[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 27.594421] kauditd_printk_skb: 8 callbacks suppressed [ 27.594433] audit: type=1800 audit(1541565309.635:29): pid=5554 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 27.628511] audit: type=1800 audit(1541565309.635:30): pid=5554 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.31' (ECDSA) to the list of known hosts. 2018/11/07 04:35:26 fuzzer started 2018/11/07 04:35:28 dialing manager at 10.128.0.26:33665 2018/11/07 04:35:29 syscalls: 1 2018/11/07 04:35:29 code coverage: enabled 2018/11/07 04:35:29 comparison tracing: enabled 2018/11/07 04:35:29 setuid sandbox: enabled 2018/11/07 04:35:29 namespace sandbox: enabled 2018/11/07 04:35:29 Android sandbox: /sys/fs/selinux/policy does not exist 2018/11/07 04:35:29 fault injection: enabled 2018/11/07 04:35:29 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/11/07 04:35:29 net packed injection: enabled 2018/11/07 04:35:29 net device setup: enabled 04:38:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000600)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f0000000080)="f20f2d7e00c4e3bd40ce630f07f7cd0c000000660f01c90ff8cd0fc7588ab8ad6e00000f23d80f21f835000000c00f23f8c4e3cd6971f500f20f08", 0x3b}], 0x1, 0x0, &(0x7f0000000040), 0x0) syzkaller login: [ 201.067152] IPVS: ftp: loaded support on port[0] = 21 04:38:03 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={"65716c0000000000eaffff0400e61000", 0x800000000008005}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x306) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={"65716c000000a95b00", @ifru_mtu=0x1}) [ 201.381782] IPVS: ftp: loaded support on port[0] = 21 04:38:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000040)=""/173) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) move_pages(0x0, 0x1, &(0x7f0000000ac0)=[&(0x7f0000def000/0x3000)=nil], 0x0, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000900)=[@in6={0xa, 0x0, 0x0, @mcast1}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e20, @local}], 0x3c) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000340)=""/237) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000100)=0x1) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x5, 0x62eb, 0xffffffffffffffff}, 0x14) accept$unix(r3, &(0x7f0000000840)=@abs, &(0x7f0000000740)=0xfffffffffffffe90) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)) [ 201.716123] IPVS: ftp: loaded support on port[0] = 21 04:38:04 executing program 3: creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x0, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)=@known='security.capability\x00', &(0x7f00000003c0)=""/23, 0x17) [ 202.128392] IPVS: ftp: loaded support on port[0] = 21 [ 202.503222] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.530555] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.538139] device bridge_slave_0 entered promiscuous mode 04:38:04 executing program 4: setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast2}}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x5c) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) ptrace$getregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000240)=""/4096) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x3f, 0x400) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000001240)=""/209) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ptrace$peekuser(0x3, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f00000001c0)={0x5, 0x0, 0xba, 0x7}) socket$vsock_stream(0x28, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cuse\x00', 0x10121102, 0x0) io_setup(0x4, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000000)="10000000060000000000000000000000", 0x10}]) [ 202.733483] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.758989] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.766694] device bridge_slave_1 entered promiscuous mode [ 202.850102] IPVS: ftp: loaded support on port[0] = 21 [ 202.898608] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 203.043661] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 04:38:05 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) [ 203.410413] IPVS: ftp: loaded support on port[0] = 21 [ 203.485059] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 203.507042] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.550144] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.557676] device bridge_slave_0 entered promiscuous mode [ 203.582713] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 203.688213] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.713120] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.721967] device bridge_slave_1 entered promiscuous mode [ 203.735051] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.757568] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.780414] device bridge_slave_0 entered promiscuous mode [ 203.874357] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 203.912664] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.922521] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.949944] device bridge_slave_1 entered promiscuous mode [ 203.998958] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 204.098732] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 204.236849] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 204.292068] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 204.303026] team0: Port device team_slave_0 added [ 204.320874] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 204.424805] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 204.437464] team0: Port device team_slave_1 added [ 204.470384] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 204.564158] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 204.593129] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 204.619410] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.640365] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.649273] device bridge_slave_0 entered promiscuous mode [ 204.706308] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 204.774126] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 204.792745] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.813907] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.821598] device bridge_slave_1 entered promiscuous mode [ 204.845311] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 204.874287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 204.892493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 204.949427] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 204.956557] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 204.970952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 205.023918] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 205.041483] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 205.048361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 205.139124] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 205.163483] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 205.175751] team0: Port device team_slave_0 added [ 205.296063] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 205.309693] team0: Port device team_slave_1 added [ 205.361438] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.367816] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.380222] device bridge_slave_0 entered promiscuous mode [ 205.423118] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 205.434516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 205.449957] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 205.494867] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 205.510435] team0: Port device team_slave_0 added [ 205.518360] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.539950] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.547365] device bridge_slave_1 entered promiscuous mode [ 205.561588] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 205.585382] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 205.600453] team0: Port device team_slave_1 added [ 205.620946] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 205.662196] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 205.690813] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 205.717351] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 205.739829] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 205.750287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 205.801770] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 205.830510] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 205.861132] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 205.868319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 205.890868] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 205.958140] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 206.023875] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.045566] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.061304] device bridge_slave_0 entered promiscuous mode [ 206.081778] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 206.121179] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 206.139466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 206.162325] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 206.184949] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 206.199752] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 206.234374] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 206.252292] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.258730] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.269916] device bridge_slave_1 entered promiscuous mode [ 206.350488] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 206.412252] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 206.456420] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 206.468125] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 206.519830] team0: Port device team_slave_0 added [ 206.526893] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 206.560345] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 206.639551] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 206.650946] team0: Port device team_slave_1 added [ 206.726970] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 206.820530] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.827046] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.834056] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.840460] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.848787] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 206.899387] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 207.003075] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 207.030506] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 207.041879] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 207.059709] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 207.069672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 207.088563] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 207.097137] team0: Port device team_slave_0 added [ 207.125123] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 207.175615] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 207.190342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 207.200748] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 207.219150] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 207.226710] team0: Port device team_slave_1 added [ 207.285584] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 207.293671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 207.381708] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 207.388573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 207.399698] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 207.449058] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 207.456700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 207.532113] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.538544] bridge0: port 2(bridge_slave_1) entered forwarding state [ 