[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 55.991144][ T27] audit: type=1800 audit(1560166487.847:25): pid=8624 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 56.018318][ T27] audit: type=1800 audit(1560166487.847:26): pid=8624 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 56.044993][ T27] audit: type=1800 audit(1560166487.857:27): pid=8624 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.216' (ECDSA) to the list of known hosts. 2019/06/10 11:34:57 fuzzer started 2019/06/10 11:35:01 dialing manager at 10.128.0.26:46803 2019/06/10 11:35:01 syscalls: 2465 2019/06/10 11:35:01 code coverage: enabled 2019/06/10 11:35:01 comparison tracing: enabled 2019/06/10 11:35:01 extra coverage: extra coverage is not supported by the kernel 2019/06/10 11:35:01 setuid sandbox: enabled 2019/06/10 11:35:01 namespace sandbox: enabled 2019/06/10 11:35:01 Android sandbox: /sys/fs/selinux/policy does not exist 2019/06/10 11:35:01 fault injection: enabled 2019/06/10 11:35:01 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/06/10 11:35:01 net packet injection: enabled 2019/06/10 11:35:01 net device setup: enabled 11:37:41 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setrlimit(0x0, &(0x7f0000000040)) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00797) syzkaller login: [ 230.164994][ T8790] IPVS: ftp: loaded support on port[0] = 21 11:37:42 executing program 1: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) syz_genetlink_get_family_id$tipc2(0x0) sendfile(r0, r1, 0x0, 0x1) [ 230.290035][ T8790] chnl_net:caif_netlink_parms(): no params data found [ 230.380144][ T8790] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.396677][ T8790] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.405167][ T8790] device bridge_slave_0 entered promiscuous mode [ 230.430172][ T8790] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.442701][ T8790] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.451057][ T8790] device bridge_slave_1 entered promiscuous mode [ 230.472809][ T8793] IPVS: ftp: loaded support on port[0] = 21 [ 230.489853][ T8790] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 230.500400][ T8790] bond0: Enslaving bond_slave_1 as an active interface with an up link 11:37:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c832, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 230.535481][ T8790] team0: Port device team_slave_0 added [ 230.551639][ T8790] team0: Port device team_slave_1 added [ 230.639580][ T8790] device hsr_slave_0 entered promiscuous mode [ 230.687896][ T8790] device hsr_slave_1 entered promiscuous mode [ 230.759136][ T8795] IPVS: ftp: loaded support on port[0] = 21 [ 230.780988][ T8790] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.788333][ T8790] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.796262][ T8790] bridge0: port 1(bridge_slave_0) entered blocking state 11:37:42 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r1, 0x0, 0x351, 0x41, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00cad) [ 230.803404][ T8790] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.980456][ T8793] chnl_net:caif_netlink_parms(): no params data found [ 231.002098][ T8798] IPVS: ftp: loaded support on port[0] = 21 11:37:42 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) [ 231.039966][ T8790] 8021q: adding VLAN 0 to HW filter on device bond0 [ 231.118900][ T8790] 8021q: adding VLAN 0 to HW filter on device team0 [ 231.126709][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 231.149270][ T8799] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.158673][ T8799] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.177544][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 231.209269][ T8793] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.219860][ T8793] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.227995][ T8793] device bridge_slave_0 entered promiscuous mode [ 231.236463][ T8793] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.246030][ T8793] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.254690][ T8793] device bridge_slave_1 entered promiscuous mode [ 231.281115][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.289955][ T8799] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.297074][ T8799] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.307560][ T8799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.316059][ T8799] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.323181][ T8799] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.364594][ T8802] IPVS: ftp: loaded support on port[0] = 21 11:37:43 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x890c, &(0x7f0000000040)={@default, @bcast}) [ 231.415892][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 231.430188][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 231.440610][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 231.450697][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 231.461546][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 231.470383][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 231.494617][ T8790] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 231.508152][ T8790] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 231.527349][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 231.535125][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 231.543541][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 231.554025][ T8793] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 231.564649][ T8793] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 231.611471][ T8795] chnl_net:caif_netlink_parms(): no params data found [ 231.638971][ T8793] team0: Port device team_slave_0 added [ 231.662985][ T8806] IPVS: ftp: loaded support on port[0] = 21 [ 231.664619][ T8790] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 231.686022][ T8793] team0: Port device team_slave_1 added [ 231.738923][ T8795] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.746053][ T8795] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.754180][ T8795] device bridge_slave_0 entered promiscuous mode [ 231.764096][ T8795] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.771292][ T8795] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.779384][ T8795] device bridge_slave_1 entered promiscuous mode [ 231.837652][ T8795] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 231.898680][ T8793] device hsr_slave_0 entered promiscuous mode [ 231.956906][ T8793] device hsr_slave_1 entered promiscuous mode [ 232.042603][ T8795] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 232.108719][ T8798] chnl_net:caif_netlink_parms(): no params data found [ 232.202613][ T8795] team0: Port device team_slave_0 added [ 232.214394][ T8795] team0: Port device team_slave_1 added [ 232.272483][ T8798] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.280140][ T8798] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.289961][ T8798] device bridge_slave_0 entered promiscuous mode [ 232.298362][ T8798] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.305560][ T8798] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.314010][ T8798] device bridge_slave_1 entered promiscuous mode [ 232.321421][ T8802] chnl_net:caif_netlink_parms(): no params data found [ 232.373973][ T8806] chnl_net:caif_netlink_parms(): no params data found [ 232.419075][ T8795] device hsr_slave_0 entered promiscuous mode [ 232.457924][ T8795] device hsr_slave_1 entered promiscuous mode [ 232.554065][ T8798] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 232.597560][ T8798] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 232.606100][ T8802] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.613950][ T8802] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.622218][ T8802] device bridge_slave_0 entered promiscuous mode [ 232.630635][ T8802] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.638123][ T8802] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.646156][ T8802] device bridge_slave_1 entered promiscuous mode [ 232.665051][ T8793] 8021q: adding VLAN 0 to HW filter on device bond0 [ 232.694646][ T8806] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.702059][ T8806] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.710998][ T8806] device bridge_slave_0 entered promiscuous mode [ 232.719330][ T8806] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.730839][ T8806] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.738976][ T8806] device bridge_slave_1 entered promiscuous mode [ 232.762338][ T8798] team0: Port device team_slave_0 added [ 