000100)={0x18, 0x73, 0x1, {{0x21, 0x4, 0x1}, 0x8}}, 0x18)
write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x1, {0x20, 0x2, 0x3}}, 0x14)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0)
ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0)
r6 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x6000)

11:37:58 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070")
r1 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r1, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100080c10000000000001400000", 0x58}], 0x1)

11:37:58 executing program 4:
syz_open_dev$dri(0x0, 0x0, 0x0)
mkdir(&(0x7f00000001c0)='./file0\x00', 0x0)
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0)
write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, "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", 0x1000}, 0xfffffc41)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fadvise64(r1, 0x0, 0x0, 0x4)
ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f00000000c0)=0x3)
chdir(&(0x7f00000001c0)='./file0\x00')
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
creat(&(0x7f0000000240)='./bus\x00', 0x0)
r2 = open(&(0x7f0000000200)='./bus\x00', 0x14103e, 0x0)
clock_gettime(0x0, &(0x7f00000011c0))
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r2, 0x0)

11:37:58 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd0000081000010008", 0x4d}], 0x1)

11:37:58 executing program 1:
r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0)
setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000400)='tls\x00', 0xfffffffffffffe73)
mkdir(&(0x7f0000000300)='./file0\x00', 0x0)
sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0))
r1 = socket(0x10, 0x2, 0x0)
getresuid(0x0, &(0x7f00000004c0), 0x0)
setxattr$security_capability(&(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f00000005c0)=@v3={0x3000000, [{0x0, 0x5}, {0x200, 0x9}]}, 0x18, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, <r2=>0x0}, &(0x7f0000cab000)=0xc)
chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0)
chdir(&(0x7f0000000340)='./file0\x00')
symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00')
clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff)
lstat(&(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000540))
ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246)

11:37:58 executing program 5:
r0 = socket(0x10, 0x80002, 0x0)
r1 = creat(0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f00000004c0))
prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0)
ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201)
r2 = openat$null(0xffffffffffffff9c, 0x0, 0x300, 0x0)
getsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f00000001c0)={@multicast1, @remote, @empty}, &(0x7f0000000240)=0xffffffffffffff7d)
unshare(0x400)
ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0)
shutdown(0xffffffffffffffff, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0)=0x5, 0x4)
fchown(r1, 0x0, 0x0)
fsetxattr$system_posix_acl(r2, 0x0, &(0x7f0000000c80)=ANY=[], 0x0, 0x2)
r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0)
request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffff8)
fstat(r3, 0x0)
r5 = semget$private(0x0, 0x0, 0x0)
vmsplice(r4, &(0x7f0000000180), 0x0, 0x8)
semtimedop(r5, &(0x7f0000000400)=[{0x0, 0x80000001, 0x1000}, {0x0, 0x5, 0x800}], 0x2, &(0x7f0000000900))
write$P9_RCREATE(r1, &(0x7f0000000100)={0x18, 0x73, 0x1, {{0x21, 0x4, 0x1}, 0x8}}, 0x18)
write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x1, {0x20, 0x2, 0x3}}, 0x14)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0)
ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0)
r6 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x6000)

11:37:58 executing program 0:
r0 = socket$tipc(0x1e, 0x5, 0x0)
bind$tipc(r0, &(0x7f0000000080)=@name, 0x10)
setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x10000}, 0x10)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00')
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f00000014c0)="11dca5055e0bcfec7be070")
sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x9000000, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x5, 0x0, {0x14}}}, 0x30}}, 0x0)

11:37:58 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd0000081000010008", 0x4d}], 0x1)

11:37:58 executing program 0:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @dev}, {0x2, 0x0, @empty}, 0x76eac4cad03c63f7, 0x0, 0x0, 0x0, 0xffffffff})

11:37:59 executing program 2:
r0 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0xb4, 0x4)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070")
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6}]}, 0x10)
sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0)

[  247.220457][ T9355] FAT-fs (loop4): bogus number of reserved sectors
11:37:59 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000810000100080400a0000000", 0x53}], 0x1)