207.545286] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.551705] bridge0: port 1(bridge_slave_0) entered forwarding state [ 207.585651] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 207.618555] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 207.641279] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 207.661394] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 207.774271] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 207.796589] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 207.806878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 207.840638] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.847042] bridge0: port 2(bridge_slave_1) entered forwarding state [ 207.853790] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.860217] bridge0: port 1(bridge_slave_0) entered forwarding state [ 207.872789] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 207.882765] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 207.901791] team0: Port device team_slave_0 added [ 207.919415] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 207.931546] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 207.959711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 208.049722] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 208.059001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 208.069950] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 208.077350] team0: Port device team_slave_1 added [ 208.177605] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 208.184812] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 208.203113] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 208.308332] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 208.316284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 208.334734] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 208.394821] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 208.409198] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 208.429469] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 208.539306] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 208.546541] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 208.567741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 208.755382] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.761848] bridge0: port 2(bridge_slave_1) entered forwarding state [ 208.768504] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.774936] bridge0: port 1(bridge_slave_0) entered forwarding state [ 208.799919] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 209.073006] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 209.540975] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.547389] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.554126] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.560538] bridge0: port 1(bridge_slave_0) entered forwarding state [ 209.599701] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 209.914726] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.921164] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.927835] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.934299] bridge0: port 1(bridge_slave_0) entered forwarding state [ 209.951630] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 210.084483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 210.094942] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 212.552530] 8021q: adding VLAN 0 to HW filter on device bond0 [ 213.002807] 8021q: adding VLAN 0 to HW filter on device bond0 [ 213.117666] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 213.180625] 8021q: adding VLAN 0 to HW filter on device bond0 [ 213.442332] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 213.627927] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 213.647299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 213.657763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.693806] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 214.010154] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 214.016320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 214.029590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.062771] 8021q: adding VLAN 0 to HW filter on device bond0 [ 214.104562] 8021q: adding VLAN 0 to HW filter on device team0 [ 214.186068] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 214.207131] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 214.222963] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.510207] 8021q: adding VLAN 0 to HW filter on device team0 [ 214.569753] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 214.664724] 8021q: adding VLAN 0 to HW filter on device team0 [ 215.082259] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 215.088429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.096865] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.158228] 8021q: adding VLAN 0 to HW filter on device bond0 [ 215.250077] 8021q: adding VLAN 0 to HW filter on device bond0 [ 215.532853] 8021q: adding VLAN 0 to HW filter on device team0 [ 215.687420] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 215.723109] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 216.168660] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 216.194341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 216.210309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 216.232621] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 216.252922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 216.264872] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 216.629542] 8021q: adding VLAN 0 to HW filter on device team0 [ 216.730415] 8021q: adding VLAN 0 to HW filter on device team0 [ 217.309442] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 04:38:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000180)=0x4) 04:38:19 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={"65716c0000000000eaffff0400e61000", 0x800000000008005}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x306) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={"65716c000000a95b00", @ifru_mtu=0x1}) [ 217.651345] hrtimer: interrupt took 33980 ns 04:38:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000040)=""/173) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) move_pages(0x0, 0x1, &(0x7f0000000ac0)=[&(0x7f0000def000/0x3000)=nil], 0x0, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000900)=[@in6={0xa, 0x0, 0x0, @mcast1}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e20, @local}], 0x3c) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000340)=""/237) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000100)=0x1) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x5, 0x62eb, 0xffffffffffffffff}, 0x14) accept$unix(r3, &(0x7f0000000840)=@abs, &(0x7f0000000740)=0xfffffffffffffe90) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)) 04:38:19 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={"65716c0000000000eaffff0400e61000", 0x800000000008005}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x306) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={"65716c000000a95b00", @ifru_mtu=0x1}) 04:38:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000180)=0x4) 04:38:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000040)=""/173) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) move_pages(0x0, 0x1, &(0x7f0000000ac0)=[&(0x7f0000def000/0x3000)=nil], 0x0, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000900)=[@in6={0xa, 0x0, 0x0, @mcast1}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e20, @local}], 0x3c) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000340)=""/237) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000100)=0x1) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x5, 0x62eb, 0xffffffffffffffff}, 0x14) accept$unix(r3, &(0x7f0000000840)=@abs, &(0x7f0000000740)=0xfffffffffffffe90) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)) 04:38:20 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000180)=0x4) 04:38:20 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={"65716c0000000000eaffff0400e61000", 0x800000000008005}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x306) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={"65716c000000a95b00", @ifru_mtu=0x1}) 04:38:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000040)=""/173) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) move_pages(0x0, 0x1, &(0x7f0000000ac0)=[&(0x7f0000def000/0x3000)=nil], 0x0, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000900)=[@in6={0xa, 0x0, 0x0, @mcast1}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e20, @local}], 0x3c) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000340)=""/237) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000100)=0x1) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x5, 0x62eb, 0xffffffffffffffff}, 0x14) accept$unix(r3, &(0x7f0000000840)=@abs, &(0x7f0000000740)=0xfffffffffffffe90) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)) 04:38:20 executing program 3: creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x0, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)=@known='security.capability\x00', &(0x7f00000003c0)=""/23, 0x17) 04:38:21 executing program 4: setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast2}}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x5c) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) ptrace$getregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000240)=""/4096) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x3f, 0x400) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000001240)=""/209) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ptrace$peekuser(0x3, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f00000001c0)={0x5, 0x0, 0xba, 0x7}) socket$vsock_stream(0x28, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cuse\x00', 0x10121102, 0x0) io_setup(0x4, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000000)="10000000060000000000000000000000", 0x10}]) 04:38:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000180)=0x4) 04:38:21 executing program 3: creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x0, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)=@known='security.capability\x00', &(0x7f00000003c0)=""/23, 0x17) 04:38:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) 04:38:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) 04:38:21 executing program 3: creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x0, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)=@known='security.capability\x00', &(0x7f00000003c0)=""/23, 0x17) 04:38:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) 04:38:21 executing program 4: setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast2}}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x5c) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) ptrace$getregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000240)=""/4096) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x3f, 0x400) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000001240)=""/209) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ptrace$peekuser(0x3, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f00000001c0)={0x5, 0x0, 0xba, 0x7}) socket$vsock_stream(0x28, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cuse\x00', 0x10121102, 0x0) io_setup(0x4, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000000)="10000000060000000000000000000000", 0x10}]) 04:38:21 executing program 4: setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast2}}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x5c) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) ptrace$getregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000240)=""/4096) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x3f, 0x400) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000001240)=""/209) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ptrace$peekuser(0x3, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f00000001c0)={0x5, 