232.787266][ T8802] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 232.807827][ T8802] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 232.821216][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 232.828975][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 232.839796][ T8798] team0: Port device team_slave_1 added [ 232.855367][ T8806] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 232.865867][ T8806] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 232.879359][ T8793] 8021q: adding VLAN 0 to HW filter on device team0 [ 232.907394][ T8802] team0: Port device team_slave_0 added [ 232.928240][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 232.937019][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 232.945702][ T17] bridge0: port 1(bridge_slave_0) entered blocking state 11:37:44 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0xa2, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001df, 0x0) [ 232.952974][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.971015][ T8802] team0: Port device team_slave_1 added [ 233.020336][ T8798] device hsr_slave_0 entered promiscuous mode [ 233.087176][ T8798] device hsr_slave_1 entered promiscuous mode [ 233.091067][ T8821] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 233.128134][ T8806] team0: Port device team_slave_0 added [ 233.135675][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 233.145372][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 233.154987][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 233.171617][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.178946][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.214186][ T8806] team0: Port device team_slave_1 added 11:37:45 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="f6f7"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 233.269741][ T8802] device hsr_slave_0 entered promiscuous mode [ 233.297785][ T8802] device hsr_slave_1 entered promiscuous mode [ 233.346453][ T8802] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.353902][ T8802] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.361466][ T8802] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.368768][ T8802] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.407133][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.415310][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.419808][ T8824] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 233.443966][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 233.538863][ T8806] device hsr_slave_0 entered promiscuous mode [ 233.577293][ T8806] device hsr_slave_1 entered promiscuous mode [ 233.622635][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 233.632455][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 233.642348][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 233.690306][ T8795] 8021q: adding VLAN 0 to HW filter on device bond0 [ 233.710470][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 233.719356][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 233.728594][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 233.740058][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 233.749037][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 233.775619][ T8795] 8021q: adding VLAN 0 to HW filter on device team0 [ 233.808076][ T8802] 8021q: adding VLAN 0 to HW filter on device bond0 [ 233.817547][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.831088][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 233.839716][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 233.849266][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 233.873257][ T8793] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 233.903092][ T8802] 8021q: adding VLAN 0 to HW filter on device team0 [ 233.920311][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.931377][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 233.943356][ T3006] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.950786][ T3006] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.966040][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.975110][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 233.989160][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 234.001992][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 234.012728][ T3006] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.019867][ T3006] bridge0: port 2(bridge_slave_1) entered forwarding state [ 234.063387][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 234.078727][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 234.092626][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 234.103649][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 234.119194][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 234.132695][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 234.144077][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 234.159319][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 234.173722][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 234.184802][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.191985][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 234.206196][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 234.215491][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 234.230733][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.237998][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 234.264130][ T8798] 8021q: adding VLAN 0 to HW filter on device bond0 [ 234.283485][ T8793] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 234.322109][ T8795] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network 11:37:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="f6f7"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 234.347623][ T8795] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 234.374309][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 234.387681][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 234.397967][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 234.407271][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 234.417378][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 234.436390][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 234.459162][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 234.507293][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 234.515661][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 234.525037][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 234.547711][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 234.556933][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 234.565729][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 234.574666][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 234.583631][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 234.592676][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 234.605451][ T8802] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 234.621247][ T8798] 8021q: adding VLAN 0 to HW filter on device team0 [ 234.639759][ T8795] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 234.655075][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 234.667469][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 234.675305][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 234.720046][ T8806] 8021q: adding VLAN 0 to HW filter on device bond0 [ 234.757281][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 234.766451][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 234.825283][ T8801] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.832906][ T8801] bridge0: port 1(bridge_slave_0) entered forwarding state [ 234.908822][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 234.923196][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 234.935742][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 234.967719][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.974946][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 234.983089][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 234.993530][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 235.002130][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.014646][ T8806] 8021q: adding VLAN 0 to HW filter on device team0 [ 235.035520][ T8802] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 235.053483][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 235.097655][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 235.119997][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 235.135162][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 