11:37:59 executing program 5:
r0 = socket(0x10, 0x80002, 0x0)
r1 = creat(0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f00000004c0))
prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0)
ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201)
r2 = openat$null(0xffffffffffffff9c, 0x0, 0x300, 0x0)
getsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f00000001c0)={@multicast1, @remote, @empty}, &(0x7f0000000240)=0xffffffffffffff7d)
unshare(0x400)
ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0)
shutdown(0xffffffffffffffff, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0)=0x5, 0x4)
fchown(r1, 0x0, 0x0)
fsetxattr$system_posix_acl(r2, 0x0, &(0x7f0000000c80)=ANY=[], 0x0, 0x2)
r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0)
request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffff8)
fstat(r3, 0x0)
r5 = semget$private(0x0, 0x0, 0x0)
vmsplice(r4, &(0x7f0000000180), 0x0, 0x8)
semtimedop(r5, &(0x7f0000000400)=[{0x0, 0x80000001, 0x1000}, {0x0, 0x5, 0x800}], 0x2, &(0x7f0000000900))
write$P9_RCREATE(r1, &(0x7f0000000100)={0x18, 0x73, 0x1, {{0x21, 0x4, 0x1}, 0x8}}, 0x18)
write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x1, {0x20, 0x2, 0x3}}, 0x14)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0)
ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0)
r6 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x6000)

[  247.295892][ T9355] FAT-fs (loop4): Can't find a valid FAT filesystem
11:37:59 executing program 0:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc))
r1 = syz_open_pts(r0, 0x0)
ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000698000)=0x3)
ioctl$TCFLSH(r1, 0x5412, 0x70d000)

11:37:59 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x0, @local}, {0x2, 0x0, @broadcast}, 0xc0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, 0x800})
ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f00000000c0))
ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x4e23, @loopback}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}, {0x2, 0x4e22, @empty}, 0x76eac4cad03c63f7, 0x0, 0x0, 0x0, 0xffffffff, &(0x7f0000000000)='gretap0\x00', 0x7ff, 0x3, 0xaf2})
socket$bt_rfcomm(0x1f, 0x3, 0x3)
r1 = socket(0x11, 0x80f, 0x7fff)
connect$nfc_llcp(r1, &(0x7f0000000140)={0x27, 0x1, 0x0, 0x7, 0x94db, 0x6, "9b63a2af7afe83ff8f2f7e2d358c17a04053ff825d56257af1512f41c993b4936cd4f99696c8ef9ac8ffef1501b72d20ac8bb5b7853bf5d1407cf47fca0fe6", 0x29}, 0x60)
getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f00000001c0)=0x7, &(0x7f0000000100)=0xffffff8e)

[  247.827806][ T9355] FAT-fs (loop4): bogus number of reserved sectors
[  247.883409][ T9355] FAT-fs (loop4): Can't find a valid FAT filesystem
11:37:59 executing program 4:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070")
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000340)='veth0_to_team\x00', 0x10)
connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @initdev}, 0x10)
setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x892, 0x4)
setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0xb1f, 0x4)

11:37:59 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000810000100080400a0000000", 0x53}], 0x1)

11:37:59 executing program 1:
r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0)
setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000400)='tls\x00', 0xfffffffffffffe73)
mkdir(&(0x7f0000000300)='./file0\x00', 0x0)
sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0))
r1 = socket(0x10, 0x2, 0x0)
getresuid(0x0, &(0x7f00000004c0), 0x0)
setxattr$security_capability(&(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f00000005c0)=@v3={0x3000000, [{0x0, 0x5}, {0x200, 0x9}]}, 0x18, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, <r2=>0x0}, &(0x7f0000cab000)=0xc)
chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0)
chdir(&(0x7f0000000340)='./file0\x00')
symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00')
clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff)
lstat(&(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000540))
ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246)

11:37:59 executing program 0:
perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$xdp(0x2c, 0x3, 0x0)
setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x8000, 0x4)
mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x6, 0x52, r0, 0x0)

11:37:59 executing program 2:
r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0)
lseek(r0, 0x0, 0x0)
ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, 0x0)
setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0)
getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, 0x0, 0x0)