0x0, 0xba, 0x7}) socket$vsock_stream(0x28, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cuse\x00', 0x10121102, 0x0) io_setup(0x4, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000000)="10000000060000000000000000000000", 0x10}]) 04:38:24 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{&(0x7f0000000440)=@nfc_llcp, 0x80, &(0x7f0000001700)=[{&(0x7f0000000700)=""/4096, 0x1000}], 0x1, &(0x7f0000001740)=""/194, 0xc2}}], 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_tables_targets\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 04:38:24 executing program 4: mkdir(&(0x7f0000000380)='./bus\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000140)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)={[{@upperdir={'upperdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}, 0x5c}]}) 04:38:24 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000010207031dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e28000000110affffba010000000009b3562406b20cd37ed01cc00000000000000000000000000000", 0x4c}], 0x1}, 0x0) 04:38:24 executing program 2: r0 = getpgrp(0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1}, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0xfffffc2d) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x0) 04:38:24 executing program 0: syz_emit_ethernet(0x72, &(0x7f0000000180)={@link_local, @link_local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @rand_addr, {[@timestamp={0x44, 0xc, 0x6, 0x3, 0x0, [{[@multicast1]}]}]}}, @gre}}}}, &(0x7f0000000040)) 04:38:24 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000001940)=[{&(0x7f0000000180)=""/157, 0x9d}], 0x1, &(0x7f0000001a00)=""/189, 0xbd}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f0000000040)={@remote, 0x0, 0x0, 0x0, 0xe}, 0xfffffffffffffdc0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f00000000c0)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r2, &(0x7f00000008c0)=[{&(0x7f0000000440)=""/102, 0x3c}, {&(0x7f0000000580)=""/172}, {&(0x7f0000000640)=""/190}, {&(0x7f0000000700)=""/78}, {&(0x7f0000000780)=""/110}, {&(0x7f0000000800)=""/151}], 0x304, 0x0) 04:38:24 executing program 0: syz_emit_ethernet(0x72, &(0x7f0000000180)={@link_local, @link_local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @rand_addr, {[@timestamp={0x44, 0xc, 0x6, 0x3, 0x0, [{[@multicast1]}]}]}}, @gre}}}}, &(0x7f0000000040)) [ 222.287974] netlink: 20 bytes leftover after parsing attributes in process `syz-executor3'. [ 222.321245] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 04:38:24 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000010207031dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e28000000110affffba010000000009b3562406b20cd37ed01cc00000000000000000000000000000", 0x4c}], 0x1}, 0x0) [ 222.395777] overlayfs: filesystem on './bus' not supported as upperdir 04:38:24 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000000)="6601669b0f35c4e1fe16846ba49e0000b9940200000f32c4c23dad78e0b9670900000f32660f38827f95b0040f01d10fc71a", 0x32}], 0x1, 0x0, &(0x7f0000000040), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000880)="b805000000b98b9400000f01c19a01000000b0000f43d1b8000000000f23d80f21f835800000900f23f80f060f2140b9800000c00f3235000800000f3066ba4300b8f1ffffffefb9800000c00f3235002000000f30c4c3295f4da400", 0x5c}], 0x1, 0x0, &(0x7f0000000140)=[@dstype3={0x7, 0x7}], 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 222.438989] ntfs: (device loop4): parse_options(): Unrecognized mount option upperdir. 04:38:24 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{&(0x7f0000000440)=@nfc_llcp, 0x80, &(0x7f0000001700)=[{&(0x7f0000000700)=""/4096, 0x1000}], 0x1, &(0x7f0000001740)=""/194, 0xc2}}], 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_tables_targets\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 04:38:24 executing program 0: syz_emit_ethernet(0x72, &(0x7f0000000180)={@link_local, @link_local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @rand_addr, {[@timestamp={0x44, 0xc, 0x6, 0x3, 0x0, [{[@multicast1]}]}]}}, @gre}}}}, &(0x7f0000000040)) [ 222.547854] netlink: 20 bytes leftover after parsing attributes in process `syz-executor3'. [ 222.576261] ntfs: (device loop4): parse_options(): Unrecognized mount option workdir. 04:38:24 executing program 0: syz_emit_ethernet(0x72, &(0x7f0000000180)={@link_local, @link_local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @rand_addr, {[@timestamp={0x44, 0xc, 0x6, 0x3, 0x0, [{[@multicast1]}]}]}}, @gre}}}}, &(0x7f0000000040)) [ 222.634295] ntfs: (device loop4): parse_options(): Unrecognized mount option lowerdir. 04:38:24 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000010207031dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e28000000110affffba010000000009b3562406b20cd37ed01cc00000000000000000000000000000", 0x4c}], 0x1}, 0x0) 04:38:24 executing program 4: mkdir(&(0x7f0000000380)='./bus\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000140)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)={[{@upperdir={'upperdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}, 0x5c}]}) 04:38:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) ioctl$VT_ACTIVATE(r0, 0x5606, 0x9) mount(&(0x7f000091dff8), &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 222.851943] netlink: 20 bytes leftover after parsing attributes in process `syz-executor3'. [ 223.005766] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 04:38:25 executing program 2: r0 = getpgrp(0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1}, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0xfffffc2d) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x0) 04:38:25 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{&(0x7f0000000440)=@nfc_llcp, 0x80, &(0x7f0000001700)=[{&(0x7f0000000700)=""/4096, 0x1000}], 0x1, &(0x7f0000001740)=""/194, 0xc2}}], 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_tables_targets\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 04:38:25 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa) syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) socket(0x11, 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000740)='/dev/ion\x00', 0x7, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r2, 0x4000000) write$P9_RLERRORu(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="1700000007029a28397f36d7000000000000000000000065992eb2519311d4880b0eb8ed3ccd997fe412d114ca52c59a3992d5e2073d66677bdd15062f878e6d813699835da7bcb5705e59ee9af0e25c418772a149adb8972864986ec41d63e9066639723f11205fa48c9aeb258abbe2848c4a17d12e228a42133ccc4a9f9545ad1a44d8c2d39fbb77a1acd5a596ee204093bd3be54459ea1caba30230ddb2e99d589297d534b62286fda3f98093979629a9c4ea5a08d862be971ec5aea2657eea7857b033320391f32c5f09400cf53fef5d971844b4d63d2ac9403d3108b1c0a05e56ce0c565702b0da1d0ba42eb4552a9933d06d"], 0xf5) syz_genetlink_get_family_id$ipvs(&(0x7f00000006c0)='IPVS\x00') 04:38:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) ioctl$VT_ACTIVATE(r0, 0x5606, 0x9) mount(&(0x7f000091dff8), &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 04:38:25 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000010207031dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e28000000110affffba010000000009b3562406b20cd37ed01cc00000000000000000000000000000", 0x4c}], 0x1}, 0x0) 04:38:25 executing program 4: mkdir(&(0x7f0000000380)='./bus\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000140)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)={[{@upperdir={'upperdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}, 0x5c}]}) [ 223.303938] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 223.315066] netlink: 20 bytes leftover after parsing attributes in process `syz-executor3'. 04:38:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) ioctl$VT_ACTIVATE(r0, 0x5606, 0x9) mount(&(0x7f000091dff8), &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 04:38:25 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{&(0x7f0000000440)=@nfc_llcp, 0x80, &(0x7f0000001700)=[{&(0x7f0000000700)=""/4096, 0x1000}], 0x1, &(0x7f0000001740)=""/194, 0xc2}}], 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_tables_targets\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 04:38:25 executing program 4: mkdir(&(0x7f0000000380)='./bus\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000140)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)={[{@upperdir={'upperdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}, 0x5c}]}) 04:38:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8994, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000140)=@ethtool_gstrings}) close(r2) close(r1) 04:38:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) ioctl$VT_ACTIVATE(r0, 0x5606, 0x9) mount(&(0x7f000091dff8), &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 04:38:25 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000006380)=[{{0x0, 0x0, &(0x7f00000000c0)}}, {{&(0x7f0000000580)=@in={0x2, 0x0, @multicast2}, 0xd, &(0x7f00000004c0), 0x0, &(0x7f0000000080)}}], 0x800000000000046, 0x0) [ 223.828008] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 04:38:26 executing program 2: r0 = getpgrp(0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1}, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0xfffffc2d) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x0) 04:38:26 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8994, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000140)=@ethtool_gstrings}) close(r2) close(r1) 04:38:26 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000200)={0x77, 0x0, [0x4b564d01, 0x1, 0xc0010007]}) 04:38:26 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000006380)=[{{0x0, 0x0, &(0x7f00000000c0)}}, {{&(0x7f0000000580)=@in={0x2, 0x0, @multicast2}, 0xd, &(0x7f00000004c0), 0x0, &(0x7f0000000080)}}], 0x800000000000046, 0x0) 04:38:26 executing program 0: openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cgroup.max.descendants\x00', 0x2, 0x0) clone(0x2102801ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) prctl$setmm(0x26, 0x1, &(0x7f0000ffd000/0x3000)=nil) 04:38:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={"6c6f3a0100"}) 04:38:26 executing program 0: openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cgroup.max.descendants\x00', 0x2, 0x0) clone(0x2102801ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) prctl$setmm(0x26, 0x1, &(0x7f0000ffd000/0x3000)=nil) 04:38:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={"6c6f3a0100"}) 04:38:26 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000006380)=[{{0x0, 0x0, &(0x7f00000000c0)}}, {{&(0x7f0000000580)=@in={0x2, 0x0, @multicast2}, 0xd, &(0x7f00000004c0), 0x0, &(0x7f0000000080)}}], 0x800000000000046, 0x0) 04:38:26 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8994, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000140)=@ethtool_gstrings}) close(r2) close(r1) 04:38:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={"6c6f3a0100"}) 04:38:26 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000006380)=[{{0x0, 0x0, &(0x7f00000000c0)}}, {{&(0x7f0000000580)=@in={0x2, 0x0, @multicast2}, 0xd, &(0x7f00000004c0), 0x0, &(0x7f0000000080)}}], 0x800000000000046, 0x0) 04:38:27 executing program 2: r0 = getpgrp(0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1}, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0xfffffc2d) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x0) 04:38:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000440)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000006c0), &(0x7f0000000700)=0x8) 04:38:27 executing program 0: openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cgroup.max.descendants\x00', 0x2, 0x0) clone(0x2102801ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) prctl$setmm(0x26, 0x1, &(0x7f0000ffd000/0x3000)=nil) 04:38:27 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8994, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000140)=@ethtool_gstrings}) close(r2) close(r1) 04:38:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={"6c6f3a0100"}) 