235.154271][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 235.163127][ T8801] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.170468][ T8801] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.184521][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 235.194080][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 235.210301][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 235.223609][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 235.234873][ T8801] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.242181][ T8801] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.256749][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 235.265424][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 11:37:47 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="f6f7"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 235.341870][ T8798] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 235.424819][ T8798] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 235.456005][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 235.465274][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 235.475022][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 235.484757][ T8859] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 235.493973][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 235.503580][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 235.512310][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 235.521849][ T8801] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 11:37:47 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) sendto$isdn(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, "513cc98cfd54487ec80694c30ecf4b216b03e69883339a299eca8947b01ddf133c96924d41c33eb0f83f07753f5e200f222880680bfe28ba01c833d9b1054eaa7527a182538a39466624e669530ed7220dc037a500a43126af462d3b618a49420b63a502e9a6e8ae854a9a3f5b30e0f338abdfb6d12a76b25fcce946e57b216e5cfa97cc138c8b0e84d1b16b973ce3afc6e2083fdc93b3b4c2cfea039e8dd3a9b3f4dec067d6a2fad1cf6757d79c0f882ce5fd0bbce56e39424e0bd474cd22df"}, 0xc8, 0x0, 0x0, 0x0) bind$can_raw(r0, &(0x7f0000000200), 0x10) setsockopt(r0, 0x65, 0x1, &(0x7f0000000080), 0x1d0) [ 235.551549][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 235.580531][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 11:37:47 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xffffff7f, 0x1) [ 235.599675][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 235.634737][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 235.660286][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 235.702560][ T8806] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network 11:37:47 executing program 1: r0 = gettid() inotify_init1(0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlinkat(&(0x7f0000000200)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') listen(r1, 0x0) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000040)='./file0/file0\x00', 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) umount2(0x0, 0x0) tkill(r0, 0x1000000000016) [ 235.763817][ T8806] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 235.847188][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 235.864621][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 11:37:47 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='cgroup\x00', 0x1200000, &(0x7f0000000280)='/dev/amidi#\x00') [ 235.890101][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 235.929990][ T8803] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 11:37:47 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="021000000a000000000010ec000092000800120000048a0500000000006c004007000000b4cb8cb61b12e7280b41bbc2e0e82eff273aa2768a790297c1060c612b4300000034db362535393300000000"], 0x50}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x4000054, 0x0) [ 235.972726][ T8798] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 236.040709][ T8880] cgroup1: Unknown subsys name '/dev/amidi#' [ 236.066872][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 236.082274][ T8806] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 236.115106][ T8885] cgroup1: Unknown subsys name '/dev/amidi#' 11:37:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000810000100080400a00000000001400000", 0x58}], 0x1) 11:37:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = socket(0x400020000000010, 0x2, 0x0) write(r1, &(0x7f0000000140)="1f00000054000d0000000000fc07ff1b070c0439000000000700012f010039", 0x1f) 11:37:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f0000000180), 0x508, 0x0) 11:37:49 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x40000000000015, 0x8000000000000010, 0xe68}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000100)={r0, 0x0, 0x0}, 0x18) 11:37:49 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x890c, &(0x7f0000000040)={@default, @rose}) 11:37:49 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) select(0x40, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000000c0)={0x20000000009, 0xb456}) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00381) 11:37:49 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="f4585998bc7572958a0edbd35289d05f075893e3a4a35db4651a187df468413345b379d227d8d661ce0e9c83fd1ba4d0", 0x30}], 0x1}, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000200), 0x10) setsockopt(r0, 0x65, 0x1, &(0x7f0000000080), 0x1d0) 11:37:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @rand_addr="cfa3c35f5c23a76d157f5d1253b31e77"}, 0x1c) [ 237.231020][ T8916] PF_BRIDGE: br_mdb_parse() with invalid ifindex 11:37:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000810000100080400a00000000001400000", 0x58}], 0x1) 11:37:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c2dca5055e0bcfec7be070") r1 = socket(0x400040000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x271b, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0x208) 11:37:49 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x40000000000002, 0x70, 0x1e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='ppp1eth0nodev#\x00') 11:37:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\x00;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddpr\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) close(r1) sendmsg$kcm(r1, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=ANY=[@ANYBLOB="18000000000000000100000001000000ec00000004"], 0x15}, 0x0) r2 = socket$kcm(0xa, 0x2, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[{0x18, 0x1, 0x1, "ec"}], 0x18}, 0x0) recvmsg$kcm(r1, &(0x7f00000003c0)={0x0, 0x1000000, 0x0, 0x0, &(0x7f0000000440)=""/134, 0x86}, 0x0) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) recvmsg(0xffffffffffffffff, &(0x7f0000017d00)={0x0, 0x0, 0x0}, 0x2) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e24, @loopback}, 0x4, 0x2, 0x4, 0x1}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000980)="44471c501e03230ed93443bd3a4b1f080fe50f03c9af3edd795084950d7a8a6033033efb80692640156caeb96e8d40ede99e7428233d4eeaeff74721200f1d6867cc8b0ef2ae4c7f540de15a56abf9bb3fc9f06f9c77506d93b2e80dceb1fe7889d9fd69b9a6e754826fe9d04bd8c15e05a58e4ab68ad6e63de3b00be4cf44f1005cc55a60864ba5781153a58e53f54230b42030b371956767931fbd26f33f282215b3842d032b318c73c863cbde7630aadf59c53edb863a023566f80f22a45f7c7b300dccd3d697a1e1cb27b413406308585c", 0xd3}], 0x1}, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r1, &(0x7f0000002d00)='!', 0x0}, 0x18) socketpair(0xe, 0x4, 0x1, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000100)=r1, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x20000000000002f1, 0x0, 0x0, 0x2400, 0x1000, &(0x7f00000017c0)=""/4096, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x2b3}, 0x70) 11:37:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000810000100080400a00000000001400000", 0x58}], 0x1) 11:37:49 executing program 1: getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000640)="c0dca5055e00b4ec7be070") r1 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, 0x0, &(0x7f0000001080)) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, 0x0, &(0x7f0000001240)) [ 237.619293][ C1] hrtimer: interrupt took 28106 ns 11:37:49 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='cgroup\x00', 0x0, 0x0) 11:37:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000810000100080400a00000000001400000", 0x58}], 0x1) 11:37:49 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f00000002c0)={{}, 0x0, 0x0, 'id0\x00', 'timer0\x00'}) 11:37:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f00000000c0)=0x1e) 