11:37:59 executing program 5:
r0 = socket(0x10, 0x80002, 0x0)
r1 = creat(0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f00000004c0))
prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0)
ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201)
r2 = openat$null(0xffffffffffffff9c, 0x0, 0x300, 0x0)
getsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f00000001c0)={@multicast1, @remote, @empty}, &(0x7f0000000240)=0xffffffffffffff7d)
unshare(0x400)
ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0)
shutdown(0xffffffffffffffff, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0)=0x5, 0x4)
fchown(r1, 0x0, 0x0)
fsetxattr$system_posix_acl(r2, 0x0, &(0x7f0000000c80)=ANY=[], 0x0, 0x2)
r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0)
request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffff8)
fstat(r3, 0x0)
r5 = semget$private(0x0, 0x0, 0x0)
vmsplice(r4, &(0x7f0000000180), 0x0, 0x8)
semtimedop(r5, &(0x7f0000000400)=[{0x0, 0x80000001, 0x1000}, {0x0, 0x5, 0x800}], 0x2, &(0x7f0000000900))
write$P9_RCREATE(r1, &(0x7f0000000100)={0x18, 0x73, 0x1, {{0x21, 0x4, 0x1}, 0x8}}, 0x18)
write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x1, {0x20, 0x2, 0x3}}, 0x14)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0)
write$P9_RFLUSH(r2, &(0x7f0000000140)={0x7, 0x6d, 0x1}, 0x7)
r6 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x6000)

11:37:59 executing program 0:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
mkdir(&(0x7f00000001c0)='./file0\x00', 0x0)
ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071")
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}})
clone(0xa102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = inotify_init1(0x0)
inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x4)
rename(&(0x7f0000000080)='./file0/file0\x00', 0x0)
read$FUSE(r1, 0x0, 0x22b)

11:37:59 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000810000100080400a0000000", 0x53}], 0x1)

11:38:00 executing program 2:
r0 = socket$inet6(0xa, 0x2, 0x0)
sendmmsg$inet6(r0, &(0x7f0000000f40)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @remote, 0x1}, 0x1c, 0x0}}], 0x1, 0x0)

[  248.281480][ T8803] ==================================================================
[  248.289806][ T8803] BUG: KASAN: use-after-free in blk_mq_free_rqs+0x49f/0x4b0
[  248.297882][ T8803] Read of size 8 at addr ffff88808c46c250 by task kworker/1:3/8803
[  248.305772][ T8803] 
[  248.308106][ T8803] CPU: 1 PID: 8803 Comm: kworker/1:3 Not tainted 5.2.0-rc3-next-20190607 #11
[  248.316863][ T8803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  248.327065][ T8803] Workqueue: events __blk_release_queue
[  248.332621][ T8803] Call Trace:
[  248.335975][ T8803]  dump_stack+0x172/0x1f0
[  248.340318][ T8803]  ? blk_mq_free_rqs+0x49f/0x4b0
[  248.345273][ T8803]  print_address_description.cold+0xd4/0x306
[  248.351261][ T8803]  ? blk_mq_free_rqs+0x49f/0x4b0
[  248.356204][ T8803]  ? blk_mq_free_rqs+0x49f/0x4b0
[  248.361149][ T8803]  __kasan_report.cold+0x1b/0x36
[  248.366095][ T8803]  ? blk_mq_free_rqs+0x49f/0x4b0
[  248.366122][ T8803]  kasan_report+0x12/0x20
[  248.366135][ T8803]  __asan_report_load8_noabort+0x14/0x20
[  248.366147][ T8803]  blk_mq_free_rqs+0x49f/0x4b0
[  248.381184][ T8803]  ? dd_exit_queue+0x92/0xd0
[  248.381198][ T8803]  ? kfree+0x1ec/0x2a0
[  248.381223][ T8803]  blk_mq_sched_tags_teardown+0x126/0x210
[  248.381240][ T8803]  ? dd_request_merge+0x230/0x230
[  248.381255][ T8803]  blk_mq_exit_sched+0x1fa/0x2d0
[  248.381276][ T8803]  elevator_exit+0x70/0xa0
[  248.381302][ T8803]  __blk_release_queue+0x127/0x330
[  248.420043][ T8803]  process_one_work+0x989/0x1790
[  248.424996][ T8803]  ? pwq_dec_nr_in_flight+0x320/0x320
[  248.430379][ T8803]  ? lock_acquire+0x16f/0x3f0
[  248.430404][ T8803]  worker_thread+0x98/0xe40
[  248.430420][ T8803]  ? trace_hardirqs_on+0x67/0x220
[  248.430446][ T8803]  kthread+0x354/0x420
[  248.430460][ T8803]  ? process_one_work+0x1790/0x1790
[  248.430473][ T8803]  ? kthread_cancel_delayed_work_sync+0x20/0x20
[  248.430553][ T8803]  ret_from_fork+0x24/0x30
[  248.430574][ T8803] 
[  248.430582][ T8803] Allocated by task 9390:
[  248.430597][ T8803]  save_stack+0x23/0x90
[  248.430610][ T8803]  __kasan_kmalloc.constprop.0+0xcf/0xe0
11:38:00 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000810000100080400a0000000000140", 0x56}], 0x1)