04:38:27 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") unshare(0x400) getsockopt$inet6_mreq(r0, 0x29, 0x4d, &(0x7f0000001240)={@local}, &(0x7f0000001280)=0x14) 04:38:27 executing program 0: openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cgroup.max.descendants\x00', 0x2, 0x0) clone(0x2102801ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) prctl$setmm(0x26, 0x1, &(0x7f0000ffd000/0x3000)=nil) 04:38:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x5, 0x301000) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000240)=0xac) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe) msgget(0x3, 0x100) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000004740)=[{{&(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000840)=""/82, 0x52}, {&(0x7f0000000940)=""/191, 0x200009ff}], 0x2, &(0x7f0000000ec0)=""/210, 0x9e}}], 0x1, 0x0, &(0x7f0000004840)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000003c0)={0x0, 0x9, 0x0, 0x2, 0x0, 0x7f, 0x4, 0x2cb6}, &(0x7f0000000400)=0x20) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r5, 0x0) write$binfmt_misc(r5, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x179) io_setup(0x3ff, &(0x7f0000000040)=0x0) sendfile(r1, r5, &(0x7f0000000100), 0x54) io_submit(r6, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2000000000000000, 0xd, 0x0, 0x0, r4, &(0x7f0000000000), 0xfffffce4}]) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x6, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000180), &(0x7f0000000300)=0x8) fdatasync(r5) 04:38:27 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") unshare(0x400) getsockopt$inet6_mreq(r0, 0x29, 0x4d, &(0x7f0000001240)={@local}, &(0x7f0000001280)=0x14) 04:38:27 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @dev, [], {@arp={0x806, @ether_ipv4={0x4, 0x800, 0x6, 0x4, 0x0, @random="f8bf88df5b1b", @remote, @dev, @rand_addr}}}}, &(0x7f0000000100)) [ 225.283467] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 04:38:27 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000005c0)="0a5c2d0240316285717070") creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_open_dev$rtc(&(0x7f0000000140)='/dev/rtc#\x00', 0x5, 0x0) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040), &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f0000000080)={r1, 0x2}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x10, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 04:38:27 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") unshare(0x400) getsockopt$inet6_mreq(r0, 0x29, 0x4d, &(0x7f0000001240)={@local}, &(0x7f0000001280)=0x14) [ 225.481797] rpcbind: RPC call returned error 22 [ 225.529365] rpcbind: RPC call returned error 22 04:38:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000440)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000006c0), &(0x7f0000000700)=0x8) 04:38:28 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @dev, [], {@arp={0x806, @ether_ipv4={0x4, 0x800, 0x6, 0x4, 0x0, @random="f8bf88df5b1b", @remote, @dev, @rand_addr}}}}, &(0x7f0000000100)) 04:38:28 executing program 0: syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0xa00) connect$rds(r0, &(0x7f0000000100)={0x2, 0x0, @multicast2}, 0x10) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sendmsg$rds(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000840), 0x0, &(0x7f00000002c0)=[@mask_cswp={0x58, 0x114, 0x9, {{}, &(0x7f0000000e80), &(0x7f0000000ec0), 0x0, 0x0, 0x0, 0x0, 0xffffff7f}}], 0x58}, 0x0) 04:38:28 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") unshare(0x400) getsockopt$inet6_mreq(r0, 0x29, 0x4d, &(0x7f0000001240)={@local}, &(0x7f0000001280)=0x14) 04:38:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x5, 0x301000) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000240)=0xac) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe) msgget(0x3, 0x100) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000004740)=[{{&(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000840)=""/82, 0x52}, {&(0x7f0000000940)=""/191, 0x200009ff}], 0x2, &(0x7f0000000ec0)=""/210, 0x9e}}], 0x1, 0x0, &(0x7f0000004840)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000003c0)={0x0, 0x9, 0x0, 0x2, 0x0, 0x7f, 0x4, 0x2cb6}, &(0x7f0000000400)=0x20) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r5, 0x0) write$binfmt_misc(r5, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x179) io_setup(0x3ff, &(0x7f0000000040)=0x0) sendfile(r1, r5, &(0x7f0000000100), 0x54) io_submit(r6, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2000000000000000, 0xd, 0x0, 0x0, r4, &(0x7f0000000000), 0xfffffce4}]) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x6, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000180), &(0x7f0000000300)=0x8) fdatasync(r5) 04:38:28 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)=@req3, 0xfeda) r0 = syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f00000002c0)=0x80) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, &(0x7f0000000000), 0xc) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xf30e020000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='pagemap\x00') mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r2, 0x0) 04:38:28 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r2, &(0x7f0000000040)=""/203, 0xcb, 0x2, &(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syz_tun\x00'}}, 0x707000) setsockopt$sock_int(r2, 0x1, 0x2a, &(0x7f00000004c0)=0x4, 0x4) sendmmsg(r1, &(0x7f0000000000)=[{}], 0x400000000000234, 0x0) write(r1, &(0x7f0000000380)="e71a3827c2", 0x5) 04:38:28 executing program 0: syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0xa00) connect$rds(r0, &(0x7f0000000100)={0x2, 0x0, @multicast2}, 0x10) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sendmsg$rds(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000840), 0x0, &(0x7f00000002c0)=[@mask_cswp={0x58, 0x114, 0x9, {{}, &(0x7f0000000e80), &(0x7f0000000ec0), 0x0, 0x0, 0x0, 0x0, 0xffffff7f}}], 0x58}, 0x0) 04:38:28 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @dev, [], {@arp={0x806, @ether_ipv4={0x4, 0x800, 0x6, 0x4, 0x0, @random="f8bf88df5b1b", @remote, @dev, @rand_addr}}}}, &(0x7f0000000100)) [ 226.053276] atomic_op 00000000d6fcd7ac conn xmit_atomic (null) [ 226.102332] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 04:38:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000440)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000006c0), &(0x7f0000000700)=0x8) 04:38:28 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @dev, [], {@arp={0x806, @ether_ipv4={0x4, 0x800, 0x6, 0x4, 0x0, @random="f8bf88df5b1b", @remote, @dev, @rand_addr}}}}, &(0x7f0000000100)) 04:38:28 executing program 0: syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0xa00) connect$rds(r0, &(0x7f0000000100)={0x2, 0x0, @multicast2}, 0x10) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sendmsg$rds(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000840), 0x0, &(0x7f00000002c0)=[@mask_cswp={0x58, 0x114, 0x9, {{}, &(0x7f0000000e80), &(0x7f0000000ec0), 0x0, 0x0, 0x0, 0x0, 0xffffff7f}}], 0x58}, 0x0) [ 226.252861] atomic_op 00000000bd384f8c conn xmit_atomic (null) 04:38:28 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r2, &(0x7f0000000040)=""/203, 0xcb, 0x2, &(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syz_tun\x00'}}, 0x707000) setsockopt$sock_int(r2, 0x1, 0x2a, &(0x7f00000004c0)=0x4, 0x4) sendmmsg(r1, &(0x7f0000000000)=[{}], 0x400000000000234, 0x0) write(r1, &(0x7f0000000380)="e71a3827c2", 0x5) 04:38:28 executing program 3: syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0xa00) connect$rds(r0, &(0x7f0000000100)={0x2, 0x0, @multicast2}, 0x10) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sendmsg$rds(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000840), 0x0, &(0x7f00000002c0)=[@mask_cswp={0x58, 0x114, 0x9, {{}, &(0x7f0000000e80), &(0x7f0000000ec0), 0x0, 0x0, 0x0, 0x0, 0xffffff7f}}], 0x58}, 0x0) 04:38:28 executing program 0: syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0xa00) connect$rds(r0, &(0x7f0000000100)={0x2, 0x0, @multicast2}, 0x10) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sendmsg$rds(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000840), 0x0, &(0x7f00000002c0)=[@mask_cswp={0x58, 0x114, 0x9, {{}, &(0x7f0000000e80), &(0x7f0000000ec0), 0x0, 0x0, 0x0, 0x0, 0xffffff7f}}], 0x58}, 0x0) [ 226.411946] atomic_op 00000000fa1b3f4d conn xmit_atomic (null) 04:38:28 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r2, &(0x7f0000000040)=""/203, 0xcb, 0x2, &(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syz_tun\x00'}}, 0x707000) setsockopt$sock_int(r2, 0x1, 0x2a, &(0x7f00000004c0)=0x4, 0x4) sendmmsg(r1, &(0x7f0000000000)=[{}], 0x400000000000234, 0x0) write(r1, &(0x7f0000000380)="e71a3827c2", 0x5) 04:38:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x5, 0x301000) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000240)=0xac) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe) msgget(0x3, 0x100) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000004740)=[{{&(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000840)=""/82, 0x52}, {&(0x7f0000000940)=""/191, 0x200009ff}], 0x2, &(0x7f0000000ec0)=""/210, 0x9e}}], 0x1, 0x0, &(0x7f0000004840)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000003c0)={0x0, 0x9, 0x0, 0x2, 0x0, 0x7f, 0x4, 0x2cb6}, &(0x7f0000000400)=0x20) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r5, 0x0) write$binfmt_misc(r5, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x179) io_setup(0x3ff, &(0x7f0000000040)=0x0) sendfile(r1, r5, &(0x7f0000000100), 0x54) io_submit(r6, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2000000000000000, 0xd, 0x0, 0x0, r4, &(0x7f0000000000), 0xfffffce4}]) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x6, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000180), &(0x7f0000000300)=0x8) fdatasync(r5) [ 226.468813] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 226.508587] atomic_op 000000005086af45 conn xmit_atomic (null) [ 226.610940] atomic_op 0000000075d11cec conn xmit_atomic (null) 04:38:28 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xffffffffffffffeb) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000a80)) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000b00)={0x0, 0x10}) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xe15, 0x0) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000100)={0x5, 0x2, 0x1}) syz_open_procfs(0x0, &(0x7f0000000ac0)='coredump_filter\x00') close(r1) 04:38:28 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r2, &(0x7f0000000040)=""/203, 0xcb, 0x2, &(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syz_tun\x00'}}, 0x707000) setsockopt$sock_int(r2, 0x1, 0x2a, &(0x7f00000004c0)=0x4, 0x4) sendmmsg(r1, &(0x7f0000000000)=[{}], 0x400000000000234, 0x0) write(r1, &(0x7f0000000380)="e71a3827c2", 0x5) 04:38:28 executing program 3: syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0xa00) connect$rds(r0, &(0x7f0000000100)={0x2, 0x0, @multicast2}, 0x10) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sendmsg$rds(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000840), 0x0, &(0x7f00000002c0)=[@mask_cswp={0x58, 0x114, 0x9, {{}, &(0x7f0000000e80), &(0x7f0000000ec0), 0x0, 0x0, 0x0, 0x0, 0xffffff7f}}], 0x58}, 0x0) 04:38:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000440)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000006c0), &(0x7f0000000700)=0x8) 04:38:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6}, &(0x7f0000000000)=0x84) 04:38:29 executing program 3: syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0xa00) connect$rds(r0, &(0x7f0000000100)={0x2, 0x0, @multicast2}, 0x10) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sendmsg$rds(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000840), 0x0, &(0x7f00000002c0)=[@mask_cswp={0x58, 0x114, 0x9, {{}, &(0x7f0000000e80), &(0x7f0000000ec0), 0x0, 0x0, 0x0, 0x0, 0xffffff7f}}], 0x58}, 0x0) [ 226.953577] atomic_op 00000000006d9222 conn xmit_atomic (null) 