11:37:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\x00;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddpr\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) close(r1) sendmsg$kcm(r1, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=ANY=[@ANYBLOB="18000000000000000100000001000000ec00000004"], 0x15}, 0x0) r2 = socket$kcm(0xa, 0x2, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[{0x18, 0x1, 0x1, "ec"}], 0x18}, 0x0) recvmsg$kcm(r1, &(0x7f00000003c0)={0x0, 0x1000000, 0x0, 0x0, &(0x7f0000000440)=""/134, 0x86}, 0x0) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) recvmsg(0xffffffffffffffff, &(0x7f0000017d00)={0x0, 0x0, 0x0}, 0x2) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e24, @loopback}, 0x4, 0x2, 0x4, 0x1}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000980)="44471c501e03230ed93443bd3a4b1f080fe50f03c9af3edd795084950d7a8a6033033efb80692640156caeb96e8d40ede99e7428233d4eeaeff74721200f1d6867cc8b0ef2ae4c7f540de15a56abf9bb3fc9f06f9c77506d93b2e80dceb1fe7889d9fd69b9a6e754826fe9d04bd8c15e05a58e4ab68ad6e63de3b00be4cf44f1005cc55a60864ba5781153a58e53f54230b42030b371956767931fbd26f33f282215b3842d032b318c73c863cbde7630aadf59c53edb863a023566f80f22a45f7c7b300dccd3d697a1e1cb27b413406308585c", 0xd3}], 0x1}, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r1, &(0x7f0000002d00)='!', 0x0}, 0x18) socketpair(0xe, 0x4, 0x1, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000100)=r1, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x20000000000002f1, 0x0, 0x0, 0x2400, 0x1000, &(0x7f00000017c0)=""/4096, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x2b3}, 0x70) 11:37:49 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x33, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x3, @ipv4=@multicast1=0xfeff0005}]}]}, 0x24}}, 0x0) 11:37:49 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000810000100080400a00000000001400000", 0x58}], 0x1) [ 238.120269][ T8974] openvswitch: netlink: Port 83951614 exceeds max allowable 65535 11:37:50 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@add_del={0x2, &(0x7f0000000080)='veth1_to_bridge\x00'}) bind$can_raw(r0, &(0x7f0000000200), 0x10) setsockopt(r0, 0x65, 0x1, &(0x7f0000000080), 0x1d0) close(r0) 11:37:50 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000810000100080400a00000000001400000", 0x58}], 0x1) 11:37:50 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={@default, @netrom, 0x0, [@default, @default, @default, @default, @null, @rose, @bcast, @rose]}) 11:37:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @empty}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x29, &(0x7f00000001c0), 0x4) 11:37:50 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000000000)={@random="8db482075da1", @random="b4a75d018d1d", [], {@ipv4={0x800, {{0x5, 0x4, 0x3, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x883e, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 11:37:50 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={@default, @netrom, 0x5, [@default, @default, @default, @default, @null, @rose, @bcast, @rose]}) 11:37:50 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000810000100080400a00000000001400000", 0x58}], 0x1) 11:37:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd000000100001000a0c10000000000001400000", 0x58}], 0x1) 11:37:50 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x40000000000002, 0x70, 0x1e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='ppp1eth0nodev#\x00') 11:37:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) fsetxattr$trusted_overlay_origin(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0xf4a52a64e54fb6a7) 11:37:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 11:37:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100080410000000000001400000", 0x58}], 0x1) 11:37:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000810000100080400a00000000001400000", 0x58}], 0x1) 11:37:50 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) bind$ax25(r0, &(0x7f0000000080)={{0x3, @default}, [@remote, @netrom, @default, @null, @null, @default, @bcast]}, 0x48) 11:37:50 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) [ 238.785386][ T9025] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. 11:37:50 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) setsockopt$ax25_SO_BINDTODEVICE(r0, 0x101, 0x19, &(0x7f0000000000)=@bpq0='bpq0\x00', 0x10) 11:37:50 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x8, &(0x7f0000000240)=@raw=[@jmp={0x5, 0x1b78, 0x1, 0x8, 0xf, 0xfffffffffffffffc, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xe94}, @exit, @map, @exit, @jmp], &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 11:37:50 executing program 5: r0 = socket(0x10, 0x80002, 0x0) r1 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f00000004c0)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x300, 0x0) getsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f00000001c0)={@multicast1, @remote, @empty}, &(0x7f0000000240)=0xffffffffffffff7d) unshare(0x400) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0) shutdown(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0)=0x5, 0x4) fchown(r1, 0x0, 0x0) fsetxattr$system_posix_acl(r2, 0x0, &(0x7f0000000c80)=ANY=[], 0x0, 0x2) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffff8) fstat(r3, 0x0) r5 = semget$private(0x0, 0x0, 0x0) vmsplice(r4, &(0x7f0000000180), 0x0, 0x8) semtimedop(r5, &(0x7f0000000400)=[{0x0, 0x80000001, 0x1000}, {0x0, 0x5, 0x800}], 0x2, &(0x7f0000000900)) write$P9_RCREATE(r1, &(0x7f0000000100)={0x18, 0x73, 0x1, {{0x21, 0x4, 0x1}, 0x8}}, 0x18) write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x1, {0x20, 0x2, 0x3}}, 0x14) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) write$P9_RFLUSH(r2, &(0x7f0000000140)={0x7, 0x6d, 0x1}, 0x7) r6 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x6000) 11:37:50 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='cgroup\x00', 0x0, 0x0) 11:37:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000810000100080400a00000000001400000", 0x58}], 0x1) [ 239.047731][ T9045] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. 11:37:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x3b7) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) write$P9_RFLUSH(r1, 0x0, 0x0) 11:37:51 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x443, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) 11:37:51 executing program 2: request_key(0x0, &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x70, 0x6, 0x5, 0x4, 0x200, 0x0, 0x66d4, 0xc8100, 0x0, 0x0, 0x8, 0x7, 0x38, 0xfffffffffffffffc, 0x0, 0x1, 0x9, 0x0, 0x40, 0x0, 0x5, 0x7fffffff, 0x200, 0x1, 0x4a1, 0x9, 0x7, 0x0, 0x0, 0x3ff, 0xd54f, 0xa54, 0x0, 0x8, 0x8, 0x0, 0x1, 0x0, 0x7b6, 0x0, @perf_bp={0x0, 0xc}, 0x9041, 0x7, 0x8, 0x7, 0xfffffffffffffff5, 0x33cc, 0x8}, r0, 0x0, 0xffffffffffffffff, 0x0) 11:37:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000810000100080400a00000000001400000", 0x58}], 0x1) 11:37:51 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='cgroup\x00', 0x1200000, &(0x7f0000000280)='/dev/amidi#\x00') 11:37:51 executing program 0: 11:37:51 executing program 0: [ 239.225533][ T9056] cgroup1: Unknown subsys name '/dev/amidi#' [ 239.234671][ T9057] cgroup1: Unknown subsys name '/dev/amidi#' [ 239.358026][ T9066] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. 11:37:51 executing program 0: 11:37:51 executing program 3: socket$netlink(0x10, 0x3, 0x8000000004) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000810000100080400a00000000001400000", 0x58}], 0x1) 11:37:51 executing program 5: r0 = socket(0x10, 0x80002, 0x0) r1 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f00000004c0)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x300, 0x0) getsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f00000001c0)={@multicast1, @remote, @empty}, &(0x7f0000000240)=0xffffffffffffff7d) unshare(0x400) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0) shutdown(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0)=0x5, 0x4) fchown(r1, 0x0, 0x0) fsetxattr$system_posix_acl(r2, 0x0, &(0x7f0000000c80)=ANY=[], 0x0, 0x2) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffff8) fstat(r3, 0x0) r5 = semget$private(0x0, 0x0, 0x0) vmsplice(r4, &(0x7f0000000180), 0x0, 0x8) semtimedop(r5, &(0x7f0000000400)=[{0x0, 0x80000001, 0x1000}, {0x0, 0x5, 0x800}], 0x2, &(0x7f0000000900)) write$P9_RCREATE(r1, &(0x7f0000000100)={0x18, 0x73, 0x1, {{0x21, 0x4, 0x1}, 0x8}}, 0x18) write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x1, {0x20, 0x2, 0x3}}, 0x14) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) write$P9_RFLUSH(r2, &(0x7f0000000140)={0x7, 0x6d, 0x1}, 0x7) r6 