[  248.430621][ T8803]  kasan_kmalloc+0x9/0x10
[  248.430633][ T8803]  kmem_cache_alloc_trace+0x151/0x750
[  248.430644][ T8803]  loop_add+0x51/0x8d0
[  248.430655][ T8803]  loop_control_ioctl+0x165/0x360
[  248.430666][ T8803]  do_vfs_ioctl+0xdb6/0x13e0
[  248.430675][ T8803]  ksys_ioctl+0xab/0xd0
[  248.430692][ T8803]  __x64_sys_ioctl+0x73/0xb0
[  248.454986][ T8803]  do_syscall_64+0xfd/0x680
[  248.455003][ T8803]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  248.455008][ T8803] 
[  248.455015][ T8803] Freed by task 9416:
11:38:00 executing program 5:
r0 = socket(0x10, 0x80002, 0x0)
r1 = creat(0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f00000004c0))
prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0)
ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201)
r2 = openat$null(0xffffffffffffff9c, 0x0, 0x300, 0x0)
getsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f00000001c0)={@multicast1, @remote, @empty}, &(0x7f0000000240)=0xffffffffffffff7d)
unshare(0x400)
ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0)
shutdown(0xffffffffffffffff, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0)=0x5, 0x4)
fchown(r1, 0x0, 0x0)
fsetxattr$system_posix_acl(r2, 0x0, &(0x7f0000000c80)=ANY=[], 0x0, 0x2)
r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0)
request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffff8)
fstat(r3, 0x0)
r5 = semget$private(0x0, 0x0, 0x0)
vmsplice(r4, &(0x7f0000000180), 0x0, 0x8)
semtimedop(r5, &(0x7f0000000400)=[{0x0, 0x80000001, 0x1000}, {0x0, 0x5, 0x800}], 0x2, &(0x7f0000000900))
write$P9_RCREATE(r1, &(0x7f0000000100)={0x18, 0x73, 0x1, {{0x21, 0x4, 0x1}, 0x8}}, 0x18)
write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x1, {0x20, 0x2, 0x3}}, 0x14)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0)
write$P9_RFLUSH(r2, &(0x7f0000000140)={0x7, 0x6d, 0x1}, 0x7)
r6 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil)
shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x6000)

[  248.455028][ T8803]  save_stack+0x23/0x90
[  248.455040][ T8803]  __kasan_slab_free+0x102/0x150
[  248.455051][ T8803]  kasan_slab_free+0xe/0x10
[  248.455068][ T8803]  kfree+0x106/0x2a0
[  248.524522][ T8803]  loop_remove+0xa1/0xd0
[  248.524534][ T8803]  loop_control_ioctl+0x320/0x360
[  248.524546][ T8803]  do_vfs_ioctl+0xdb6/0x13e0
[  248.524556][ T8803]  ksys_ioctl+0xab/0xd0
[  248.524567][ T8803]  __x64_sys_ioctl+0x73/0xb0
[  248.524582][ T8803]  do_syscall_64+0xfd/0x680
[  248.524597][ T8803]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  248.524609][ T8803] 
[  248.524620][ T8803] The buggy address belongs to the object at ffff88808c46c040
[  248.524620][ T8803]  which belongs to the cache kmalloc-1k of size 1024
[  248.575424][ T8803] The buggy address is located 528 bytes inside of
[  248.575424][ T8803]  1024-byte region [ffff88808c46c040, ffff88808c46c440)
[  248.598352][ T8803] The buggy address belongs to the page:
[  248.598369][ T8803] page:ffffea0002311b00 refcount:1 mapcount:0 mapping:ffff8880aa400ac0 index:0x0 compound_mapcount: 0
11:38:00 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl(r0, 0x9000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070")
mkdir(&(0x7f00000003c0)='./file0\x00', 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0)
open(&(0x7f0000000000)='./file0\x00', 0xa10f6e95b4637c95, 0x0)