04:38:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x5, 0x301000) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000240)=0xac) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe) msgget(0x3, 0x100) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000004740)=[{{&(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000840)=""/82, 0x52}, {&(0x7f0000000940)=""/191, 0x200009ff}], 0x2, &(0x7f0000000ec0)=""/210, 0x9e}}], 0x1, 0x0, &(0x7f0000004840)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000003c0)={0x0, 0x9, 0x0, 0x2, 0x0, 0x7f, 0x4, 0x2cb6}, &(0x7f0000000400)=0x20) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r5, 0x0) write$binfmt_misc(r5, &(0x7f0000000a00)=ANY=[@ANYBLOB="c80800000027b1ffde8363a04cab58ac3778ea731060e4baaf78966773efb9e4b69eb003cbf246e82f61465e164809c5fc6a073b64293c2bab0913224630b67781cfdf21a60603c1be3ed1757c78afd7d29939cd394702e3aeaa4089f35ac9fe297e4a25425df2413f3bd5a69453dcbceba6bbfb9c527ac1004fc77f7e5676a40c46c829bacf893aa84de60f0b488dc3c349cda1cccfde15ddfdde64f2e10c5f865b016f1c23357783ef6f95c892895a2135da944babc0077104e59a4a7378de4605a8e075decdb46bb9429d925eae1da173e46e3f09c78ebaab239804d2f0504df5a4b70477ab9d1ca147374596d8ce4a88128cd54d550b9a918265bdd8f133e66271a639e009519c9b10b279693fd3cd553ee60cf51cd2def9d1069d8cfee86aaea02aff781521c6b4de7b549c903b5bc35875b42b3d9e4f80172e54f0e3b718dff4c4f5583686e5b9a52593da5d2a2c21c586347e4eaff392e20567b78cab68fa4956f08ca6f0389188d7d05bb607d6044a40ebff404a3f"], 0x179) io_setup(0x3ff, &(0x7f0000000040)=0x0) sendfile(r1, r5, &(0x7f0000000100), 0x54) io_submit(r6, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2000000000000000, 0xd, 0x0, 0x0, r4, &(0x7f0000000000), 0xfffffce4}]) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x6, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000180), &(0x7f0000000300)=0x8) fdatasync(r5) 04:38:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6}, &(0x7f0000000000)=0x84) 04:38:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) [ 227.153325] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 227.195024] atomic_op 000000009e4e3957 conn xmit_atomic (null) 04:38:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6}, &(0x7f0000000000)=0x84) 04:38:29 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) readv(r0, &(0x7f00000012c0)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1) 04:38:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) 04:38:29 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xffffffffffffffeb) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000a80)) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000b00)={0x0, 0x10}) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xe15, 0x0) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000100)={0x5, 0x2, 0x1}) syz_open_procfs(0x0, &(0x7f0000000ac0)='coredump_filter\x00') close(r1) 04:38:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6}, &(0x7f0000000000)=0x84) 04:38:29 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) readv(r0, &(0x7f00000012c0)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1) 04:38:29 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) readv(r0, &(0x7f00000012c0)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1) 04:38:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) 04:38:29 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xffffffffffffffeb) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000a80)) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000b00)={0x0, 0x10}) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xe15, 0x0) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000100)={0x5, 0x2, 0x1}) syz_open_procfs(0x0, &(0x7f0000000ac0)='coredump_filter\x00') close(r1) 04:38:29 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) readv(r0, &(0x7f00000012c0)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1) 04:38:29 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@remote}, 0x20) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000000)=""/246) 04:38:29 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) readv(r0, &(0x7f00000012c0)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1) 04:38:29 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xffffffffffffffeb) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000a80)) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000b00)={0x0, 0x10}) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xe15, 0x0) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000100)={0x5, 0x2, 0x1}) syz_open_procfs(0x0, &(0x7f0000000ac0)='coredump_filter\x00') close(r1) 04:38:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) 04:38:29 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) readv(r0, &(0x7f00000012c0)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1) 04:38:29 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xffffffffffffffeb) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000a80)) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000b00)={0x0, 0x10}) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xe15, 0x0) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000100)={0x5, 0x2, 0x1}) syz_open_procfs(0x0, &(0x7f0000000ac0)='coredump_filter\x00') close(r1) 04:38:30 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) readv(r0, &(0x7f00000012c0)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1) 04:38:30 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000140)) 04:38:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x7}, 0xffffffffffffff13) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x200002, 0x0) 04:38:30 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@remote}, 0x20) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000000)=""/246) 04:38:30 executing program 5: rt_sigtimedwait(&(0x7f0000000100), &(0x7f0000000140), 0xffffffffffffffff, 0x8) 04:38:30 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_ifreq(r0, 0x8948, &(0x7f0000000000)={'gre0\x00', @ifru_addrs=@in={0x2, 0x4e20, @rand_addr}}) 04:38:30 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xffffffffffffffeb) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000a80)) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000b00)={0x0, 0x10}) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xe15, 0x0) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000100)={0x5, 0x2, 0x1}) syz_open_procfs(0x0, &(0x7f0000000ac0)='coredump_filter\x00') close(r1) 04:38:30 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xffffffffffffffeb) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000a80)) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000b00)={0x0, 0x10}) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xe15, 0x0) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000100)={0x5, 0x2, 0x1}) syz_open_procfs(0x0, &(0x7f0000000ac0)='coredump_filter\x00') close(r1) 04:38:30 executing program 5: rt_sigtimedwait(&(0x7f0000000100), &(0x7f0000000140), 0xffffffffffffffff, 0x8) 04:38:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0xfffffff0}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x28, 0xb01, 0x0, 0x0, {0x10}}, 0x165}}, 0x0) syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0xfffffffffffff921, 0x8000) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000002c0)={@mcast1}) 04:38:30 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@remote}, 0x20) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000000)=""/246) 04:38:30 executing program 5: rt_sigtimedwait(&(0x7f0000000100), &(0x7f0000000140), 0xffffffffffffffff, 0x8) 04:38:30 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x4, &(0x7f0000000080)={@loopback}, 0x20) 04:38:30 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdir(&(0x7f0000027000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000003) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000140), 0x8800000) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000080)) mount$9p_tcp(&(0x7f0000000180)='-27.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x0, &(0x7f0000000480)={'trans=tcp,', {'port'}}) fcntl$addseals(r0, 0x409, 0x8) 04:38:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x7}, 0xffffffffffffff13) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x200002, 0x0) 04:38:30 executing program 5: rt_sigtimedwait(&(0x7f0000000100), &(0x7f0000000140), 0xffffffffffffffff, 0x8) 04:38:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0xfffffff0}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x28, 0xb01, 0x0, 0x0, {0x10}}, 0x165}}, 0x0) syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0xfffffffffffff921, 0x8000) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000002c0)={@mcast1}) 04:38:30 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x4, &(0x7f0000000080)={@loopback}, 0x20) [ 228.896351] 9pnet: p9_fd_create_tcp (7815): problem connecting socket to -27.0.0.1 04:38:31 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@remote}, 0x20) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000000)=""/246) 04:38:31 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x4281) 04:38:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0xfffffff0}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x28, 0xb01, 0x0, 0x0, {0x10}}, 0x165}}, 0x0) syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0xfffffffffffff921, 0x8000) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000002c0)={@mcast1}) [ 229.065549] 9pnet: p9_fd_create_tcp (7806): problem connecting socket to -27.0.0.1 04:38:31 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x4, &(0x7f0000000080)={@loopback}, 0x20) 04:38:31 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x4281) 04:38:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x7}, 0xffffffffffffff13) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x200002, 0x0) 04:38:31 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x4, &(0x7f0000000080)={@loopback}, 0x20) 04:38:31 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdir(&(0x7f0000027000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000003) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000140), 0x8800000) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000080)) mount$9p_tcp(&(0x7f0000000180)='-27.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x0, &(0x7f0000000480)={'trans=tcp,', {'port'}}) fcntl$addseals(r0, 0x409, 0x8) 04:38:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0xfffffff0}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x28, 0xb01, 0x0, 0x0, {0x10}}, 0x165}}, 0x0) syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0xfffffffffffff921, 0x8000) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000002c0)={@mcast1}) 04:38:31 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x4281) 04:38:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r0, &(0x7f0000000000)={'syz0'}, 0x4) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") writev(r0, &(0x7f0000000140)=[{&(0x7f0000000280)="480000001500199009004b0101048c590a880900000000000000fe5f0028213ee20600d4ff5bffff00c7e5ed5e00000000c80000000000000000f5ffffffffffffff00eaf60d1812", 0x48}], 0x1) [ 229.423463] 9pnet: p9_fd_create_tcp (7854): problem connecting socket to -27.0.0.1 04:38:31 executing program 4: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@nat={'nat\x00', 0x19, 0x1, 0x9e8, [0x20000580, 0x0, 0x0, 0x200005b0, 0x200005e0], 0x0, &(0x7f0000000040), &(0x7f0000000580)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, "2c6f7365000b0000000054f139580800", 'veth0\x00', 'syzkaller0\x00', 'ifb0\x00', @dev, [], @empty, [], 0x928, 0x928, 0x958, [@devgroup={'devgroup\x00', 0x18}, @among={'among\x00', 0x850, {{0x0, 0x7ff, 0x0, {[], 0x3, [{[], @local}, {}, {[], @multicast1}]}, {[], 0x1, [{[], @local}]}}}}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0xa60) 04:38:31 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x800000000000a, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000140)={{0x2}}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x0, &(0x7f0000000340), &(0x7f0000000100), &(0x7f0000000240), &(0x7f0000000140)) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0xc0145401, &(0x7f0000000140)) 04:38:31 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x4281) [ 229.570969] syz-executor0 uses obsolete (PF_INET,SOCK_PACKET) 04:38:31 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdir(&(0x7f0000027000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000003) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000140), 0x8800000) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000080)) mount$9p_tcp(&(0x7f0000000180)='-27.