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x6000) 11:37:51 executing program 1: 11:37:51 executing program 0: 11:37:51 executing program 2: 11:37:51 executing program 3: socket$netlink(0x10, 0x3, 0x8000000004) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000810000100080400a00000000001400000", 0x58}], 0x1) 11:37:51 executing program 1: 11:37:51 executing program 4: 11:37:51 executing program 0: 11:37:51 executing program 0: 11:37:51 executing program 1: 11:37:51 executing program 3: socket$netlink(0x10, 0x3, 0x8000000004) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000810000100080400a00000000001400000", 0x58}], 0x1) 11:37:51 executing program 2: 11:37:51 executing program 5: r0 = socket(0x10, 0x80002, 0x0) r1 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f00000004c0)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x300, 0x0) getsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f00000001c0)={@multicast1, @remote, @empty}, &(0x7f0000000240)=0xffffffffffffff7d) unshare(0x400) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0) shutdown(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0)=0x5, 0x4) fchown(r1, 0x0, 0x0) fsetxattr$system_posix_acl(r2, 0x0, &(0x7f0000000c80)=ANY=[], 0x0, 0x2) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffff8) fstat(r3, 0x0) r5 = semget$private(0x0, 0x0, 0x0) vmsplice(r4, &(0x7f0000000180), 0x0, 0x8) semtimedop(r5, &(0x7f0000000400)=[{0x0, 0x80000001, 0x1000}, {0x0, 0x5, 0x800}], 0x2, &(0x7f0000000900)) write$P9_RCREATE(r1, &(0x7f0000000100)={0x18, 0x73, 0x1, {{0x21, 0x4, 0x1}, 0x8}}, 0x18) write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x1, {0x20, 0x2, 0x3}}, 0x14) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) write$P9_RFLUSH(r2, &(0x7f0000000140)={0x7, 0x6d, 0x1}, 0x7) r6 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x6000) 11:37:52 executing program 4: 11:37:52 executing program 0: 11:37:52 executing program 2: 11:37:52 executing program 1: 11:37:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, 0x0, 0x0) 11:37:52 executing program 4: 11:37:52 executing program 0: 11:37:52 executing program 2: 11:37:52 executing program 4: 11:37:52 executing program 5: r0 = socket(0x10, 0x80002, 0x0) r1 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f00000004c0)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x300, 0x0) getsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f00000001c0)={@multicast1, @remote, @empty}, &(0x7f0000000240)=0xffffffffffffff7d) unshare(0x400) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0) shutdown(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0)=0x5, 0x4) fchown(r1, 0x0, 0x0) fsetxattr$system_posix_acl(r2, 0x0, &(0x7f0000000c80)=ANY=[], 0x0, 0x2) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffff8) fstat(r3, 0x0) r5 = semget$private(0x0, 0x0, 0x0) vmsplice(r4, &(0x7f0000000180), 0x0, 0x8) semtimedop(r5, &(0x7f0000000400)=[{0x0, 0x80000001, 0x1000}, {0x0, 0x5, 0x800}], 0x2, &(0x7f0000000900)) write$P9_RCREATE(r1, &(0x7f0000000100)={0x18, 0x73, 0x1, {{0x21, 0x4, 0x1}, 0x8}}, 0x18) write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x1, {0x20, 0x2, 0x3}}, 0x14) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) write$P9_RFLUSH(r2, &(0x7f0000000140)={0x7, 0x6d, 0x1}, 0x7) r6 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x6000) 11:37:52 executing program 2: 11:37:52 executing program 0: 11:37:52 executing program 1: 11:37:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, 0x0, 0x0) 11:37:52 executing program 4: 11:37:52 executing program 2: 11:37:52 executing program 0: 11:37:52 executing program 1: 11:37:52 executing program 4: 11:37:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, 0x0, 0x0) 11:37:53 executing program 0: 11:37:53 executing program 5: r0 = socket(0x10, 0x80002, 0x0) r1 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f00000004c0)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x300, 0x0) getsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f00000001c0)={@multicast1, @remote, @empty}, &(0x7f0000000240)=0xffffffffffffff7d) unshare(0x400) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0) shutdown(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0)=0x5, 0x4) fchown(r1, 0x0, 0x0) fsetxattr$system_posix_acl(r2, 0x0, &(0x7f0000000c80)=ANY=[], 0x0, 0x2) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffff8) fstat(r3, 0x0) r5 = semget$private(0x0, 0x0, 0x0) vmsplice(r4, &(0x7f0000000180), 0x0, 0x8) semtimedop(r5, &(0x7f0000000400)=[{0x0, 0x80000001, 0x1000}, {0x0, 0x5, 0x800}], 0x2, &(0x7f0000000900)) write$P9_RCREATE(r1, &(0x7f0000000100)={0x18, 0x73, 0x1, {{0x21, 0x4, 0x1}, 0x8}}, 0x18) write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x1, {0x20, 0x2, 0x3}}, 0x14) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) write$P9_RFLUSH(r2, &(0x7f0000000140)={0x7, 0x6d, 0x1}, 0x7) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) 11:37:53 executing program 1: 11:37:53 executing program 0: 11:37:53 executing program 4: 11:37:53 executing program 2: 11:37:53 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000080), 0x0) 11:37:53 executing program 1: 11:37:53 executing program 0: 11:37:53 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000080), 0x0) 11:37:53 executing program 2: 11:37:53 executing program 4: 11:37:53 executing program 0: 11:37:53 executing program 5: r0 = socket(0x10, 0x80002, 0x0) r1 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f00000004c0)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x300, 0x0) getsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f00000001c0)={@multicast1, @remote, @empty}, &(0x7f0000000240)=0xffffffffffffff7d) unshare(0x400) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0) shutdown(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0)=0x5, 0x4) fchown(r1, 0x0, 0x0) fsetxattr$system_posix_acl(r2, 0x0, &(0x7f0000000c80)=ANY=[], 0x0, 0x2) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffff8) fstat(r3, 0x0) r5 = semget$private(0x0, 0x0, 0x0) vmsplice(r4, &(0x7f0000000180), 0x0, 0x8) semtimedop(r5, &(0x7f0000000400)=[{0x0, 0x80000001, 0x1000}, {0x0, 0x5, 0x800}], 0x2, &(0x7f0000000900)) write$P9_RCREATE(r1, &(0x7f0000000100)={0x18, 0x73, 0x1, {{0x21, 0x4, 0x1}, 0x8}}, 0x18) write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x1, {0x20, 0x2, 0x3}}, 0x14) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) write$P9_RFLUSH(r2, &(0x7f0000000140)={0x7, 0x6d, 0x1}, 0x7) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) 11:37:53 executing program 1: 11:37:53 executing program 4: 11:37:53 executing program 2: 11:37:53 executing program 0: 11:37:53 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000080), 0x0) 11:37:53 executing program 1: 11:37:53 executing program 4: 11:37:53 executing program 0: 11:37:53 executing program 2: 11:37:53 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000080)=[{0x0}], 0x1) 11:37:54 executing program 4: 11:37:54 executing program 5: r0 = socket(0x10, 0x80002, 0x0) r1 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f00000004c0)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x300, 0x0) getsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f00000001c0)={@multicast1, @remote, @empty}, &(0x7f0000000240)=0xffffffffffffff7d) unshare(0x400) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0) shutdown(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0)=0x5, 0x4) fchown(r1, 0x0, 0x0) fsetxattr$system_posix_acl(r2, 0x0, &(0x7f0000000c80)=ANY=[], 0x0, 0x2) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffff8) fstat(r3, 0x0) r5 = semget$private(0x0, 0x0, 0x0) vmsplice(r4, &(0x7f0000000180), 0x0, 0x8) semtimedop(r5, &(0x7f0000000400)=[{0x0, 0x80000001, 0x1000}, {0x0, 0x5, 0x800}], 0x2, &(0x7f0000000900)) write$P9_RCREATE(r1, &(0x7f0000000100)={0x18, 0x73, 0x1, {{0x21, 0x4, 0x1}, 0x8}}, 0x18) write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x1, {0x20, 0x2, 0x3}}, 0x14) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) write$P9_RFLUSH(r2, &(0x7f0000000140)={0x7, 0x6d, 0x1}, 0x7) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) 11:37:54 executing program 2: 11:37:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000000)='dev ', 0x7) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 11:37:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, &(0x7f0000000280)) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7f8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 11:37:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000080)=[{0x0}], 0x1) 11:37:54 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @broadcast=0xe0000001}, @icmp}}}}, 