[  248.598383][ T8803] flags: 0x1fffc0000010200(slab|head)
[  248.598401][ T8803] raw: 01fffc0000010200 ffffea0002732288 ffffea000229f308 ffff8880aa400ac0
[  248.598416][ T8803] raw: 0000000000000000 ffff88808c46c040 0000000100000007 0000000000000000
[  248.598421][ T8803] page dumped because: kasan: bad access detected
[  248.598425][ T8803] 
[  248.598429][ T8803] Memory state around the buggy address:
[  248.598440][ T8803]  ffff88808c46c100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  248.598450][ T8803]  ffff88808c46c180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  248.598459][ T8803] >ffff88808c46c200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  248.598466][ T8803]                                                  ^
[  248.598475][ T8803]  ffff88808c46c280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  248.598485][ T8803]  ffff88808c46c300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  248.598490][ T8803] ==================================================================
[  248.598495][ T8803] Disabling lock debugging due to kernel taint
[  248.775731][ T8803] Kernel panic - not syncing: panic_on_warn set ...
[  248.782397][ T8803] CPU: 1 PID: 8803 Comm: kworker/1:3 Tainted: G    B             5.2.0-rc3-next-20190607 #11
[  248.793421][ T8803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  248.803672][ T8803] Workqueue: events __blk_release_queue
[  248.809225][ T8803] Call Trace:
[  248.812534][ T8803]  dump_stack+0x172/0x1f0
[  248.818356][ T8803]  panic+0x2cb/0x744
[  248.822265][ T8803]  ? __warn_printk+0xf3/0xf3
[  248.826869][ T8803]  ? blk_mq_free_rqs+0x49f/0x4b0
[  248.831811][ T8803]  ? preempt_schedule+0x4b/0x60
[  248.836668][ T8803]  ? ___preempt_schedule+0x16/0x18
[  248.841792][ T8803]  ? trace_hardirqs_on+0x5e/0x220
[  248.846829][ T8803]  ? blk_mq_free_rqs+0x49f/0x4b0
[  248.851767][ T8803]  end_report+0x47/0x4f
[  248.855924][ T8803]  ? blk_mq_free_rqs+0x49f/0x4b0
[  248.860862][ T8803]  __kasan_report.cold+0xe/0x36
[  248.865719][ T8803]  ? blk_mq_free_rqs+0x49f/0x4b0
[  248.870662][ T8803]  kasan_report+0x12/0x20
[  248.874999][ T8803]  __asan_report_load8_noabort+0x14/0x20
[  248.880642][ T8803]  blk_mq_free_rqs+0x49f/0x4b0
[  248.885409][ T8803]  ? dd_exit_queue+0x92/0xd0
[  248.889999][ T8803]  ? kfree+0x1ec/0x2a0
[  248.894081][ T8803]  blk_mq_sched_tags_teardown+0x126/0x210
[  248.894336][ T3882] kobject: 'loop5' (00000000948879cd): kobject_uevent_env
[  248.899798][ T8803]  ? dd_request_merge+0x230/0x230
[  248.899810][ T8803]  blk_mq_exit_sched+0x1fa/0x2d0
[  248.899825][ T8803]  elevator_exit+0x70/0xa0
[  248.899839][ T8803]  __blk_release_queue+0x127/0x330
[  248.899855][ T8803]  process_one_work+0x989/0x1790
[  248.899874][ T8803]  ? pwq_dec_nr_in_flight+0x320/0x320
[  248.910032][ T3882] kobject: 'loop5' (00000000948879cd): fill_kobj_path: path = '/devices/virtual/block/loop5'
[  248.911993][ T8803]  ? lock_acquire+0x16f/0x3f0
[  248.912016][ T8803]  worker_thread+0x98/0xe40
[  248.912036][ T8803]  ? trace_hardirqs_on+0x67/0x220
[  248.961038][ T8803]  kthread+0x354/0x420
[  248.965101][ T8803]  ? process_one_work+0x1790/0x1790
[  248.970293][ T8803]  ? kthread_cancel_delayed_work_sync+0x20/0x20
[  248.976532][ T8803]  ret_from_fork+0x24/0x30
[  248.982022][ T8803] Kernel Offset: disabled
[  248.986397][ T8803] Rebooting in 86400 seconds..