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x0, &(0x7f0000000480)={'trans=tcp,', {'port'}}) fcntl$addseals(r0, 0x409, 0x8) 04:38:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x7}, 0xffffffffffffff13) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x200002, 0x0) 04:38:31 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x800000000000a, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000140)={{0x2}}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x0, &(0x7f0000000340), &(0x7f0000000100), &(0x7f0000000240), &(0x7f0000000140)) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0xc0145401, &(0x7f0000000140)) 04:38:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r0, &(0x7f0000000000)={'syz0'}, 0x4) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") writev(r0, &(0x7f0000000140)=[{&(0x7f0000000280)="480000001500199009004b0101048c590a880900000000000000fe5f0028213ee20600d4ff5bffff00c7e5ed5e00000000c80000000000000000f5ffffffffffffff00eaf60d1812", 0x48}], 0x1) 04:38:31 executing program 4: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@nat={'nat\x00', 0x19, 0x1, 0x9e8, [0x20000580, 0x0, 0x0, 0x200005b0, 0x200005e0], 0x0, &(0x7f0000000040), &(0x7f0000000580)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, "2c6f7365000b0000000054f139580800", 'veth0\x00', 'syzkaller0\x00', 'ifb0\x00', @dev, [], @empty, [], 0x928, 0x928, 0x958, [@devgroup={'devgroup\x00', 0x18}, @among={'among\x00', 0x850, {{0x0, 0x7ff, 0x0, {[], 0x3, [{[], @local}, {}, {[], @multicast1}]}, {[], 0x1, [{[], @local}]}}}}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0xa60) 04:38:31 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') flock(r0, 0xffffffffffffffff) preadv(r1, &(0x7f0000000480), 0x100000000000021c, 0x0) 04:38:31 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdir(&(0x7f0000027000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000003) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000140), 0x8800000) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000080)) mount$9p_tcp(&(0x7f0000000180)='-27.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x0, &(0x7f0000000480)={'trans=tcp,', {'port'}}) fcntl$addseals(r0, 0x409, 0x8) [ 229.877370] 9pnet: p9_fd_create_tcp (7886): problem connecting socket to -27.0.0.1 04:38:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r0, &(0x7f0000000000)={'syz0'}, 0x4) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") writev(r0, &(0x7f0000000140)=[{&(0x7f0000000280)="480000001500199009004b0101048c590a880900000000000000fe5f0028213ee20600d4ff5bffff00c7e5ed5e00000000c80000000000000000f5ffffffffffffff00eaf60d1812", 0x48}], 0x1) [ 229.982307] kasan: CONFIG_KASAN_INLINE enabled [ 229.986945] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 230.005551] kasan: CONFIG_KASAN_INLINE enabled [ 230.018373] kasan: CONFIG_KASAN_INLINE enabled [ 230.023126] kasan: GPF could be caused by NULL-ptr deref or user memory access 04:38:32 executing program 4: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@nat={'nat\x00', 0x19, 0x1, 0x9e8, [0x20000580, 0x0, 0x0, 0x200005b0, 0x200005e0], 0x0, &(0x7f0000000040), &(0x7f0000000580)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, "2c6f7365000b0000000054f139580800", 'veth0\x00', 'syzkaller0\x00', 'ifb0\x00', @dev, [], @empty, [], 0x928, 0x928, 0x958, [@devgroup={'devgroup\x00', 0x18}, @among={'among\x00', 0x850, {{0x0, 0x7ff, 0x0, {[], 0x3, [{[], @local}, {}, {[], @multicast1}]}, {[], 0x1, [{[], @local}]}}}}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0xa60) [ 230.034960] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 230.041217] CPU: 1 PID: 5690 Comm: udevd Not tainted 4.20.0-rc1-next-20181107+ #107 [ 230.049021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 230.058424] RIP: 0010:locks_remove_flock+0x216/0x350 [ 230.063543] Code: 00 0f 85 3a 01 00 00 48 8b 5b 98 48 85 db 74 3a e8 1f 41 92 ff 48 8d 7b 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 17 01 00 00 48 8b 5b 08 48 85 db 74 0d e8 f2 40 04:38:32 executing program 4: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@nat={'nat\x00', 0x19, 0x1, 0x9e8, [0x20000580, 0x0, 0x0, 0x200005b0, 0x200005e0], 0x0, &(0x7f0000000040), &(0x7f0000000580)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, "2c6f7365000b0000000054f139580800", 'veth0\x00', 'syzkaller0\x00', 'ifb0\x00', @dev, [], @empty, [], 0x928, 0x928, 0x958, [@devgroup={'devgroup\x00', 0x18}, @among={'among\x00', 0x850, {{0x0, 0x7ff, 0x0, {[], 0x3, [{[], @local}, {}, {[], @multicast1}]}, {[], 0x1, [{[], @local}]}}}}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0xa60) [ 230.082448] RSP: 0018:ffff8801bab5f880 EFLAGS: 00010202 [ 230.087818] RAX: dffffc0000000000 RBX: 0000000041b58ab3 RCX: ffffffff81ed555d [ 230.095106] RDX: 000000000836b157 RSI: ffffffff81ed5c71 RDI: 0000000041b58abb [ 230.102382] RBP: ffff8801bab5fa60 R08: ffff8801ba9c8240 R09: ffffed003b5e5b67 [ 230.109662] R10: ffffed003b5e5b67 R11: ffff8801daf2db3b R12: ffff8801c938fac0 [ 230.116960] R13: ffff8801bab5f8f8 R14: 1ffff1003756bf13 R15: dffffc0000000000 [ 230.124243] FS: 00007fef5230a7a0(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 04:38:32 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@link_local, @link_local, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @local, @loopback, @broadcast, @dev}}}}, &(0x7f0000000080)) [ 230.132472] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 230.138353] CR2: 00007ffe14bf2c40 CR3: 00000001d8be1000 CR4: 00000000001406e0 [ 230.145625] Call Trace: [ 230.148256] ? flock_lock_inode+0x11c0/0x11c0 [ 230.152771] ? mark_held_locks+0x130/0x130 [ 230.157053] ? __handle_mm_fault+0xa57/0x5be0 [ 230.161570] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 230.167121] ? locks_remove_posix+0x486/0x850 [ 230.171625] ? vfs_lock_file+0xe0/0xe0 [ 230.172821] kasan: GPF could be caused by NULL-ptr deref or user memory access 04:38:32 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@link_local, @link_local, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @local, @loopback, @broadcast, @dev}}}}, &(0x7f0000000080)) [ 230.175520] ? lock_downgrade+0x900/0x900 [ 230.175540] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 230.175557] locks_remove_file+0x148/0x5c0 [ 230.175574] ? fcntl_setlk+0xfc0/0xfc0 [ 230.189754] kobject: 'loop4' (00000000163f2ab8): kobject_uevent_env [ 230.192622] ? fsnotify_first_mark+0x350/0x350 [ 230.196857] kobject: 'loop4' (00000000163f2ab8): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 230.200731] ? __fsnotify_parent+0xcc/0x420 [ 230.200745] ? perf_trace_sched_process_exec+0x860/0x860 [ 230.200758] ? fsnotify+0xf20/0xf20 [ 230.200775] ? __might_sleep+0x95/0x190 [ 230.226211] kasan: CONFIG_KASAN_INLINE enabled [ 230.230935] __fput+0x2f0/0xa70 [ 230.230967] ? get_max_files+0x20/0x20 [ 230.230983] ? trace_hardirqs_on+0xbd/0x310 [ 230.230999] ? kasan_check_read+0x11/0x20 [ 230.231018] ? task_work_run+0x1af/0x2a0 [ 230.262815] ? trace_hardirqs_off_caller+0x300/0x300 [ 230.267943] ? filp_close+0x1cd/0x250 [ 230.271750] ____fput+0x15/0x20 [ 230.275032] task_work_run+0x1e8/0x2a0 [ 230.278935] ? task_work_cancel+0x240/0x240 [ 230.283265] ? copy_fd_bitmaps+0x210/0x210 [ 230.287515] ? do_syscall_64+0x9a/0x820 [ 230.291510] exit_to_usermode_loop+0x318/0x380 [ 230.296115] ? __bpf_trace_sys_exit+0x30/0x30 [ 230.300616] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 230.306159] do_syscall_64+0x6be/0x820 [ 230.310057] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 230.315427] ? syscall_return_slowpath+0x5e0/0x5e0 [ 230.320359] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 230.325207] ? trace_hardirqs_on_caller+0x310/0x310 [ 230.330239] ? prepare_exit_to_usermode+0x291/0x3b0 [ 230.335260] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 230.340114] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 230.345306] RIP: 0033:0x7fef51a122b0 [ 230.349023] Code: 40 75 0b 31 c0 48 83 c4 08 e9 0c ff ff ff 48 8d 3d c5 32 08 00 e8 c0 07 02 00 83 3d 45 a3 2b 00 00 75 10 b8 03 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 ce 8a 01 00 48 89 04 24 [ 230.367930] RSP: 002b:00007ffe14bef9e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 230.375638] RAX: 0000000000000000 RBX: 0000000001ae1250 RCX: 00007fef51a122b0 [ 230.382906] RDX: 00007ffe14bf2c40 RSI: 0000000000000002 RDI: 0000000000000007 [ 230.390194] RBP: 0000000000625500 R08: 00007ffe14bfb0b0 R09: 00007ffe14bfb080 [ 230.397461] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe14befac0 [ 230.404728] R13: 0000000000000001 R14: 00007ffe14befa54 R15: 0000000001ae1250 [ 230.411998] Modules linked in: [ 230.415234] general protection fault: 0000 [#2] PREEMPT SMP KASAN [ 230.421491] CPU: 0 PID: 7889 Comm: syz-executor5 Tainted: G D 4.20.0-rc1-next-20181107+ #107 [ 230.431371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 230.440738] RIP: 0010:locks_remove_flock+0x216/0x350 [ 230.445846] Code: 00 0f 85 3a 01 00 00 48 8b 5b 98 48 85 db 74 3a e8 1f 41 92 ff 48 8d 7b 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 17 01 00 00 48 8b 5b 08 48 85 db 74 0d e8 f2 40 [ 230.464769] RSP: 0018:ffff880184e17880 EFLAGS: 00010202 [ 230.470134] RAX: dffffc0000000000 RBX: 0000000041b58ab3 RCX: ffffffff81ed555d [ 230.477401] RDX: 000000000836b157 RSI: ffffffff81ed5c71 RDI: 0000000041b58abb [ 230.484671] RBP: ffff880184e17a60 R08: ffff880184e08080 R09: ffffed003b5e5b67 [ 230.491953] R10: ffffed003b5e5b67 R11: ffff8801daf2db3b R12: ffff8801c27345c0 [ 230.499224] R13: ffff880184e178f8 R14: 1ffff100309c2f13 R15: dffffc0000000000 [ 230.506496] FS: 0000000002706940(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 230.514741] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 230.520628] CR2: 000000000072c000 CR3: 00000001bc3b3000 CR4: 00000000001406f0 [ 230.527906] Call Trace: [ 230.530514] ? flock_lock_inode+0x11c0/0x11c0 [ 230.535015] ? mark_held_locks+0x130/0x130 [ 230.539264] ? wake_up_new_task+0x6f7/0xcf0 [ 230.543592] ? exit_robust_list+0x280/0x280 [ 230.547924] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 230.552512] ? trace_hardirqs_on+0xbd/0x310 [ 230.556849] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 230.562401] ? locks_remove_posix+0x486/0x850 [ 230.566913] ? trace_hardirqs_off_caller+0x300/0x300 [ 230.572029] ? vfs_lock_file+0xe0/0xe0 [ 230.575935] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 230.581477] locks_remove_file+0x148/0x5c0 [ 230.585716] ? fcntl_setlk+0xfc0/0xfc0 [ 230.589607] ? fsnotify_first_mark+0x350/0x350 [ 230.594211] ? __fsnotify_parent+0xcc/0x420 [ 230.598537] ? perf_trace_sched_process_exec+0x860/0x860 [ 230.603988] ? fsnotify+0xf20/0xf20 [ 230.607618] ? __might_sleep+0x95/0x190 [ 230.611598] __fput+0x2f0/0xa70 [ 230.614887] ? get_max_files+0x20/0x20 [ 230.618783] ? trace_hardirqs_on+0xbd/0x310 [ 230.623110] ? kasan_check_read+0x11/0x20 [ 230.627273] ? task_work_run+0x1af/0x2a0 [ 230.631338] ? trace_hardirqs_off_caller+0x300/0x300 [ 230.636446] ? filp_close+0x1cd/0x250 [ 230.640257] ____fput+0x15/0x20 [ 230.643542] task_work_run+0x1e8/0x2a0 [ 230.647435] ? task_work_cancel+0x240/0x240 [ 230.651758] ? copy_fd_bitmaps+0x210/0x210 [ 230.655998] ? do_syscall_64+0x9a/0x820 [ 230.659990] exit_to_usermode_loop+0x318/0x380 [ 230.664576] ? __bpf_trace_sys_exit+0x30/0x30 [ 230.669080] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 230.674632] do_syscall_64+0x6be/0x820 [ 230.678527] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 230.683895] ? syscall_return_slowpath+0x5e0/0x5e0 [ 