0x0) setrlimit(0x5, &(0x7f0000000040)) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00966) 11:37:54 executing program 2: r0 = socket$inet(0x2, 0x4040000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000140)=0x4, 0x4) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) sendto(r0, &(0x7f00000022c0)="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", 0x481, 0x0, 0x0, 0x0) 11:37:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000080)=[{0x0}], 0x1) 11:37:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000080)=[{}], 0x1) 11:37:54 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x0) pread64(r0, &(0x7f0000000240)=""/243, 0xf3, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 11:37:54 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0xfffffffffffffffe) ftruncate(r2, 0x0) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x34) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) prctl$PR_GET_TSC(0x19, &(0x7f0000000300)) read(r3, &(0x7f0000000180)=""/19, 0xfffffe47) r4 = getpgid(0x0) r5 = getpid() rt_tgsigqueueinfo(r4, r5, 0x8, &(0x7f0000000280)={0x5, 0x7, 0xf77}) ioctl$TIOCMGET(r2, 0x5415, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000240)="1e7997811d97b072df00b6341d7d85b3", 0x10) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) ioctl$TCSETX(r2, 0x5433, &(0x7f00000001c0)={0x2, 0x2, [0x9, 0x4, 0x1, 0x800, 0xcc88], 0xef7}) socket$inet_udplite(0x2, 0x2, 0x88) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x3) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)=0x0) ptrace$cont(0x1f, r6, 0x81, 0x10001) finit_module(r3, &(0x7f0000000200)='\x00', 0x3) 11:37:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000080)=[{}], 0x1) 11:37:54 executing program 5: r0 = socket(0x10, 0x80002, 0x0) r1 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f00000004c0)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x300, 0x0) getsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f00000001c0)={@multicast1, @remote, @empty}, &(0x7f0000000240)=0xffffffffffffff7d) unshare(0x400) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0) shutdown(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0)=0x5, 0x4) fchown(r1, 0x0, 0x0) fsetxattr$system_posix_acl(r2, 0x0, &(0x7f0000000c80)=ANY=[], 0x0, 0x2) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffff8) fstat(r3, 0x0) r5 = semget$private(0x0, 0x0, 0x0) vmsplice(r4, &(0x7f0000000180), 0x0, 0x8) semtimedop(r5, &(0x7f0000000400)=[{0x0, 0x80000001, 0x1000}, {0x0, 0x5, 0x800}], 0x2, &(0x7f0000000900)) write$P9_RCREATE(r1, &(0x7f0000000100)={0x18, 0x73, 0x1, {{0x21, 0x4, 0x1}, 0x8}}, 0x18) write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x1, {0x20, 0x2, 0x3}}, 0x14) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) write$P9_RFLUSH(r2, &(0x7f0000000140)={0x7, 0x6d, 0x1}, 0x7) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x6000) 11:37:54 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCCONS(r0, 0x80047462) mknod(&(0x7f0000000040)='./bus\x00', 0x8000, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x40000000006, 0x0) write(r1, 0x0, 0x0) 11:37:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000080)=[{}], 0x1) [ 243.050115][ T9233] vivid-000: kernel_thread() failed 11:37:55 executing program 2: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [], 0x22000000}}) write$P9_RREMOVE(r1, &(0x7f0000000100)={0x7, 0x7b, 0x2}, 0x7) 11:37:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x30f) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='yeah\x00', 0x5) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) clock_gettime(0x0, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(0xffffffffffffffff, 0x28, 0x6, 0x0, 0x0) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x800) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 243.253259][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:37:55 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x6, 0x52, r0, 0x0) 11:37:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f640094000500", 0x2c}], 0x1) 11:37:55 executing program 0: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) r1 = dup(r0) connect$unix(r1, &(0x7f00000003c0)=@abs={0xf64cb340ce081cac, 0x3}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x2f, &(0x7f0000000040), 0x4) 11:37:55 executing program 5: r0 = socket(0x10, 0x80002, 0x0) r1 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f00000004c0)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x300, 0x0) getsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f00000001c0)={@multicast1, @remote, @empty}, &(0x7f0000000240)=0xffffffffffffff7d) unshare(0x400) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0) shutdown(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0)=0x5, 0x4) fchown(r1, 0x0, 0x0) fsetxattr$system_posix_acl(r2, 0x0, &(0x7f0000000c80)=ANY=[], 0x0, 0x2) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffff8) fstat(r3, 0x0) r5 = semget$private(0x0, 0x0, 0x0) vmsplice(r4, &(0x7f0000000180), 0x0, 0x8) semtimedop(r5, &(0x7f0000000400)=[{0x0, 0x80000001, 0x1000}, {0x0, 0x5, 0x800}], 0x2, &(0x7f0000000900)) write$P9_RCREATE(r1, &(0x7f0000000100)={0x18, 0x73, 0x1, {{0x21, 0x4, 0x1}, 0x8}}, 0x18) write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x1, {0x20, 0x2, 0x3}}, 0x14) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) write$P9_RFLUSH(r2, &(0x7f0000000140)={0x7, 0x6d, 0x1}, 0x7) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x6000) 11:37:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f640094000500", 0x2c}], 0x1) 11:37:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f640094000500", 0x2c}], 0x1) 11:37:55 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89eb, &(0x7f0000000040)={@default, @rose}) 11:37:55 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x6, 0x52, r0, 0x0) 11:37:55 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x204000000bd}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0xc0bc5351, &(0x7f0000000400)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, 0x0, 0x0) tkill(r1, 0x1000000000013) 11:37:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f0000002540), 0x1000) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 11:37:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000", 0x42}], 0x1) [ 244.038149][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:37:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) fsetxattr$trusted_overlay_origin(0xffffffffffffff9c, &(0x7f0000000000)='trusted.overlay.origin\x00', 0x0, 0xfffffffffffffe71, 0xfffffffffffffffb) 11:37:55 executing program 5: r0 = socket(0x10, 0x80002, 0x0) r1 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f00000004c0)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x300, 0x0) getsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f00000001c0)={@multicast1, @remote, @empty}, &(0x7f0000000240)=0xffffffffffffff7d) unshare(0x400) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0) shutdown(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0)=0x5, 0x4) fchown(r1, 0x0, 0x0) fsetxattr$system_posix_acl(r2, 0x0, &(0x7f0000000c80)=ANY=[], 0x0, 0x2) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffff8) fstat(r3, 0x0) r5 = semget$private(0x0, 0x0, 0x0) vmsplice(r4, &(0x7f0000000180), 0x0, 0x8) semtimedop(r5, &(0x7f0000000400)=[{0x0, 0x80000001, 0x1000}, {0x0, 0x5, 0x800}], 0x2, &(0x7f0000000900)) write$P9_RCREATE(r1, &(0x7f0000000100)={0x18, 0x73, 0x1, {{0x21, 0x4, 0x1}, 0x8}}, 0x18) write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x1, {0x20, 0x2, 0x3}}, 0x14) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) write$P9_RFLUSH(r2, &(0x7f0000000140)={0x7, 0x6d, 0x1}, 0x7) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x6000) 11:37:55 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x6, 0x52, r0, 0x0) 11:37:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000", 0x42}], 0x1) 11:37:56 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7f8) 11:37:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000", 0x42}], 0x1) 11:37:56 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7f8) 11:37:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd0000081000010008", 0x4d}], 0x1) 11:37:56 executing program 5: r0 = socket(0x10, 0x80002, 0x0) r1 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f00000004c0)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x300, 0x0) getsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f00000001c0)={@multicast1, @remote, @empty}, &(0x7f0000000240)=0xffffffffffffff7d) unshare(0x400) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0) shutdown(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0)=0x5, 0x4) fchown(r1, 0x0, 0x0) fsetxattr$system_posix_acl(r2, 0x0, &(0x7f0000000c80)=ANY=[], 0x0, 0x2) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffff8) fstat(r3, 0x0) r5 = semget$private(0x0, 0x0, 0x0) vmsplice(r4, &(0x7f0000000180), 0x0, 0x8) semtimedop(r5, &(0x7f0000000400)=[{0x0, 0x80000001, 0x1000}, {0x0, 0x5, 0x800}], 0x2, &(0x7f0000000900)) write$P9_RCREATE(r1, &(0x7f0000000100)={0x18, 0x73, 0x1, {{0x21, 0x4, 0x1}, 0x8}}, 0x18) write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x1, {0x20, 0x2, 0x3}}, 0x14) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) r6 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x6000) 11:37:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100080c10000000000001400000", 0x58}], 0x1) 11:37:58 executing program 4: syz_open_dev$dri(0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, "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", 0x1000}, 0xfffffc41) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r1, 0x0, 0x0, 0x4) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f00000000c0)=0x3) chdir(&(0x7f00000001c0)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) r2 = open(&(0x7f0000000200)='./bus\x00', 0x14103e, 0x0) clock_gettime(0x0, &(0x7f00000011c0)) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r2, 0x0) 11:37:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd0000081000010008", 0x4d}], 0x1) 11:37:58 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000400)='tls\x00', 0xfffffffffffffe73) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) r1 = socket(0x10, 0x2, 0x0) getresuid(0x0, &(0x7f00000004c0), 0x0) setxattr$security_capability(&(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f00000005c0)=@v3={0x3000000, [{0x0, 0x5}, {0x200, 0x9}]}, 0x18, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000540)) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) 11:37:58 executing program 5: r0 = socket(0x10, 0x80002, 0x0) r1 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f00000004c0)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x300, 0x0) getsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f00000001c0)={@multicast1, @remote, @empty}, &(0x7f0000000240)=0xffffffffffffff7d) unshare(0x400) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0) shutdown(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0)=0x5, 0x4) fchown(r1, 0x0, 0x0) fsetxattr$system_posix_acl(r2, 0x0, &(0x7f0000000c80)=ANY=[], 0x0, 0x2) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffff8) fstat(r3, 0x0) r5 = semget$private(0x0, 0x0, 0x0) vmsplice(r4, &(0x7f0000000180), 0x0, 0x8) semtimedop(r5, &(0x7f0000000400)=[{0x0, 0x80000001, 0x1000}, {0x0, 0x5, 0x800}], 0x2, &(0x7f0000000900)) write$P9_RCREATE(r1, &(0x7f0000000100)={0x18, 0x73, 0x1, {{0x21, 0x4, 0x1}, 0x8}}, 0x18) write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x1, {0x20, 0x2, 0x3}}, 0x14) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) r6 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x6000) 11:37:58 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@name, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x10000}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000014c0)="11dca5055e0bcfec7be070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x9000000, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x5, 0x0, {0x14}}}, 0x30}}, 0x0) 11:37:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd0000081000010008", 0x4d}], 0x1) 11:37:58 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @dev}, {0x2, 0x0, @empty}, 0x76eac4cad03c63f7, 0x0, 0x0, 0x0, 0xffffffff}) 11:37:59 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0xb4, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6}]}, 0x10) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 247.220457][ T9355] FAT-fs (loop4): bogus number of reserved sectors 11:37:59 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000810000100080400a0000000", 0x53}], 0x1) 11:37:59 executing program 5: r0 = socket(0x10, 0x80002, 0x0) r1 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f00000004c0)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x300, 0x0) getsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f00000001c0)={@multicast1, @remote, @empty}, &(0x7f0000000240)=0xffffffffffffff7d) unshare(0x400) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0) shutdown(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0)=0x5, 0x4) fchown(r1, 0x0, 0x0) fsetxattr$system_posix_acl(r2, 0x0, &(0x7f0000000c80)=ANY=[], 0x0, 0x2) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffff8) fstat(r3, 0x0) r5 = semget$private(0x0, 0x0, 0x0) vmsplice(r4, &(0x7f0000000180), 0x0, 0x8) semtimedop(r5, &(0x7f0000000400)=[{0x0, 0x80000001, 0x1000}, {0x0, 0x5, 0x800}], 0x2, &(0x7f0000000900)) write$P9_RCREATE(r1, &(0x7f0000000100)={0x18, 0x73, 0x1, {{0x21, 0x4, 0x1}, 0x8}}, 0x18) write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x1, {0x20, 0x2, 0x3}}, 0x14) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) r6 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x6000) [ 247.295892][ T9355] FAT-fs (loop4): Can't find a valid FAT filesystem 11:37:59 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000698000)=0x3) ioctl$TCFLSH(r1, 0x5412, 0x70d000) 11:37:59 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x0, @local}, {0x2, 0x0, @broadcast}, 0xc0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, 0x800}) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x4e23, @loopback}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}, {0x2, 0x4e22, @empty}, 0x76eac4cad03c63f7, 0x0, 0x0, 0x0, 0xffffffff, &(0x7f0000000000)='gretap0\x00', 0x7ff, 0x3, 0xaf2}) socket$bt_rfcomm(0x1f, 0x3, 0x3) r1 = socket(0x11, 0x80f, 0x7fff) connect$nfc_llcp(r1, &(0x7f0000000140)={0x27, 0x1, 0x0, 0x7, 0x94db, 0x6, "9b63a2af7afe83ff8f2f7e2d358c17a04053ff825d56257af1512f41c993b4936cd4f99696c8ef9ac8ffef1501b72d20ac8bb5b7853bf5d1407cf47fca0fe6", 0x29}, 0x60) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f00000001c0)=0x7, &(0x7f0000000100)=0xffffff8e) [ 247.827806][ T9355] FAT-fs (loop4): bogus number of reserved sectors [ 247.883409][ T9355] FAT-fs (loop4): Can't find a valid FAT filesystem 11:37:59 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000340)='veth0_to_team\x00', 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @initdev}, 0x10) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x892, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0xb1f, 0x4) 11:37:59 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000810000100080400a0000000", 0x53}], 0x1) 11:37:59 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000400)='tls\x00', 0xfffffffffffffe73) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) r1 = socket(0x10, 0x2, 0x0) getresuid(0x0, &(0x7f00000004c0), 0x0) setxattr$security_capability(&(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f00000005c0)=@v3={0x3000000, [{0x0, 0x5}, {0x200, 0x9}]}, 0x18, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000540)) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) 11:37:59 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x6, 0x52, r0, 0x0) 11:37:59 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, 0x0, 0x0) 11:37:59 executing program 5: r0 = socket(0x10, 0x80002, 0x0) r1 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f00000004c0)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x300, 0x0) getsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f00000001c0)={@multicast1, @remote, @empty}, &(0x7f0000000240)=0xffffffffffffff7d) unshare(0x400) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0) shutdown(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0)=0x5, 0x4) fchown(r1, 0x0, 0x0) fsetxattr$system_posix_acl(r2, 0x0, &(0x7f0000000c80)=ANY=[], 0x0, 0x2) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffff8) fstat(r3, 0x0) r5 = semget$private(0x0, 0x0, 0x0) vmsplice(r4, &(0x7f0000000180), 0x0, 0x8) semtimedop(r5, &(0x7f0000000400)=[{0x0, 0x80000001, 0x1000}, {0x0, 0x5, 0x800}], 0x2, &(0x7f0000000900)) write$P9_RCREATE(r1, &(0x7f0000000100)={0x18, 0x73, 0x1, {{0x21, 0x4, 0x1}, 0x8}}, 0x18) write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x1, {0x20, 0x2, 0x3}}, 0x14) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) write$P9_RFLUSH(r2, &(0x7f0000000140)={0x7, 0x6d, 0x1}, 0x7) r6 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x6000) 11:37:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0xa102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x4) rename(&(0x7f0000000080)='./file0/file0\x00', 