230.688832] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 230.693700] ? trace_hardirqs_on_caller+0x310/0x310 [ 230.698747] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 230.703768] ? prepare_exit_to_usermode+0x291/0x3b0 [ 230.708797] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 230.713651] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 230.718838] RIP: 0033:0x411021 [ 230.722037] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 19 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 230.740941] RSP: 002b:00007ffd7529c5b0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 230.748646] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000411021 [ 230.755911] RDX: 0000000000000001 RSI: 0000000000730ac0 RDI: 0000000000000003 [ 230.763195] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 230.770461] R10: 00007ffd7529c4e0 R11: 0000000000000293 R12: 0000000000000000 [ 230.777739] R13: 0000000000000001 R14: 0000000000000017 R15: 0000000000000005 [ 230.785029] Modules linked in: [ 230.788244] general protection fault: 0000 [#3] PREEMPT SMP KASAN [ 230.794501] CPU: 1 PID: 5691 Comm: udevd Tainted: G D 4.20.0-rc1-next-20181107+ #107 [ 230.799494] kobject: 'loop4' (00000000163f2ab8): kobject_uevent_env [ 230.803691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 230.813278] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 230.819438] RIP: 0010:locks_remove_flock+0x216/0x350 [ 230.819454] Code: 00 0f 85 3a 01 00 00 48 8b 5b 98 48 85 db 74 3a e8 1f 41 92 ff 48 8d 7b 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 17 01 00 00 48 8b 5b 08 48 85 db 74 0d e8 f2 40 [ 230.819462] RSP: 0018:ffff8801be6a7880 EFLAGS: 00010202 [ 230.819474] RAX: dffffc0000000000 RBX: 0000000041b58ab3 RCX: ffffffff81ed555d [ 230.819482] RDX: 000000000836b157 RSI: ffffffff81ed5c71 RDI: 0000000041b58abb [ 230.819491] RBP: ffff8801be6a7a60 R08: ffff8801cd79a280 R09: ffffed003b5e5b67 [ 230.819500] R10: ffffed003b5e5b67 R11: ffff8801daf2db3b R12: ffff8801bafec040 [ 230.819514] R13: ffff8801be6a78f8 R14: 1ffff10037cd4f13 R15: dffffc0000000000 [ 230.828505] kobject: 'loop4' (00000000163f2ab8): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 230.831963] FS: 00007fef5230a7a0(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 230.831972] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 230.831981] CR2: 0000001b31c2b000 CR3: 00000001d86ed000 CR4: 00000000001406e0 [ 230.831990] Call Trace: [ 230.832009] ? flock_lock_inode+0x11c0/0x11c0 [ 230.832030] ? mark_held_locks+0x130/0x130 [ 230.934873] ? __handle_mm_fault+0xa57/0x5be0 [ 230.939373] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 230.944912] ? locks_remove_posix+0x486/0x850 [ 230.949421] ? vfs_lock_file+0xe0/0xe0 [ 230.953311] ? lock_downgrade+0x900/0x900 [ 230.957464] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 230.963009] locks_remove_file+0x148/0x5c0 [ 230.967252] ? fcntl_setlk+0xfc0/0xfc0 [ 230.971148] ? fsnotify_first_mark+0x350/0x350 [ 230.975733] ? __fsnotify_parent+0xcc/0x420 [ 230.980058] ? perf_trace_sched_process_exec+0x860/0x860 [ 230.985509] ? fsnotify+0xf20/0xf20 [ 230.989144] ? __might_sleep+0x95/0x190 [ 230.993125] __fput+0x2f0/0xa70 [ 230.996412] ? get_max_files+0x20/0x20 [ 231.000306] ? trace_hardirqs_on+0xbd/0x310 [ 231.004633] ? kasan_check_read+0x11/0x20 [ 231.008794] ? task_work_run+0x1af/0x2a0 [ 231.012871] ? trace_hardirqs_off_caller+0x300/0x300 [ 231.017995] ? filp_close+0x1cd/0x250 [ 231.021800] ____fput+0x15/0x20 [ 231.025091] task_work_run+0x1e8/0x2a0 [ 231.028979] ? task_work_cancel+0x240/0x240 [ 231.033300] ? copy_fd_bitmaps+0x210/0x210 [ 231.037534] ? do_syscall_64+0x9a/0x820 [ 231.041514] exit_to_usermode_loop+0x318/0x380 [ 231.046120] ? __bpf_trace_sys_exit+0x30/0x30 [ 231.050624] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 231.056183] do_syscall_64+0x6be/0x820 [ 231.060095] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 231.065481] ? syscall_return_slowpath+0x5e0/0x5e0 [ 231.070413] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 231.075260] ? trace_hardirqs_on_caller+0x310/0x310 [ 231.080280] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 231.085301] ? prepare_exit_to_usermode+0x291/0x3b0 [ 231.090323] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 231.095180] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 231.100370] RIP: 0033:0x7fef51a122b0 [ 231.104093] Code: 40 75 0b 31 c0 48 83 c4 08 e9 0c ff ff ff 48 8d 3d c5 32 08 00 e8 c0 07 02 00 83 3d 45 a3 2b 00 00 75 10 b8 03 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 ce 8a 01 00 48 89 04 24 [ 231.122996] RSP: 002b:00007ffe14bef9e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 231.130708] RAX: 0000000000000000 RBX: 0000000001ae1250 RCX: 00007fef51a122b0 [ 231.137981] RDX: 00007ffe14bf2c40 RSI: 0000000000000002 RDI: 0000000000000007 [ 231.145250] RBP: 0000000000625500 R08: 00007ffe14bfb0b0 R09: 00007ffe14bfb080 [ 231.152520] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe14befac0 [ 231.159786] R13: 0000000000000001 R14: 00007ffe14befa54 R15: 0000000001ae1250 [ 231.167082] Modules linked in: [ 231.170302] general protection fault: 0000 [#4] PREEMPT SMP KASAN [ 231.176555] CPU: 0 PID: 7886 Comm: syz-executor2 Tainted: G D 4.20.0-rc1-next-20181107+ #107 [ 231.186444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 231.195816] RIP: 0010:__x86_indirect_thunk_rbx+0x10/0x20 [ 231.201276] Code: 90 0f ae e8 eb f9 48 89 04 24 c3 0f 1f 44 00 00 66 2e 0f 1f 84 00 00 00 00 00 e8 07 00 00 00 f3 90 0f ae e8 eb f9 48 89 1c 24 0f 1f 44 00 00 66 2e 0f 1f 84 00 00 00 00 00 e8 07 00 00 00 f3 [ 231.207088] kasan: CONFIG_KASAN_INLINE enabled [ 231.220191] RSP: 0018:ffff88018488f2b0 EFLAGS: 00010293 [ 231.220204] RAX: ffff880184caa5c0 RBX: 08538b4811730443 RCX: ffffffff81ed555d [ 231.220212] RDX: 0000000000000000 RSI: ffffffff81ed5c9e RDI: ffff88018488f338 [ 231.220220] RBP: ffff88018488f4a0 R08: ffff880184caa5c0 R09: ffffed00381dfc2a [ 231.220228] R10: ffffed00381dfc2a R11: ffff8801c0efe153 R12: ffff8801b8c43780 [ 231.220237] R13: ffff88018488f338 R14: 1ffff10030911e5b R15: dffffc0000000000 [ 231.220253] FS: 00007efcd7b3f700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 231.252989] 9pnet: p9_fd_create_tcp (7912): problem connecting socket to -27.0.0.1 [ 231.259274] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 231.259283] CR2: 00007fff1e703808 CR3: 00000001bceca000 CR4: 00000000001406f0 [ 231.259292] Call Trace: [ 231.259313] ? locks_remove_flock+0x236/0x350 [ 231.259329] ? flock_lock_inode+0x11c0/0x11c0 [ 231.259345] ? kasan_check_read+0x11/0x20 [ 231.259359] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 231.259375] ? rcu_softirq_qs+0x20/0x20 [ 231.274687] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 231.274880] ? unwind_dump+0x190/0x190 [ 231.331865] ? is_bpf_text_address+0xd3/0x170 [ 231.336371] ? kernel_text_address+0x79/0xf0 [ 231.340805] ? __kernel_text_address+0xd/0x40 [ 231.345303] ? __save_stack_trace+0x8d/0xf0 [ 231.349657] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 231.355223] locks_remove_file+0x148/0x5c0 [ 231.359460] ? fcntl_setlk+0xfc0/0xfc0 [ 231.363344] ? kasan_slab_free+0xe/0x10 [ 231.367330] ? fsnotify_first_mark+0x350/0x350 [ 231.371933] ? __fsnotify_parent+0xcc/0x420 [ 231.376269] ? perf_trace_sched_process_exec+0x860/0x860 [ 231.381747] ? fsnotify+0xf20/0xf20 [ 231.385393] ? __might_sleep+0x95/0x190 [ 231.389379] __fput+0x2f0/0xa70 [ 231.392670] ? get_max_files+0x20/0x20 [ 231.396581] ? trace_hardirqs_on+0xbd/0x310 [ 231.400905] ? kasan_check_read+0x11/0x20 [ 231.405063] ? task_work_run+0x1af/0x2a0 [ 231.409129] ? trace_hardirqs_off_caller+0x300/0x300 [ 231.414231] ? free_nsproxy+0x1aa/0x220 [ 231.418223] ? trace_hardirqs_off_caller+0x300/0x300 [ 231.423332] ____fput+0x15/0x20 [ 231.426612] task_work_run+0x1e8/0x2a0 [ 231.430500] ? task_work_cancel+0x240/0x240 [ 231.434824] ? switch_task_namespaces+0xb8/0xd0 [ 231.439514] do_exit+0x1ad1/0x26d0 [ 231.443064] ? mm_update_next_owner+0x990/0x990 [ 231.447733] ? graph_lock+0x270/0x270 [ 231.451539] ? __sigqueue_free.part.29+0x74/0x90 [ 231.456297] ? graph_lock+0x270/0x270 [ 231.460098] ? kmem_cache_free+0x24f/0x290 [ 231.464337] ? graph_lock+0x270/0x270 [ 231.468140] ? __sigqueue_free.part.29+0x74/0x90 [ 231.472905] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 231.478456] ? check_preemption_disabled+0x48/0x280 [ 231.483480] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 231.489017] ? rcu_pm_notify+0xc0/0xc0 [ 231.492913] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 231.498462] ? fpu__initialize+0x101/0x740 [ 231.502697] ? kernel_fpu_begin+0x20/0x20 [ 231.506848] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 231.512389] ? check_preemption_disabled+0x48/0x280 [ 231.517415] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 231.522958] ? rcu_pm_notify+0xc0/0xc0 [ 231.526853] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 231.531875] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 231.537415] ? signal_setup_done+0xbb/0x2f0 [ 231.541735] ? set_current_blocked+0x40/0x40 [ 231.546150] ? do_signal+0x453/0x21c0 [ 231.549968] ? prepare_signal+0xe50/0xe50 [ 231.554122] ? setup_sigcontext+0x7d0/0x7d0 [ 231.558456] ? find_held_lock+0x36/0x1c0 [ 231.562522] ? exit_to_usermode_loop+0x8c/0x380 [ 231.567198] ? exit_to_usermode_loop+0x8c/0x380 [ 231.571873] do_group_exit+0x177/0x440 [ 231.575764] ? trace_hardirqs_on+0xbd/0x310 [ 231.580085] ? __ia32_sys_exit+0x50/0x50 [ 231.584148] ? trace_hardirqs_off_caller+0x300/0x300 [ 231.589260] ? trace_hardirqs_on+0xbd/0x310 [ 231.593588] __x64_sys_exit_group+0x3e/0x50 [ 231.597931] do_syscall_64+0x1b9/0x820 [ 231.601822] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 231.607193] ? syscall_return_slowpath+0x5e0/0x5e0 [ 231.612126] ? trace_hardirqs_on_caller+0x310/0x310 [ 231.617144] ? prepare_exit_to_usermode+0x291/0x3b0 [ 231.622174] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 231.627031] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 231.632220] RIP: 0033:0x457569 [ 231.635439] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 231.654352] RSP: 002b:00007efcd7b3e688 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 231.662074] RAX: ffffffffffffffda RBX: 000000000000000b RCX: 0000000000457569 [ 231.669367] RDX: 0000000000457569 RSI: 00007efcd7b3e6c0 RDI: 000000000000000b [ 231.676637] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 231.683903] R10: 0000000020000480 R11: 0000000000000246 R12: 00007efcd7b3f6d4 04:38:33 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x800000000000a, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000140)={{0x2}}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x0, &(0x7f0000000340), &(0x7f0000000100), &(0x7f0000000240), &(0x7f0000000140)) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0xc0145401, &(0x7f0000000140)) [ 231.691177] R13: 00000000004c2b2c R14: 00000000004d41c8 R15: 00000000ffffffff [ 231.698503] Modules linked in: [ 231.701740] general protection fault: 0000 [#5] PREEMPT SMP KASAN [ 231.708010] CPU: 1 PID: 7875 Comm: syz-executor1 Tainted: G D 4.20.0-rc1-next-20181107+ #107 [ 231.717892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 231.725455] kobject: 'loop0' (0000000012f4416b): kobject_uevent_env [ 231.727284] RIP: 0010:locks_remove_flock+0x216/0x350 [ 231.727299] Code: 00 0f 85 3a 01 00 00 48 8b 5b 98 48 85 db 74 3a e8 1f 41 92 ff 48 8d 7b 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 17 01 00 00 48 8b 5b 08 48 85 db 74 0d e8 f2 40 [ 231.727312] RSP: 0018:ffff8801850bf880 EFLAGS: 00010202 [ 231.734134] kobject: 'loop0' (0000000012f4416b): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 231.738810] RAX: dffffc0000000000 RBX: 0000000041b58ab3 RCX: ffffffff81ed555d [ 231.738819] RDX: 000000000836b157 RSI: ffffffff81ed5c71 RDI: 0000000041b58abb [ 231.738827] RBP: ffff8801850bfa60 R08: ffff880185dbe380 R09: ffffed00381dfc2a [ 231.738836] R10: ffffed00381dfc2a R11: ffff8801c0efe153 R12: ffff8801bd4a5cc0 [ 231.738844] R13: ffff8801850bf8f8 R14: 1ffff10030a17f13 R15: dffffc0000000000 [ 231.738854] FS: 0000000000bfc940(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 231.738863] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 231.738877] CR2: 000000000297c914 CR3: 00000001d7c4d000 CR4: 00000000001406e0 [ 231.771300] kasan: CONFIG_KASAN_INLINE enabled [ 231.772560] Call Trace: [ 231.772581] ? flock_lock_inode+0x11c0/0x11c0 [ 231.772602] ? mark_held_locks+0x130/0x130 [ 231.780129] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 231.787146] ? __might_fault+0x1e0/0x1e0 [ 231.787165] ? _raw_spin_unlock+0x2c/0x50 [ 231.787184] ? __handle_mm_fault+0xa57/0x5be0 [ 231.866182] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 231.871725] ? locks_remove_posix+0x486/0x850 [ 231.876222] ? vfs_lock_file+0xe0/0xe0 [ 231.880114] ? finish_task_switch+0x1b4/0x920 [ 231.884611] ? __switch_to_asm+0x34/0x70 [ 231.888674] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 231.894222] locks_remove_file+0x148/0x5c0 [ 231.898473] ? fcntl_setlk+0xfc0/0xfc0 [ 231.902368] ? fsnotify_first_mark+0x350/0x350 [ 231.906952] ? __fsnotify_parent+0xcc/0x420 [ 231.911275] ? perf_trace_sched_process_exec+0x860/0x860 [ 231.916728] ? fsnotify+0xf20/0xf20 [ 231.920361] ? check_preemption_disabled+0x48/0x280 [ 231.925405] ? __might_sleep+0x95/0x190 [ 231.929393] __fput+0x2f0/0xa70 [ 231.932688] ? get_max_files+0x20/0x20 [ 231.936589] ? trace_hardirqs_on+0xbd/0x310 [ 231.940914] ? kasan_check_read+0x11/0x20 [ 231.945079] ? task_work_run+0x1af/0x2a0 [ 231.949141] ? trace_hardirqs_off_caller+0x300/0x300 [ 231.954247] ? filp_close+0x1cd/0x250 [ 231.958067] ____fput+0x15/0x20 [ 231.961349] task_work_run+0x1e8/0x2a0 [ 231.965239] ? task_work_cancel+0x240/0x240 [ 231.969567] ? copy_fd_bitmaps+0x210/0x210 [ 231.973809] exit_to_usermode_loop+0x318/0x380 [ 231.978394] ? __bpf_trace_sys_exit+0x30/0x30 [ 231.982911] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 231.988486] do_syscall_64+0x6be/0x820 [ 231.992376] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 231.997758] ? syscall_return_slowpath+0x5e0/0x5e0 [ 232.002694] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 232.007541] ? trace_hardirqs_on_caller+0x310/0x310 [ 232.012573] ? prepare_exit_to_usermode+0x291/0x3b0 [ 232.017607] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 232.022472] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 232.028189] RIP: 0033:0x411021 [ 232.031385] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 19 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 232.050284] RSP: 002b:00007ffd3b9038f0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 232.058013] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000411021 [ 232.065282] RDX: 0000001b31c20000 RSI: 0000000000000000 RDI: 0000000000000003 [ 232.072548] RBP: 0000000000000000 R08: ffffffff8139bdc9 R09: 00000000c23dd2b3 [ 232.080526] R10: 00007ffd3b903820 R11: 0000000000000293 R12: 0000000000000000 [ 232.087794] R13: 0000000000000001 R14: 000000000000001b R15: 0000000000000001 [ 232.095076] ? __phys_addr+0x19/0x120 [ 232.098875] Modules linked in: [ 232.102086] general protection fault: 0000 [#6] PREEMPT SMP KASAN [ 232.103070] kasan: CONFIG_KASAN_INLINE enabled [ 232.108362] CPU: 0 PID: 7377 Comm: udevd Tainted: G D 4.20.0-rc1-next-20181107+ #107 [ 232.122107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 232.125192] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 232.131469] RIP: 0010:locks_remove_flock+0x216/0x350 [ 232.131483] Code: 00 0f 85 3a 01 00 00 48 8b 5b 98 48 85 db 74 3a e8 1f 41 92 ff 48 8d 7b 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 17 01 00 00 48 8b 5b 08 48 85 db 74 0d e8 f2 40 [ 232.131497] RSP: 0018:ffff8801b8f6f880 EFLAGS: 00010202 [ 232.168195] RAX: dffffc0000000000 RBX: 0000000041b58ab3 RCX: ffffffff81ed555d [ 232.175464] RDX: 000000000836b157 RSI: ffffffff81ed5c71 RDI: 0000000041b58abb [ 232.182728] RBP: ffff8801b8f6fa60 R08: ffff8801c4d68400 R09: ffffed00381dfc2a [ 232.189993] R10: ffffed00381dfc2a R11: ffff8801c0efe153 R12: ffff8801d975f7c0 [ 232.197261] R13: ffff8801b8f6f8f8 R14: 1ffff100371edf13 R15: dffffc0000000000 [ 232.204535] FS: 00007fef5230a7a0(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 232.212772] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 232.218650] CR2: 00007ffe14bf2c40 CR3: 00000001d93e7000 CR4: 00000000001406f0 [ 232.225913] Call Trace: [ 232.228515] ? flock_lock_inode+0x11c0/0x11c0 [ 232.233016] ? mark_held_locks+0x130/0x130 [ 232.237284] ? __handle_mm_fault+0xa57/0x5be0 [ 232.241783] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 232.247323] ? locks_remove_posix+0x486/0x850 [ 232.251818] ? vfs_lock_file+0xe0/0xe0 [ 232.255715] ? lock_downgrade+0x900/0x900 [ 232.259868] ? kasan_check_read+0x11/0x20 [ 232.264020] ? ep_remove+0x533/0xa30 [ 232.267739] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 232.273284] locks_remove_file+0x148/0x5c0 [ 232.277532] ? fcntl_setlk+0xfc0/0xfc0 [ 232.281425] ? fsnotify_first_mark+0x350/0x350 [ 232.286020] ? __fsnotify_parent+0xcc/0x420 [ 232.290354] ? perf_trace_sched_process_exec+0x860/0x860 [ 232.295815] ? fsnotify+0xf20/0xf20 [ 232.299452] ? check_preemption_disabled+0x48/0x280 [ 232.304490] ? __might_sleep+0x95/0x190 [ 232.308472] __fput+0x2f0/0xa70 [ 232.311759] ? get_max_files+0x20/0x20 [ 232.315651] ? trace_hardirqs_on+0xbd/0x310 [ 232.319982] ? kasan_check_read+0x11/0x20 [ 232.324138] ? task_work_run+0x1af/0x2a0 [ 232.328208] ? trace_hardirqs_off_caller+0x300/0x300 [ 232.333317] ? filp_close+0x1cd/0x250 [ 232.337132] ____fput+0x15/0x20 [ 232.340428] task_work_run+0x1e8/0x2a0 [ 232.344335] ? task_work_cancel+0x240/0x240 [ 232.348658] ? copy_fd_bitmaps+0x210/0x210 [ 232.352924] exit_to_usermode_loop+0x318/0x380 [ 232.357508] ? __bpf_trace_sys_exit+0x30/0x30 [ 232.362030] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 232.367581] do_syscall_64+0x6be/0x820 [ 232.371487] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 232.376857] ? syscall_return_slowpath+0x5e0/0x5e0 [ 232.381786] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 232.386629] ? trace_hardirqs_on_caller+0x310/0x310 [ 232.391655] ? prepare_exit_to_usermode+0x291/0x3b0 [ 232.396687] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 232.401535] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 232.406738] RIP: 0033:0x7fef51a122b0 [ 232.410452] Code: 40 75 0b 31 c0 48 83 c4 08 e9 0c ff ff ff 48 8d 3d c5 32 08 00 e8 c0 07 02 00 83 3d 45 a3 2b 00 00 75 10 b8 03 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 ce 8a 01 00 48 89 04 24 [ 232.429351] RSP: 002b:00007ffe14bef9e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 232.437071] RAX: 0000000000000000 RBX: 0000000001ae1250 RCX: 00007fef51a122b0 [ 232.444339] RDX: 00007ffe14bf2c40 RSI: 0000000000000002 RDI: 0000000000000007 [ 232.451607] RBP: 0000000000625500 R08: 00007ffe14bfb0b0 R09: 00007ffe14bfb080 [ 232.458883] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe14befac0 [ 232.466188] R13: 0000000000000001 R14: 00007ffe14befa54 R15: 0000000001ae1250 [ 232.473461] Modules linked in: [ 232.476674] general protection fault: 0000 [#7] PREEMPT SMP KASAN [ 232.482942] CPU: 1 PID: 7188 Comm: udevd Tainted: G D 4.20.0-rc1-next-20181107+ #107 [ 232.492128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 232.501497] RIP: 0010:locks_remove_flock+0x216/0x350 [ 232.506621] Code: 00 0f 85 3a 01 00 00 48 8b 5b 98 48 85 db 74 3a e8 1f 41 92 ff 48 8d 7b 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 17 01 00 00 48 8b 5b 08 48 85 db 74 0d e8 f2 40 [ 232.511418] ---[ end trace 19c26335380bae1b ]--- [ 232.525571] RSP: 0018:ffff88018cd27880 EFLAGS: 00010202 [ 232.525583] RAX: dffffc0000000000 RBX: 0000000041b58ab3 RCX: ffffffff81ed555d [ 232.525592] RDX: 000000000836b157 RSI: ffffffff81ed5c71 RDI: 0000000041b58abb [ 232.525601] RBP: ffff88018cd27a60 R08: ffff8801ba30c600 R09: ffffed00381dfc2a [ 232.525610] R10: ffffed00381dfc2a R11: ffff8801c0efe153 R12: ffff8801c6a0d300 [ 232.525618] R13: ffff88018cd278f8 R14: 1ffff100319a4f13 R15: dffffc0000000000 [ 232.525636] FS: 00007fef5230a7a0(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 232.530567] RIP: 0010:locks_remove_flock+0x216/0x350 [ 232.535742] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 232.535751] CR2: 0000001b32c2c000 CR3: 00000001cdebb000 CR4: 00000000001406e0 [ 232.535759] Call Trace: [ 232.535781] ? flock_lock_inode+0x11c0/0x11c0 [ 232.543602] Code: 00 0f 85 3a 01 00 00 48 8b 5b 98 48 85 db 74 3a e8 1f 41 92 ff 48 8d 7b 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 17 01 00 00 48 8b 5b 08 48 85 db 74 0d e8 f2 40 [ 232.550334] ? mark_held_locks+0x130/0x130 [ 232.550359] ? __handle_mm_fault+0xa57/0x5be0 [ 232.550376] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 232.550390] ? locks_remove_posix+0x486/0x850 [ 232.550407] ? vfs_lock_file+0xe0/0xe0 [ 232.558140] RSP: 0018:ffff8801bab5f880 EFLAGS: 00010202 [ 232.564960] ? lock_downgrade+0x900/0x900 [ 232.564977] ? kasan_check_read+0x11/0x20 [ 232.564989] ? ep_remove+0x533/0xa30 [ 232.565004] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 232.565034] locks_remove_file+0x148/0x5c0 [ 232.572643] RAX: dffffc0000000000 RBX: 0000000041b58ab3 RCX: ffffffff81ed555d [ 232.580529] ? fcntl_setlk+0xfc0/0xfc0 [ 232.580546] ? fsnotify_first_mark+0x350/0x350 [ 232.580561] ? __fsnotify_parent+0xcc/0x420 [ 232.580574] ? perf_trace_sched_process_exec+0x860/0x860 [ 232.580603] ? fsnotify+0xf20/0xf20 [ 232.586004] RDX: 000000000836b157 RSI: ffffffff81ed5c71 RDI: 0000000041b58abb [ 232.591585] ? check_preemption_disabled+0x48/0x280 [ 232.591603] ? __might_sleep+0x95/0x190 [ 232.591621] __fput+0x2f0/0xa70 [ 232.591640] ? get_max_files+0x20/0x20 [ 232.591660] ? trace_hardirqs_on+0xbd/0x310 [ 232.600168] RBP: ffff8801bab5fa60 R08: ffff8801ba9c8240 R09: ffffed003b5e5b67 [ 232.601520] ? kasan_check_read+0x11/0x20 [ 232.601536] ? task_work_run+0x1af/0x2a0 [ 232.601556] ? trace_hardirqs_off_caller+0x300/0x300 [ 232.606091] R10: ffffed003b5e5b67 R11: ffff8801daf2db3b R12: ffff8801c938fac0 [ 232.624957] ? filp_close+0x1cd/0x250 [ 232.624986] ____fput+0x15/0x20 [ 232.625013] task_work_run+0x1e8/0x2a0 [ 232.625029] ? task_work_cancel+0x240/0x240 [ 232.625045] ? copy_fd_bitmaps+0x210/0x210 [ 232.625067] exit_to_usermode_loop+0x318/0x380 [ 232.630113] R13: ffff8801bab5f8f8 R14: 1ffff1003756bf13 R15: dffffc0000000000 [ 232.633819] ? __bpf_trace_sys_exit+0x30/0x30 [ 232.633837] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 232.633860] do_syscall_64+0x6be/0x820 [ 232.639783] FS: 0000000002706940(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 232.643964] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 232.643982] ? syscall_return_slowpath+0x5e0/0x5e0 [ 232.644012] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 232.647964] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 232.653283] ? trace_hardirqs_on_caller+0x310/0x310 [ 232.653299] ? prepare_exit_to_usermode+0x291/0x3b0 [ 232.653317] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 232.653336] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 232.653365] RIP: 0033:0x7fef51a122b0 [ 232.659425] CR2: 000000000070a6b4 CR3: 00000001bc3b3000 CR4: 00000000001406f0 [ 232.661641] Code: 40 75 0b 31 c0 48 83 c4 08 e9 0c ff ff ff 48 8d 3d c5 32 08 00 e8 c0 07 02 00 83 3d 45 a3 2b 00 00 75 10 b8 03 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 ce 8a 01 00 48 89 04 24 [ 232.661650] RSP: 002b:00007ffe14bef9e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 232.661663] RAX: 0000000000000000 RBX: 0000000001ae1250 RCX: 00007fef51a122b0 [ 232.661677] RDX: 00007ffe14bf2c40 RSI: 0000000000000002 RDI: 0000000000000007 [ 232.665455] Kernel panic - not syncing: Fatal exception [ 232.670949] RBP: 0000000000625500 R08: 00007ffe14bfb0b0 R09: 00007ffe14bfb080 [ 232.918874] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe14befac0 [ 232.926144] R13: 0000000000000001 R14: 00007ffe14befa54 R15: 0000000001ae1250 [ 232.933430] Modules linked in: [ 232.937510] Kernel Offset: disabled [ 232.941136] Rebooting in 86400 seconds..