0x0) read$FUSE(r1, 0x0, 0x22b) 11:37:59 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000810000100080400a0000000", 0x53}], 0x1) 11:38:00 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000f40)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @remote, 0x1}, 0x1c, 0x0}}], 0x1, 0x0) [ 248.281480][ T8803] ================================================================== [ 248.289806][ T8803] BUG: KASAN: use-after-free in blk_mq_free_rqs+0x49f/0x4b0 [ 248.297882][ T8803] Read of size 8 at addr ffff88808c46c250 by task kworker/1:3/8803 [ 248.305772][ T8803] [ 248.308106][ T8803] CPU: 1 PID: 8803 Comm: kworker/1:3 Not tainted 5.2.0-rc3-next-20190607 #11 [ 248.316863][ T8803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.327065][ T8803] Workqueue: events __blk_release_queue [ 248.332621][ T8803] Call Trace: [ 248.335975][ T8803] dump_stack+0x172/0x1f0 [ 248.340318][ T8803] ? blk_mq_free_rqs+0x49f/0x4b0 [ 248.345273][ T8803] print_address_description.cold+0xd4/0x306 [ 248.351261][ T8803] ? blk_mq_free_rqs+0x49f/0x4b0 [ 248.356204][ T8803] ? blk_mq_free_rqs+0x49f/0x4b0 [ 248.361149][ T8803] __kasan_report.cold+0x1b/0x36 [ 248.366095][ T8803] ? blk_mq_free_rqs+0x49f/0x4b0 [ 248.366122][ T8803] kasan_report+0x12/0x20 [ 248.366135][ T8803] __asan_report_load8_noabort+0x14/0x20 [ 248.366147][ T8803] blk_mq_free_rqs+0x49f/0x4b0 [ 248.381184][ T8803] ? dd_exit_queue+0x92/0xd0 [ 248.381198][ T8803] ? kfree+0x1ec/0x2a0 [ 248.381223][ T8803] blk_mq_sched_tags_teardown+0x126/0x210 [ 248.381240][ T8803] ? dd_request_merge+0x230/0x230 [ 248.381255][ T8803] blk_mq_exit_sched+0x1fa/0x2d0 [ 248.381276][ T8803] elevator_exit+0x70/0xa0 [ 248.381302][ T8803] __blk_release_queue+0x127/0x330 [ 248.420043][ T8803] process_one_work+0x989/0x1790 [ 248.424996][ T8803] ? pwq_dec_nr_in_flight+0x320/0x320 [ 248.430379][ T8803] ? lock_acquire+0x16f/0x3f0 [ 248.430404][ T8803] worker_thread+0x98/0xe40 [ 248.430420][ T8803] ? trace_hardirqs_on+0x67/0x220 [ 248.430446][ T8803] kthread+0x354/0x420 [ 248.430460][ T8803] ? process_one_work+0x1790/0x1790 [ 248.430473][ T8803] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 248.430553][ T8803] ret_from_fork+0x24/0x30 [ 248.430574][ T8803] [ 248.430582][ T8803] Allocated by task 9390: [ 248.430597][ T8803] save_stack+0x23/0x90 [ 248.430610][ T8803] __kasan_kmalloc.constprop.0+0xcf/0xe0 11:38:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000810000100080400a0000000000140", 0x56}], 0x1) [ 248.430621][ T8803] kasan_kmalloc+0x9/0x10 [ 248.430633][ T8803] kmem_cache_alloc_trace+0x151/0x750 [ 248.430644][ T8803] loop_add+0x51/0x8d0 [ 248.430655][ T8803] loop_control_ioctl+0x165/0x360 [ 248.430666][ T8803] do_vfs_ioctl+0xdb6/0x13e0 [ 248.430675][ T8803] ksys_ioctl+0xab/0xd0 [ 248.430692][ T8803] __x64_sys_ioctl+0x73/0xb0 [ 248.454986][ T8803] do_syscall_64+0xfd/0x680 [ 248.455003][ T8803] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 248.455008][ T8803] [ 248.455015][ T8803] Freed by task 9416: 11:38:00 executing program 5: r0 = socket(0x10, 0x80002, 0x0) r1 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f00000004c0)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x300, 0x0) getsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f00000001c0)={@multicast1, @remote, @empty}, &(0x7f0000000240)=0xffffffffffffff7d) unshare(0x400) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0) shutdown(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0)=0x5, 0x4) fchown(r1, 0x0, 0x0) fsetxattr$system_posix_acl(r2, 0x0, &(0x7f0000000c80)=ANY=[], 0x0, 0x2) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffff8) fstat(r3, 0x0) r5 = semget$private(0x0, 0x0, 0x0) vmsplice(r4, &(0x7f0000000180), 0x0, 0x8) semtimedop(r5, &(0x7f0000000400)=[{0x0, 0x80000001, 0x1000}, {0x0, 0x5, 0x800}], 0x2, &(0x7f0000000900)) write$P9_RCREATE(r1, &(0x7f0000000100)={0x18, 0x73, 0x1, {{0x21, 0x4, 0x1}, 0x8}}, 0x18) write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x1, {0x20, 0x2, 0x3}}, 0x14) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) write$P9_RFLUSH(r2, &(0x7f0000000140)={0x7, 0x6d, 0x1}, 0x7) r6 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x6000) [ 248.455028][ T8803] save_stack+0x23/0x90 [ 248.455040][ T8803] __kasan_slab_free+0x102/0x150 [ 248.455051][ T8803] kasan_slab_free+0xe/0x10 [ 248.455068][ T8803] kfree+0x106/0x2a0 [ 248.524522][ T8803] loop_remove+0xa1/0xd0 [ 248.524534][ T8803] loop_control_ioctl+0x320/0x360 [ 248.524546][ T8803] do_vfs_ioctl+0xdb6/0x13e0 [ 248.524556][ T8803] ksys_ioctl+0xab/0xd0 [ 248.524567][ T8803] __x64_sys_ioctl+0x73/0xb0 [ 248.524582][ T8803] do_syscall_64+0xfd/0x680 [ 248.524597][ T8803] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 248.524609][ T8803] [ 248.524620][ T8803] The buggy address belongs to the object at ffff88808c46c040 [ 248.524620][ T8803] which belongs to the cache kmalloc-1k of size 1024 [ 248.575424][ T8803] The buggy address is located 528 bytes inside of [ 248.575424][ T8803] 1024-byte region [ffff88808c46c040, ffff88808c46c440) [ 248.598352][ T8803] The buggy address belongs to the page: [ 248.598369][ T8803] page:ffffea0002311b00 refcount:1 mapcount:0 mapping:ffff8880aa400ac0 index:0x0 compound_mapcount: 0 11:38:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(r0, 0x9000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0xa10f6e95b4637c95, 0x0) [ 248.598383][ T8803] flags: 0x1fffc0000010200(slab|head) [ 248.598401][ T8803] raw: 01fffc0000010200 ffffea0002732288 ffffea000229f308 ffff8880aa400ac0 [ 248.598416][ T8803] raw: 0000000000000000 ffff88808c46c040 0000000100000007 0000000000000000 [ 248.598421][ T8803] page dumped because: kasan: bad access detected [ 248.598425][ T8803] [ 248.598429][ T8803] Memory state around the buggy address: [ 248.598440][ T8803] ffff88808c46c100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 248.598450][ T8803] ffff88808c46c180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 248.598459][ T8803] >ffff88808c46c200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 248.598466][ T8803] ^ [ 248.598475][ T8803] ffff88808c46c280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 248.598485][ T8803] ffff88808c46c300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 248.598490][ T8803] ================================================================== [ 248.598495][ T8803] Disabling lock debugging due to kernel taint [ 248.775731][ T8803] Kernel panic - not syncing: panic_on_warn set ... [ 248.782397][ T8803] CPU: 1 PID: 8803 Comm: kworker/1:3 Tainted: G B 5.2.0-rc3-next-20190607 #11 [ 248.793421][ T8803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.803672][ T8803] Workqueue: events __blk_release_queue [ 248.809225][ T8803] Call Trace: [ 248.812534][ T8803] dump_stack+0x172/0x1f0 [ 248.818356][ T8803] panic+0x2cb/0x744 [ 248.822265][ T8803] ? __warn_printk+0xf3/0xf3 [ 248.826869][ T8803] ? blk_mq_free_rqs+0x49f/0x4b0 [ 248.831811][ T8803] ? preempt_schedule+0x4b/0x60 [ 248.836668][ T8803] ? ___preempt_schedule+0x16/0x18 [ 248.841792][ T8803] ? trace_hardirqs_on+0x5e/0x220 [ 248.846829][ T8803] ? blk_mq_free_rqs+0x49f/0x4b0 [ 248.851767][ T8803] end_report+0x47/0x4f [ 248.855924][ T8803] ? blk_mq_free_rqs+0x49f/0x4b0 [ 248.860862][ T8803] __kasan_report.cold+0xe/0x36 [ 248.865719][ T8803] ? blk_mq_free_rqs+0x49f/0x4b0 [ 248.870662][ T8803] kasan_report+0x12/0x20 [ 248.874999][ T8803] __asan_report_load8_noabort+0x14/0x20 [ 248.880642][ T8803] blk_mq_free_rqs+0x49f/0x4b0 [ 248.885409][ T8803] ? dd_exit_queue+0x92/0xd0 [ 248.889999][ T8803] ? kfree+0x1ec/0x2a0 [ 248.894081][ T8803] blk_mq_sched_tags_teardown+0x126/0x210 [ 248.894336][ T3882] kobject: 'loop5' (00000000948879cd): kobject_uevent_env [ 248.899798][ T8803] ? dd_request_merge+0x230/0x230 [ 248.899810][ T8803] blk_mq_exit_sched+0x1fa/0x2d0 [ 248.899825][ T8803] elevator_exit+0x70/0xa0 [ 248.899839][ T8803] __blk_release_queue+0x127/0x330 [ 248.899855][ T8803] process_one_work+0x989/0x1790 [ 248.899874][ T8803] ? pwq_dec_nr_in_flight+0x320/0x320 [ 248.910032][ T3882] kobject: 'loop5' (00000000948879cd): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 248.911993][ T8803] ? lock_acquire+0x16f/0x3f0 [ 248.912016][ T8803] worker_thread+0x98/0xe40 [ 248.912036][ T8803] ? trace_hardirqs_on+0x67/0x220 [ 248.961038][ T8803] kthread+0x354/0x420 [ 248.965101][ T8803] ? process_one_work+0x1790/0x1790 [ 248.970293][ T8803] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 248.976532][ T8803] ret_from_fork+0x24/0x30 [ 248.982022][ T8803] Kernel Offset: disabled [ 248.986397][ T8803] Rebooting in 86400 seconds..